B="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000e40)=@newtfilter={0x70, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x4}}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x40, 0x2, [@TCA_FLOW_EMATCHES={0x3c, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x1}, @TCF_EM_IPT={0x14, 0x2, 0x0, 0x0, {{}, [@TCA_EM_IPT_HOOK={0x8}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2fc1}}]}]}}]}, 0x70}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6gre0\x00', r3, 0x29, 0x8, 0x3, 0x1ff, 0x60, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0, 0x700, 0x8000, 0x0, 0x9}}) sendmsg$nl_xfrm(r5, &(0x7f0000000700)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000580)=@newpolicy={0x138, 0x13, 0x4, 0x70bd2b, 0x25dfdbfe, {{@in6=@private1, @in=@private=0xa010102, 0x4e21, 0x806, 0x4e24, 0x3ff, 0xa, 0xa0, 0x0, 0x3b, r6, 0xffffffffffffffff}, {0x0, 0x1, 0x5, 0x9, 0x6, 0xc22, 0x79, 0x80000000}, {0xfffffffffffff0fc, 0xffffffff, 0xa76, 0x1}, 0x3f, 0x6e6bbd, 0x1, 0x1, 0x2, 0x1}, [@address_filter={0x28, 0x1a, {@in=@dev={0xac, 0x14, 0x14, 0x1f}, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2, 0x80, 0x1}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast1, @in6=@local, 0x0, 0x2}}, @user_kmaddress={0x2c, 0x13, {@in6=@mcast2, @in=@broadcast, 0x0, 0xa}}]}, 0x138}, 0x1, 0x0, 0x0, 0x24000041}, 0x20045440) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000200), 0x492492492492570, 0x0) 07:59:24 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84d60335000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x8}, 0x0) 07:59:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x3}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x5800}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:24 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84e80335000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x9}, 0x0) 07:59:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'hsr0\x00', 0x4}, 0x18) syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaabb0100bbbbbb08004500006c0000000000069078ac1414bbac1414aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="6c02000090780000020406000303001e140040d66c326d0fe1bab4d1708634738b8355000cb57446d5385ac739138a080a00000000000000001e102000"/76], 0x0) [ 1078.250346][T15643] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1078.353456][T15649] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 07:59:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x4}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x6000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xe}, 0x0) 07:59:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r6, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000300), 0xfffffe8c) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_NOTIFY_RADAR(r6, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r7, 0x200, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xbbb6}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x9b4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="74007fde090024001cf31abab9198ce507050048", @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r5, @ANYBLOB="2300000000000000000000000a000100727376703600000004000200060005"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440), 0x10) 07:59:24 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84f80335000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, &(0x7f0000000040)) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344, 0x41424344}, 0xffffffff, 0xba12) syz_emit_ethernet(0x163, &(0x7f00000000c0)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}}, {{0x0, 0x4e22, r1, r1, 0x0, 0x6, 0x14, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x6}, @sack_perm={0x4, 0x2}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x1}, @mptcp=@mp_fclose={0x1e, 0xc, 0x9bb, 0x0, 0x3002}]}}, {"6413770d392812c5983032c9ba6bf92344be34440efb43e1258077ab475a7f0948c342c005c3cde05026dcd01b1bce20f37556a05699b78b2b11075a84ad0d21654f670a4bf59d57118f56064aa9f06bcc7b98b7b9d7ec3b5af394d2176374b833037e9c4135caa6e20e2c290b7cdadf2312efbe1315073cc2db6045633a44b23b12bc215ea4a2da79ae0cc39a5a038fa5531a77b7a4441d644a1508d302bf00320771403a1f9189f5d58c887a03abc5c7d8c9d1e21517758c65bbd1447ecf4a82158e67c1faa051b598870a491c19db4b25a812f0e1848ae780a48b6657a2df0e242653bf8846a96f374ebc7e962d856b"}}}}}}, 0x0) 07:59:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xf}, 0x0) 07:59:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x6800}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1078.877804][T15686] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 07:59:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x5}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$NL80211_CMD_SET_PMKSA(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0x0, 0x8, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_PMK={0x14, 0xfe, "04654c7b4ee553461c019300ea335104"}, @NL80211_ATTR_PMK={0x14, 0xfe, "8181c2ba4f5be260bce8b696149649f2"}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000003c0)={0x0, 0x2}) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x6}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:25 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84fa0335000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1078.988208][T15697] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1079.017053][T15700] net_ratelimit: 7 callbacks suppressed [ 1079.017067][T15700] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x60}, 0x0) 07:59:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x6c00}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x6}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1079.255235][T15683] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1079.265812][T15714] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:25 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000535000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1079.358721][T15719] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1079.375419][T15686] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1079.465063][T15727] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x6800}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xf0}, 0x0) 07:59:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x7}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000000c0)={'geneve0\x00'}) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000100)={0x3, 0x9, 0x6d, 0x20}, 0x10) syz_emit_ethernet(0x6e, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x13, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x6}, @window={0x3, 0x3}, @timestamp={0x8, 0xa, 0x9, 0x3}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x7400}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x300}, 0x0) 07:59:25 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000635000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x964, 0x1, 0x5, 0x3, 0x0, 0x0, {0xa, 0x0, 0x4}, [{{0x254, 0x1, {{0x3, 0x7}, 0x4, 0xad, 0x8, 0x5, 0x1, 'syz0\x00', "2fb61d1306bb082fd8c233e3a526a3c91a675abf0f122eedef105d00da648357", "ee27ce5c236b1f486a42f84acf9a9d1c47922af21f723e2825636d8958f6129c", [{0x1, 0x100, {0x0, 0xb263}}, {0x7ff, 0x0, {0x1, 0x5}}, {0x3, 0xffff, {0x7, 0x8000}}, {0xff, 0x81, {0x2, 0x7}}, {0x1ff, 0x2, {0x3, 0x1}}, {0x1ff, 0x9, {0x1, 0x400}}, {0x1, 0xa1, {0x0, 0xfbdb}}, {0x40, 0xa1c, {0x3, 0x7}}, {0x8000, 0x2, {0x0, 0x3f}}, {0x0, 0x4155, {0x0, 0x6}}, {0x2, 0x14c, {0x3, 0x6}}, {0x800, 0x0, {0x3, 0x8}}, {0x7, 0xff, {0x3, 0x7}}, {0x1, 0x7, {0x3, 0x3}}, {0xfff7, 0xc83, {0x3b2098ec8bc2ec9a, 0xff}}, {0x9, 0x3, {0x1, 0x5}}, {0x4a, 0x6, {0x3, 0x9d}}, {0xfffc, 0x7, {0x1, 0x3}}, {0x17, 0x1ff}, {0x0, 0xac, {0x2, 0x20}}, {0x3, 0x3, {0x3}}, {0x1000, 0x1, {0x1, 0x5}}, {0x8001, 0x1, {0x2, 0x7ff}}, {0x0, 0x1, {0x3, 0xc9}}, {0x26e2, 0x100, {0x3, 0x7}}, {0x9, 0x8, {0x0, 0x5}}, {0x0, 0x20, {0x0, 0x9}}, {0xf012, 0x8, {0x2, 0x9}}, {0x0, 0x100, {0x2, 0x4e8f}}, {0x8, 0x1, {0x1}}, {0x101, 0x8, {0x2, 0x9}}, {0x401, 0xfff8, {0x0, 0x401}}, {0x1, 0x5}, {0xf8e, 0x200, {0x0, 0x1}}, {0x5, 0x3ff, {0x2, 0x1}}, {0x2, 0x101, {0x3}}, {0x80, 0x200, {0x0, 0x7}}, {0x962, 0x0, {0x1, 0x401}}, {0x91, 0x9, {0x0, 0x3}}, {0x3be, 0x3, {0x1, 0x2}}]}}}, {{0x254, 0x1, {{0x1, 0x5}, 0x5, 0x76, 0x7f, 0x1b8, 0x19, 'syz1\x00', "9658344571335dc6c76aafa63fb8972983542c40002734c6905936967c38c01a", "6f97ee989ae509fadea0843e6a34dae8cabb766f532ad70f0c71992dc165246f", [{0x7, 0xd0, {0x1}}, {0x7, 0x401, {0x3, 0x3}}, {0x3d7, 0xdc97, {0x0, 0x5979}}, {0xca77, 0xfffa, {0x1, 0x8000}}, {0x3ff, 0x0, {0x1, 0x7}}, {0x7, 0x7fff, {0x3, 0x4}}, {0xf8a, 0xff, {0x3, 0xbb8}}, {0x7f, 0x3ff, {0x2, 0x7}}, {0x7, 0x0, {0x0, 0x7}}, {0x8, 0x1000, {0x3, 0x3}}, {0x8, 0x6844, {0x2}}, {0x401, 0xffff, {0x0, 0x4}}, {0x5e8, 0x2, {0xcc1318c500f2053a, 0xfffffff8}}, {0x5, 0x7, {0x1, 0x2}}, {0x7, 0x4, {0x0, 0xfffffffa}}, {0x85, 0x7, {0x1, 0x80000001}}, {0x9, 0x1ff, {0x0, 0xe8f}}, {0x0, 0x7, {0x1, 0x8}}, {0x9, 0x9, {0x3, 0xfffffff8}}, {0xffd5, 0x8, {0x3, 0x1}}, {0x400, 0x0, {0x3, 0xb6}}, {0x200, 0x7, {0x0, 0x8}}, {0x2, 0x0, {0x3, 0x8}}, {0x9, 0xf0d, {0x2, 0x4}}, {0xc21b, 0x4, {0x0, 0x1f}}, {0x4, 0x40, {0x2, 0xd655}}, {0x4, 0x2, {0x0, 0x4}}, {0x384, 0x635a, {0x2, 0x3}}, {0x1a, 0x4, {0x3, 0x401}}, {0x4, 0x1, {0x1, 0x80}}, {0x4, 0x8, {0x1, 0x40}}, {0x5, 0x401, {0x0, 0x9}}, {0x4, 0xff, {0x1, 0xd7f}}, {0x0, 0x401, {0x2, 0xf222}}, {0x800, 0x20, {0x3, 0xffffff3c}}, {0x580, 0x3f, {0x3, 0x8}}, {0x7ff, 0x160b, {0x3, 0x2}}, {0x3, 0xf299, {0x3, 0x5}}, {0x1, 0x5e0, {0x3, 0x9}}, {0x2, 0x2, {0x1, 0x9}}]}}}, {{0x254, 0x1, {{0x2, 0x100}, 0x1, 0x0, 0xd03, 0x4, 0xb, 'syz0\x00', "e113df356aed00fc0d9d6471835aff8f9a1cd0d646d2b58ad60f8bd56410f790", "979d44919c7afd3901f12bb5486e2aec96d635fec2397f86e1fe18dfdca6f85d", [{0x4, 0x4, {0x2, 0x5a5c}}, {0x9, 0x4, {0x0, 0x7}}, {0x9, 0x3, {0x1, 0xffffff7a}}, {0x3f, 0x6, {0x2, 0x6}}, {0x400, 0x0, {0x2, 0x5}}, {0x100, 0x9, {0x0, 0x40000000}}, {0x400, 0x7fff, {0x1dfb8348a642a3e2, 0x3}}, {0x8, 0x5, {0x3, 0x80000000}}, {0x1ff, 0x8d, {0x1, 0x3}}, {0x1f, 0x5, {0x3, 0x3}}, {0x6, 0x3, {0x3, 0x6}}, {0x5f, 0xc2a0, {0x0, 0x3}}, {0x0, 0x1ff, {0x0, 0xfffffffa}}, {0x80, 0x4, {0x3, 0x8}}, {0x7, 0x78, {0x1, 0x8}}, {0x1, 0x2, {0x0, 0x6}}, {0x3, 0x2, {0x1, 0x1}}, {0x80, 0x2, {0x2, 0x1}}, {0x80, 0x0, {0x1, 0xffff}}, {0x2, 0x3, {0x2, 0x6}}, {0x8, 0x4, {0x2, 0x3}}, {0x3ff, 0x100, {0x2, 0x4}}, {0x3aa, 0x7, {0x0, 0x7ff}}, {0x9, 0x2, {0x1, 0x8000}}, {0x8, 0x2, {0x1, 0x1209}}, {0x8, 0x3, {0x2, 0xb3}}, {0xb3, 0xff, {0x2, 0xe6}}, {0x101, 0x400, {0x0, 0x7ff}}, {0x3, 0x400, {0x0, 0x9}}, {0xed9, 0x3ff, {0x2, 0x7}}, {0x1, 0x5, {0x2, 0x4}}, {0x66, 0x20, {0x0, 0x6b1f29b3}}, {0x2, 0x0, {0x2, 0x8000}}, {0x5, 0x1, {0x2, 0x80000001}}, {0x8, 0xe9d, {0x1, 0x1}}, {0xfff, 0x1, {0x3, 0x40}}, {0x2, 0x7ff, {0x2, 0xfffffffe}}, {0x6, 0x7, {0x2, 0x5}}, {0x7, 0x1000, {0x0, 0x5}}, {0x2, 0xe2d, {0x2, 0x6}}]}}}, {{0x254, 0x1, {{0x2, 0x9}, 0x80, 0x0, 0x2, 0x100, 0x25, 'syz0\x00', "f1801929420907607109ef1ee27f3d417419441cad4781aaf02d3315393bdfed", "03e4308ca5d50aa9697c87d17e32210924c5657095e373f5c8569bb69a11e81d", [{0xc400, 0x7f, {0x2, 0x7}}, {0x0, 0x6, {0x0, 0xfffffff7}}, {0x81, 0x6, {0x2, 0x6}}, {0x80, 0xff, {0x3, 0x800}}, {0x0, 0x40, {0x3, 0x7}}, {0xdd, 0x5, {0x2}}, {0x2, 0x1, {0x2, 0x2000}}, {0x5, 0x6, {0x0, 0x7}}, {0x5, 0x3, {0x1, 0x401}}, {0x1, 0x0, {0x3, 0xb6e0}}, {0xea, 0xfff8, {0x2, 0x3}}, {0xfff, 0x101, {0x0, 0x1}}, {0x3, 0x0, {0x3, 0x4}}, {0x3, 0x6, {0x2, 0x101}}, {0x8, 0x1, {0x0, 0x4d}}, {0x5, 0x0, {0x2, 0xffffffff}}, {0xffff, 0xe87, {0x0, 0x7}}, {0x7ff, 0x4, {0x2, 0x1}}, {0x7, 0x1, {0x1, 0x200}}, {0x3, 0x3ff, {0x1, 0x4}}, {0x1, 0x9973, {0x3, 0x7f}}, {0x400, 0x40, {0x1, 0x1}}, {0x324, 0x5, {0x3, 0x4}}, {0x9, 0x1, {0x1, 0x3}}, {0x3ff, 0x3, {0x0, 0xfff}}, {0x1, 0x6, {0x0, 0x80000000}}, {0x9, 0xffff, {0x6, 0x7}}, {0x7f, 0x7fff, {0x0, 0xe4}}, {0x2, 0x1, {0x0, 0x9}}, {0x5, 0x4, {0x2, 0x1ff}}, {0xab5, 0x0, {0x2}}, {0xfff8, 0x8000, {0x3, 0x6}}, {0x0, 0x9, {0x2, 0x7f}}, {0x1, 0x800, {0x1, 0x3}}, {0x204, 0x101, {0x3, 0x9}}, {0x95, 0x4, {0x2, 0x7f}}, {0xea78, 0x0, {0x0, 0x8}}, {0x9, 0x4, {0x0, 0x9}}, {0x2, 0x3, {0x0, 0x6}}, {0x38c5, 0x0, {0x2, 0x5}}]}}}]}, 0x964}, 0x1, 0x0, 0x0, 0x4840}, 0x8001) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_TIOCINQ(r1, 0x541b, &(0x7f00000001c0)) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000f80)=ANY=[@ANYBLOB="cc000000", @ANYRES16=0x0, @ANYBLOB="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"/450], 0xcc}, 0x1, 0x0, 0x0, 0x40}, 0x800) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000cc0)={0x0, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x7}, @xdp={0x2c, 0xa, 0x0, 0x5}, @tipc=@nameseq={0x1e, 0x1, 0x1, {0x2, 0x3}}, 0x6, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000c80)='bridge_slave_0\x00', 0x40, 0x4, 0xdff8}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000d40)={r2, 0x1, 0x6, @remote}, 0x10) 07:59:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x11}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1079.819069][T15747] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$x25(0xffffffffffffffff, &(0x7f0000000200)={0x9, @null=' \x00'}, 0x12) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x6}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x9c, 0x0, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:apt_var_lib_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x1e}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40040}, 0x20040000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) read(r1, &(0x7f0000000240)=""/33, 0x21) 07:59:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x500}, 0x0) 07:59:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x7a00}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:26 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000735000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1080.114876][T15763] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x600}, 0x0) 07:59:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x3c}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1080.183573][T15766] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x964, 0x1, 0x5, 0x3, 0x0, 0x0, {0xa, 0x0, 0x4}, [{{0x254, 0x1, {{0x3, 0x7}, 0x4, 0xad, 0x8, 0x5, 0x1, 'syz0\x00', "2fb61d1306bb082fd8c233e3a526a3c91a675abf0f122eedef105d00da648357", "ee27ce5c236b1f486a42f84acf9a9d1c47922af21f723e2825636d8958f6129c", [{0x1, 0x100, {0x0, 0xb263}}, {0x7ff, 0x0, {0x1, 0x5}}, {0x3, 0xffff, {0x7, 0x8000}}, {0xff, 0x81, {0x2, 0x7}}, {0x1ff, 0x2, {0x3, 0x1}}, {0x1ff, 0x9, {0x1, 0x400}}, {0x1, 0xa1, {0x0, 0xfbdb}}, {0x40, 0xa1c, {0x3, 0x7}}, {0x8000, 0x2, {0x0, 0x3f}}, {0x0, 0x4155, {0x0, 0x6}}, {0x2, 0x14c, {0x3, 0x6}}, {0x800, 0x0, {0x3, 0x8}}, {0x7, 0xff, {0x3, 0x7}}, {0x1, 0x7, {0x3, 0x3}}, {0xfff7, 0xc83, {0x3b2098ec8bc2ec9a, 0xff}}, {0x9, 0x3, {0x1, 0x5}}, {0x4a, 0x6, {0x3, 0x9d}}, {0xfffc, 0x7, {0x1, 0x3}}, {0x17, 0x1ff}, {0x0, 0xac, {0x2, 0x20}}, {0x3, 0x3, {0x3}}, {0x1000, 0x1, {0x1, 0x5}}, {0x8001, 0x1, {0x2, 0x7ff}}, {0x0, 0x1, {0x3, 0xc9}}, {0x26e2, 0x100, {0x3, 0x7}}, {0x9, 0x8, {0x0, 0x5}}, {0x0, 0x20, {0x0, 0x9}}, {0xf012, 0x8, {0x2, 0x9}}, {0x0, 0x100, {0x2, 0x4e8f}}, {0x8, 0x1, {0x1}}, {0x101, 0x8, {0x2, 0x9}}, {0x401, 0xfff8, {0x0, 0x401}}, {0x1, 0x5}, {0xf8e, 0x200, {0x0, 0x1}}, {0x5, 0x3ff, {0x2, 0x1}}, {0x2, 0x101, {0x3}}, {0x80, 0x200, {0x0, 0x7}}, {0x962, 0x0, {0x1, 0x401}}, {0x91, 0x9, {0x0, 0x3}}, {0x3be, 0x3, {0x1, 0x2}}]}}}, {{0x254, 0x1, {{0x1, 0x5}, 0x5, 0x76, 0x7f, 0x1b8, 0x19, 'syz1\x00', "9658344571335dc6c76aafa63fb8972983542c40002734c6905936967c38c01a", "6f97ee989ae509fadea0843e6a34dae8cabb766f532ad70f0c71992dc165246f", [{0x7, 0xd0, {0x1}}, {0x7, 0x401, {0x3, 0x3}}, {0x3d7, 0xdc97, {0x0, 0x5979}}, {0xca77, 0xfffa, {0x1, 0x8000}}, {0x3ff, 0x0, {0x1, 0x7}}, {0x7, 0x7fff, {0x3, 0x4}}, {0xf8a, 0xff, {0x3, 0xbb8}}, {0x7f, 0x3ff, {0x2, 0x7}}, {0x7, 0x0, {0x0, 0x7}}, {0x8, 0x1000, {0x3, 0x3}}, {0x8, 0x6844, {0x2}}, {0x401, 0xffff, {0x0, 0x4}}, {0x5e8, 0x2, {0xcc1318c500f2053a, 0xfffffff8}}, {0x5, 0x7, {0x1, 0x2}}, {0x7, 0x4, {0x0, 0xfffffffa}}, {0x85, 0x7, {0x1, 0x80000001}}, {0x9, 0x1ff, {0x0, 0xe8f}}, {0x0, 0x7, {0x1, 0x8}}, {0x9, 0x9, {0x3, 0xfffffff8}}, {0xffd5, 0x8, {0x3, 0x1}}, {0x400, 0x0, {0x3, 0xb6}}, {0x200, 0x7, {0x0, 0x8}}, {0x2, 0x0, {0x3, 0x8}}, {0x9, 0xf0d, {0x2, 0x4}}, {0xc21b, 0x4, {0x0, 0x1f}}, {0x4, 0x40, {0x2, 0xd655}}, {0x4, 0x2, {0x0, 0x4}}, {0x384, 0x635a, {0x2, 0x3}}, {0x1a, 0x4, {0x3, 0x401}}, {0x4, 0x1, {0x1, 0x80}}, {0x4, 0x8, {0x1, 0x40}}, {0x5, 0x401, {0x0, 0x9}}, {0x4, 0xff, {0x1, 0xd7f}}, {0x0, 0x401, {0x2, 0xf222}}, {0x800, 0x20, {0x3, 0xffffff3c}}, {0x580, 0x3f, {0x3, 0x8}}, {0x7ff, 0x160b, {0x3, 0x2}}, {0x3, 0xf299, {0x3, 0x5}}, {0x1, 0x5e0, {0x3, 0x9}}, {0x2, 0x2, {0x1, 0x9}}]}}}, {{0x254, 0x1, {{0x2, 0x100}, 0x1, 0x0, 0xd03, 0x4, 0xb, 'syz0\x00', "e113df356aed00fc0d9d6471835aff8f9a1cd0d646d2b58ad60f8bd56410f790", "979d44919c7afd3901f12bb5486e2aec96d635fec2397f86e1fe18dfdca6f85d", [{0x4, 0x4, {0x2, 0x5a5c}}, {0x9, 0x4, {0x0, 0x7}}, {0x9, 0x3, {0x1, 0xffffff7a}}, {0x3f, 0x6, {0x2, 0x6}}, {0x400, 0x0, {0x2, 0x5}}, {0x100, 0x9, {0x0, 0x40000000}}, {0x400, 0x7fff, {0x1dfb8348a642a3e2, 0x3}}, {0x8, 0x5, {0x3, 0x80000000}}, {0x1ff, 0x8d, {0x1, 0x3}}, {0x1f, 0x5, {0x3, 0x3}}, {0x6, 0x3, {0x3, 0x6}}, {0x5f, 0xc2a0, {0x0, 0x3}}, {0x0, 0x1ff, {0x0, 0xfffffffa}}, {0x80, 0x4, {0x3, 0x8}}, {0x7, 0x78, {0x1, 0x8}}, {0x1, 0x2, {0x0, 0x6}}, {0x3, 0x2, {0x1, 0x1}}, {0x80, 0x2, {0x2, 0x1}}, {0x80, 0x0, {0x1, 0xffff}}, {0x2, 0x3, {0x2, 0x6}}, {0x8, 0x4, {0x2, 0x3}}, {0x3ff, 0x100, {0x2, 0x4}}, {0x3aa, 0x7, {0x0, 0x7ff}}, {0x9, 0x2, {0x1, 0x8000}}, {0x8, 0x2, {0x1, 0x1209}}, {0x8, 0x3, {0x2, 0xb3}}, {0xb3, 0xff, {0x2, 0xe6}}, {0x101, 0x400, {0x0, 0x7ff}}, {0x3, 0x400, {0x0, 0x9}}, {0xed9, 0x3ff, {0x2, 0x7}}, {0x1, 0x5, {0x2, 0x4}}, {0x66, 0x20, {0x0, 0x6b1f29b3}}, {0x2, 0x0, {0x2, 0x8000}}, {0x5, 0x1, {0x2, 0x80000001}}, {0x8, 0xe9d, {0x1, 0x1}}, {0xfff, 0x1, {0x3, 0x40}}, {0x2, 0x7ff, {0x2, 0xfffffffe}}, {0x6, 0x7, {0x2, 0x5}}, {0x7, 0x1000, {0x0, 0x5}}, {0x2, 0xe2d, {0x2, 0x6}}]}}}, {{0x254, 0x1, {{0x2, 0x9}, 0x80, 0x0, 0x2, 0x100, 0x25, 'syz0\x00', "f1801929420907607109ef1ee27f3d417419441cad4781aaf02d3315393bdfed", "03e4308ca5d50aa9697c87d17e32210924c5657095e373f5c8569bb69a11e81d", [{0xc400, 0x7f, {0x2, 0x7}}, {0x0, 0x6, {0x0, 0xfffffff7}}, {0x81, 0x6, {0x2, 0x6}}, {0x80, 0xff, {0x3, 0x800}}, {0x0, 0x40, {0x3, 0x7}}, {0xdd, 0x5, {0x2}}, {0x2, 0x1, {0x2, 0x2000}}, {0x5, 0x6, {0x0, 0x7}}, {0x5, 0x3, {0x1, 0x401}}, {0x1, 0x0, {0x3, 0xb6e0}}, {0xea, 0xfff8, {0x2, 0x3}}, {0xfff, 0x101, {0x0, 0x1}}, {0x3, 0x0, {0x3, 0x4}}, {0x3, 0x6, {0x2, 0x101}}, {0x8, 0x1, {0x0, 0x4d}}, {0x5, 0x0, {0x2, 0xffffffff}}, {0xffff, 0xe87, {0x0, 0x7}}, {0x7ff, 0x4, {0x2, 0x1}}, {0x7, 0x1, {0x1, 0x200}}, {0x3, 0x3ff, {0x1, 0x4}}, {0x1, 0x9973, {0x3, 0x7f}}, {0x400, 0x40, {0x1, 0x1}}, {0x324, 0x5, {0x3, 0x4}}, {0x9, 0x1, {0x1, 0x3}}, {0x3ff, 0x3, {0x0, 0xfff}}, {0x1, 0x6, {0x0, 0x80000000}}, {0x9, 0xffff, {0x6, 0x7}}, {0x7f, 0x7fff, {0x0, 0xe4}}, {0x2, 0x1, {0x0, 0x9}}, {0x5, 0x4, {0x2, 0x1ff}}, {0xab5, 0x0, {0x2}}, {0xfff8, 0x8000, {0x3, 0x6}}, {0x0, 0x9, {0x2, 0x7f}}, {0x1, 0x800, {0x1, 0x3}}, {0x204, 0x101, {0x3, 0x9}}, {0x95, 0x4, {0x2, 0x7f}}, {0xea78, 0x0, {0x0, 0x8}}, {0x9, 0x4, {0x0, 0x9}}, {0x2, 0x3, {0x0, 0x6}}, {0x38c5, 0x0, {0x2, 0x5}}]}}}]}, 0x964}, 0x1, 0x0, 0x0, 0x4840}, 0x8001) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_TIOCINQ(r1, 0x541b, &(0x7f00000001c0)) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000f80)=ANY=[@ANYBLOB="cc000000", @ANYRES16=0x0, @ANYBLOB="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"/450], 0xcc}, 0x1, 0x0, 0x0, 0x40}, 0x800) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000cc0)={0x0, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x7}, @xdp={0x2c, 0xa, 0x0, 0x5}, @tipc=@nameseq={0x1e, 0x1, 0x1, {0x2, 0x3}}, 0x6, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000c80)='bridge_slave_0\x00', 0x40, 0x4, 0xdff8}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000d40)={r2, 0x1, 0x6, @remote}, 0x10) 07:59:26 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000935000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1080.281675][T15767] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x9b11}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @empty}}) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x6}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)) 07:59:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x700}, 0x0) 07:59:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0xff}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:26 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000a35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1080.573750][T15783] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x900}, 0x0) [ 1080.677509][T15788] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0xe0ffff}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x7}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:26 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000e35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb08004500006c0000000000069078ac1414bbac1414aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="6c22000000780000020406000303001e140040d66c326d0fe1bab4d1708634738b81554f566d057bb93047c739138a080a00000000000000001e102000"/76], 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00\r'], 0x28}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x74000000, {0x0, 0x0, 0x3, r4}}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000540)={'ip6gre0\x00', &(0x7f00000004c0)={'ip6gre0\x00', 0x0, 0x4, 0xf2, 0x9, 0x1, 0x0, @mcast1, @remote, 0x7800, 0x7800, 0x9, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000600)={'syztnl2\x00', &(0x7f0000000580)={'ip6gre0\x00', 0x0, 0x2f, 0xa5, 0xc, 0x9, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, 0x1, 0x0, 0xfb, 0x9}}) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="dc000000", @ANYRES16=0x0, @ANYBLOB="020228bd7000fddbdf251700000070000180140002006970366772657461703000000000000008000300000000001400020076657468305f746f5f6261746164760008000300010000001400020062617461647630000000000000000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000044000180080003000200000008000100", @ANYRES32=r4, @ANYBLOB="080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="c38164cd94b8040d99042bdcc24b8797f40854df3ab1142f57c93cc4fb270560767644eac162"], 0xdc}, 0x1, 0x0, 0x0, 0x200080c0}, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f00000000c0)={0x6, 0x10, [], 0x0, &(0x7f0000000000)=[0x0, 0x0]}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) ioctl$sock_qrtr_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 07:59:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xb40}, 0x0) 07:59:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x2}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @empty}}) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x6}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)) 07:59:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x1000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:27 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000f35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1081.091412][T15813] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 07:59:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xe00}, 0x0) [ 1081.190425][T15818] bridge0: port 3(veth3) entered blocking state [ 1081.196770][T15818] bridge0: port 3(veth3) entered disabled state 07:59:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x3}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1081.234208][T15818] device veth3 entered promiscuous mode [ 1081.271663][T15824] device veth3 left promiscuous mode [ 1081.277065][T15824] bridge0: port 3(veth3) entered disabled state 07:59:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x2000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xf00}, 0x0) [ 1081.406001][T15813] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 07:59:27 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84031435000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000003c0)="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", 0x1000, 0x0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb08004500006c0000000000069078ac1414bbac1414aa00004e1e", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="6c02000090780000020406000303001e140040d66c326d0fe10e6b3d8e3c731eae8355000c138a080a00000000000000001e102000"/76], 0x0) 07:59:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x4}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:27 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x5519e000) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, 0x0) r0 = socket$inet6(0xa, 0x3, 0x400003a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) 07:59:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x400b}, 0x0) 07:59:27 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84011735000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x3000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000000)={'ip6gretap0\x00', 0x8}) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x6}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1081.841396][T15861] IPVS: ftp: loaded support on port[0] = 21 07:59:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x6000}, 0x0) 07:59:28 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a843e1a35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x4000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xf000}, 0x0) 07:59:28 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84401a35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1082.626709][T15861] IPVS: ftp: loaded support on port[0] = 21 07:59:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) getsockname(r0, &(0x7f00000001c0)=@xdp, &(0x7f0000000240)=0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="693635c6ba59989bf16444d80b9cf1d8d43116131a0513f38761bd07e15b0aac8bdb695b964c0b3e821649529c2c9233e1aa3c9b79a4c32d531998ad0a495de299cb63e46eca2f24c3540b364081787a4456e4763f9773c0c9f1902ce7292fb528b5756aca7f3121792e90ac8326f7fb6aed8ede8ba5ef21eed45cf17d4374576fa819", @ANYRES16=r2, @ANYBLOB="010000000000000000000500000008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x0) 07:59:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x5000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x34000}, 0x0) 07:59:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) setsockopt$ax25_int(r1, 0x101, 0xa, &(0x7f0000000400)=0x6, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000000)={@local, @multicast, @void, {@ipv4={0x800, @gre={{0x0, 0x4, 0x2, 0x0, 0x0, 0x65, 0x0, 0x7f, 0x2f, 0x0, @local, @rand_addr=0x64010100, {[@timestamp={0x44, 0x0, 0x96, 0x0, 0x6, [0x8001, 0xd6, 0x7, 0x5, 0x9, 0x4]}, @timestamp_addr={0x44, 0x0, 0x55, 0x1, 0x2, [{@multicast1, 0x20}, {@local, 0x80000000}]}, @generic={0x7}, @cipso={0x86, 0x0, 0x7fffffffffffffff, [{0x2, 0x0, "22cf850c00fc4fd4036a9c586caa98"}, {0x0, 0x0, "cd24fe928dcbe8713891b2"}, {0xc, 0x0, "21ce5b677d3a12422f6439"}, {0x0, 0x0, "f325c3910c26258b8331e1bcf3f9"}, {0x6, 0x0, "6974a70028d211c8d1cf"}]}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x880b, 0x0, 0x3, [0x7ff, 0x1], "364316c33061dafbd084b12aff4450a794b422c220d4acbd9a7955c536e72df0f3295858f8eb2acda748b05476942422d5b068a4ca3e7e3f96a4beba15a2d6d8a2f79903d2b4500ab8af456dee9c644c4795ec0d686f9b48653cda0761a9124ca426d3ee9639af12aa8737189dfc07f48690bec7c8a9818fdfe0ace5b4e237a78e58455050113ddba5db8e166985cef0d39193a236d3c84993aff19b4b86fc37520cd83fa4"}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, [], "418ada92adc49c773c75cb49d49d41a54b05a40ac3164dee587659a86d6ff2188f8eadeb6d57ce9c645767961a8f30b3fcd020f5d05e6c42621872c47793c85d943d13e628b34aba33d19fc646a09563cd9ba36cab8b78bfd1a91176a19b9a3e94bb9c98a4f6890ca3418d6f5a4e4f4e4eca23f8e96f0076fe558ff6fe757fdc11b498cb255caa0d217d33a150ae6f7fb6b63dfa030074fe6a4c6979d901bb53bc560674a1bfe24736a4e44bbbb8daf50cc661c59f988ec508cb14515e5b008c911a7507427d70c32eecdbcc2ea45a5deeddb90b84154e900cafbf86c1f0cab01b2ff86cec5248e1828eb4a0823e0abbbffb9d20b23f57a0"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0xaf, 0xa2], "738b4acfb471f6ad4fe3d86789f44de218269b583bfb3adb89c72060defa27222b99e7fff294e681a9994b221aed204b2a899f5b89524df76c11114908f70fb2386ee3e1f6aadaba8294aa6fe8f87e9d8363b6379b2d1fcb2050ae9591bdcf46cd41faf7e3014e78215f92f4c7f9a28d18171f8603a1e81fc593f31d7fca5e978a66113d2e038c31f15bec8110c730d6d8651dee2a030000a464ebba"}, {0x8, 0x88be, 0x3, {{0xf, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0xeb}, 0x1, {0x91}}}, {0x8, 0x22eb, 0x1, {{0x4, 0x2, 0x1f, 0x1, 0x0, 0x2, 0x5, 0x1}, 0x2, {0x20, 0x5, 0x1, 0xa, 0x0, 0x1, 0x3, 0x1, 0x1}}}, {0x8, 0x6558, 0x1, "9eba86f1b7ee5e232be534e2b7f0439c7744d2369d0a1b704b8e8147a3"}}}}}}, 0x0) 07:59:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x7}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:28 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84001e35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x400300}, 0x0) 07:59:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x11}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000000)) syz_emit_ethernet(0x7a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb08004500006c0000000000069078ac1414bbac1414aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 07:59:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x6000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:29 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84011e35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xf0ffff}, 0x0) 07:59:29 executing program 1: unshare(0x62040000) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000)={0x1ff, 0x5, 0xf82a, 0x1}, 0x1e) 07:59:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x3c}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:29 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84031e35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x7000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x131, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x0) 07:59:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x1000000}, 0x0) [ 1083.545509][T15984] IPVS: ftp: loaded support on port[0] = 21 07:59:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x8000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0xff}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:29 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84002035000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:29 executing program 5: r0 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f00000000c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r2, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000300), 0xfffffe8c) ioctl$BTRFS_IOC_INO_PATHS(r2, 0xc0389423, &(0x7f0000000140)={0x11, 0x0, [0x9, 0x20, 0x2, 0x6], &(0x7f0000000100)}) bind$inet(r1, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r1, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x13, 0x2, 0x0, 0x0, 0x3, {[@mss={0x2, 0x4, 0x6}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @eol, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x2000000}, 0x0) 07:59:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0xa000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_SNOOPING={0x5}]}}}, @IFLA_MTU={0x8, 0x4, 0x1ff}]}, 0x44}}, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) 07:59:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:30 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84002c35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x3000000}, 0x0) [ 1084.084846][T16034] net_ratelimit: 10 callbacks suppressed [ 1084.084860][T16034] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:30 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84012c35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0xb000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:30 executing program 1: ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000040)=0x1c) accept4$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @private0}, &(0x7f00000000c0)=0x1c, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00'}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2801800}, 0xc, &(0x7f0000000500)={&(0x7f0000000280)={0x260, 0x0, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}]}, 0x260}, 0x1, 0x0, 0x0, 0x10}, 0x8000) getsockname$llc(r1, &(0x7f0000000580)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000005c0)=0x10) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000600)={0x0, "aac79b21356cb19e14f1c2871a865355"}) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000001700)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x800010}, 0xc, &(0x7f00000016c0)={&(0x7f0000001640)={0x50, 0x0, 0x20, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x20, 0x4}}}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x39}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x9}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x8040}, 0x80) sendmsg$NL80211_CMD_SET_BSS(r1, &(0x7f0000001800)={&(0x7f0000001740), 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x1c, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc034}, 0x10) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000001840), &(0x7f0000001880)=0x4) r3 = socket$inet6(0xa, 0x1, 0xb9d) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000018c0)={0x0, 0x5}, &(0x7f0000001900)=0x8) r4 = accept4$rose(r1, 0x0, &(0x7f0000001940), 0x0) ioctl$BTRFS_IOC_RESIZE(r4, 0x50009403, &(0x7f0000001980)={{r1}, {@val={r2}, @max='max'}}) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000019c0)={{0x87, @remote, 0x4e22, 0x1, 'none\x00', 0x11, 0x5, 0x6c}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x4e24, 0x0, 0x5, 0x4, 0x9}}, 0x44) r5 = accept$ax25(r1, &(0x7f0000001b80)={{0x3, @bcast}, [@null, @rose, @netrom, @rose, @bcast, @rose, @default, @null]}, &(0x7f0000001c00)=0x48) getsockopt$ax25_int(r5, 0x101, 0xe, &(0x7f0000001c40), &(0x7f0000001c80)=0x4) socket$tipc(0x1e, 0x5, 0x0) 07:59:30 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() pipe(0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f00000002c0)="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"}, 0x20) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x81, 0x800, 0xf808}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8982, &(0x7f0000000100)={0x8, 'ip_vti0\x00', {'geneve1\x00'}, 0xe3c}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9a03}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x50}}, 0x0) 07:59:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x4000000}, 0x0) [ 1084.484454][T16057] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1084.556649][T16062] IPVS: ftp: loaded support on port[0] = 21 07:59:30 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84033235000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:30 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3b8}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r0, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000300), 0xfffffe8c) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000340)=""/191, &(0x7f0000000100)=0xbf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c0000001100358e000000030080000007000099", @ANYRES32=r3, @ANYBLOB="00000005000202000c001a00080002001a00fa"], 0x2c}}, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000180)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000280)={{0x0, 0x7ff, 0x7, 0x9, 0x101, 0x6, 0x8, 0x2, 0x1f2b7fa9, 0x2, 0x2, 0x6, 0x100000001, 0x6, 0x8001}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000004c0)={{r4, 0x6, 0xc1d, 0x8, 0xff, 0x0, 0x3, 0x3, 0x917, 0xfffffffb, 0x2, 0x40000000000, 0x401, 0x10000, 0x7e}}) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)=0xd3a) r5 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x4924b68, 0x0) r6 = socket$phonet(0x23, 0x2, 0x1) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000400)=r0, 0x4) 07:59:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x5000000}, 0x0) 07:59:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x20000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x6000000}, 0x0) 07:59:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x4}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:31 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84003435000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1084.928396][T16099] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x40000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x7000000}, 0x0) [ 1085.329291][T16114] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1085.506822][T16062] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 1086.010379][T16117] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 07:59:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r2, 0x0, 0x100000001) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000001340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000012c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r4, @ANYBLOB="000327bd7000fbdbdf25420000000e0001006e657464657673696d0000000f0002006e657464d97673696d3000000d0087006c325f64726f7073000000000500830000000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000005060000000000000e0001006e650cc67df19f0c5d33ee7464657673696d0000000f0002006e657464657673696d3000000d0087006c321f64726f70730000"], 0xb8}, 0x1, 0x0, 0x0, 0x4}, 0x1) r5 = socket$inet(0x2, 0x0, 0x3) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000740)=0x0) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e2, &(0x7f0000000780)={0x3, @null, r6}) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e2, &(0x7f0000002380)={0x3, @null, r6}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r7, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'tunl0\x00', &(0x7f00000023c0)={'erspan0\x00', 0x0, 0x7, 0x8007, 0xd8, 0x5, {{0x38, 0x4, 0x1, 0x8, 0xe0, 0x67, 0x0, 0x4, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @private=0xa010102, {[@timestamp={0x44, 0x18, 0xfa, 0x0, 0x8, [0x2, 0x7, 0x5a41be4, 0x4, 0x4]}, @cipso={0x86, 0x67, 0x0, [{0x6, 0xe, "9530509e116d3406e6823a02"}, {0x2, 0x8, "26ed15ae7ba5"}, {0x1, 0x6, "99623813"}, {0x2, 0x10, "6e06d00751dfb942c892a946806a"}, {0x6, 0x4, 'NV'}, {0x2, 0xd, "e09fdc0b0e6b0b93d1a0af"}, {0x6, 0x12, "51cbe5d8dfb6e114557d9fda12fbd787"}, {0x2, 0x12, "3fb65377f947feabc68937385644609c"}]}, @cipso={0x86, 0x40, 0x2, [{0x6, 0x3, 'k'}, {0x7, 0x6, "8e192fb6"}, {0x6, 0xb, "c44e144dbeeb6ff755"}, {0x1, 0x11, "5798a138b93dad2980236f7b2edc3a"}, {0x2, 0xa, "74cac84d6d573965"}, {0x2, 0xb, "a781a0d99c34640664"}]}, @timestamp_addr={0x44, 0xc, 0x8, 0x1, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1f}]}]}}}}}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000180)={0x6, 0x4, 0x2, 0x3, 0x9}, 0x14) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) ioctl$BTRFS_IOC_RM_DEV(r7, 0x5000940b, &(0x7f0000001380)={{}, "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"}) 07:59:32 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84023635000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x5}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r0, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r0, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000040)={0x7, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x5, 0xa, 0x7f, 0xfff}, &(0x7f00000000c0)=0xc4c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0xffffffffffffff01}}, 0x10) write$cgroup_int(r0, &(0x7f0000000300), 0xfffffe8c) r1 = accept4(r0, 0x0, &(0x7f0000000800), 0x1000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) getsockopt$netlink(r2, 0x10e, 0x2, &(0x7f0000000400)=""/187, &(0x7f00000002c0)=0xbb) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYRESHEX=r0], 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x2004c810) unshare(0x40000400) 07:59:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x8000000}, 0x0) 07:59:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x48000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1086.213405][T16138] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x9000000}, 0x0) 07:59:32 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84013935000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x6}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x4c000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1086.425307][ T34] audit: type=1804 audit(1606377572.492:295): pid=16150 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir499117746/syzkaller.oAu6Va/479/cgroup.controllers" dev="sda1" ino=16367 res=1 errno=0 [ 1086.491559][T16151] IPVS: ftp: loaded support on port[0] = 21 [ 1086.596711][ T34] audit: type=1804 audit(1606377572.602:296): pid=16150 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir499117746/syzkaller.oAu6Va/479/memory.events" dev="sda1" ino=16359 res=1 errno=0 07:59:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xe000000}, 0x0) [ 1086.672303][T16165] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:32 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84033a35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r2, 0x0, 0x100000001) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000001340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000012c0)={&(0x7f0000001200)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r4, @ANYBLOB="000327bd7000fbdbdf25420000000e0001006e657464657673696d0000000f0002006e657464d97673696d3000000d0087006c325f64726f7073000000000500830000000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f70730000000005060000000000000e0001006e650cc67df19f0c5d33ee7464657673696d0000000f0002006e657464657673696d3000000d0087006c321f64726f70730000"], 0xb8}, 0x1, 0x0, 0x0, 0x4}, 0x1) r5 = socket$inet(0x2, 0x0, 0x3) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000740)=0x0) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e2, &(0x7f0000000780)={0x3, @null, r6}) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e2, &(0x7f0000002380)={0x3, @null, r6}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r7, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'tunl0\x00', &(0x7f00000023c0)={'erspan0\x00', 0x0, 0x7, 0x8007, 0xd8, 0x5, {{0x38, 0x4, 0x1, 0x8, 0xe0, 0x67, 0x0, 0x4, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x36}, @private=0xa010102, {[@timestamp={0x44, 0x18, 0xfa, 0x0, 0x8, [0x2, 0x7, 0x5a41be4, 0x4, 0x4]}, @cipso={0x86, 0x67, 0x0, [{0x6, 0xe, "9530509e116d3406e6823a02"}, {0x2, 0x8, "26ed15ae7ba5"}, {0x1, 0x6, "99623813"}, {0x2, 0x10, "6e06d00751dfb942c892a946806a"}, {0x6, 0x4, 'NV'}, {0x2, 0xd, "e09fdc0b0e6b0b93d1a0af"}, {0x6, 0x12, "51cbe5d8dfb6e114557d9fda12fbd787"}, {0x2, 0x12, "3fb65377f947feabc68937385644609c"}]}, @cipso={0x86, 0x40, 0x2, [{0x6, 0x3, 'k'}, {0x7, 0x6, "8e192fb6"}, {0x6, 0xb, "c44e144dbeeb6ff755"}, {0x1, 0x11, "5798a138b93dad2980236f7b2edc3a"}, {0x2, 0xa, "74cac84d6d573965"}, {0x2, 0xb, "a781a0d99c34640664"}]}, @timestamp_addr={0x44, 0xc, 0x8, 0x1, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1f}]}]}}}}}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000180)={0x6, 0x4, 0x2, 0x3, 0x9}, 0x14) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) ioctl$BTRFS_IOC_RM_DEV(r7, 0x5000940b, &(0x7f0000001380)={{}, "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"}) 07:59:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x7}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1086.805698][ T34] audit: type=1800 audit(1606377572.602:297): pid=16150 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16359 res=0 errno=0 07:59:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x58000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1086.886457][T16139] IPVS: ftp: loaded support on port[0] = 21 [ 1087.072718][T16210] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:33 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/40, &(0x7f0000000040)=0x28) setsockopt$rose(r0, 0x104, 0x0, &(0x7f0000000080), 0x4) 07:59:33 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a841a3e35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xf000000}, 0x0) 07:59:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x11}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x60000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1087.317493][ T34] audit: type=1804 audit(1606377573.382:298): pid=16213 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir499117746/syzkaller.oAu6Va/480/cgroup.controllers" dev="sda1" ino=16367 res=1 errno=0 [ 1087.375232][T16234] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x400b0000}, 0x0) 07:59:33 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a841a4035000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1087.501662][ T34] audit: type=1804 audit(1606377573.562:299): pid=16240 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir499117746/syzkaller.oAu6Va/480/memory.events" dev="sda1" ino=16364 res=1 errno=0 07:59:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3c}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x68000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1087.632827][ T34] audit: type=1800 audit(1606377573.562:300): pid=16240 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16364 res=0 errno=0 [ 1087.782686][T16254] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:33 executing program 5: socket$kcm(0x10, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) pwritev(r0, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000300), 0xfffffe8c) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000", 0x28}, {&(0x7f0000000440)="5c38f9c15a4c", 0x6}], 0x2}, 0x24008884) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 07:59:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x1, 0x9, 0xffff}, &(0x7f00000002c0)=0x10) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="4800000010000540", @ANYRES32=r4, @ANYBLOB="00000000003cb60bedaf7d6436e8330000002800"], 0x48}}, 0x0) r5 = accept$phonet_pipe(r3, &(0x7f0000000140), &(0x7f0000000380)=0x10) ioctl$SIOCPNENABLEPIPE(r5, 0x89ed, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="7400000024000705000000000000000000000000f94aed5c76a0428b1a7126df8042891b31203e58d45d7befb8bfc0dcef6a6138c1e6073467b14867fdfdc4167ef4dc777863ec38afa84e31817a240c2d68d8010f5d67696c160c5d9e62d0bdde2b95ecc156be7dd49476086d73e8473514b4a5a273f8f4b9060e618cc0317c54e6be271e235bbfaf875297511982a685f7b1a555f6d5645b843a070d5f625bf3f8ac405197dbb99518e3678e6279eceb9332b3780972c5f87ca1e0fa4bb8eed14db501d7454f27abf7844dfbbfd04074787b8e79b2818011aadd146992794cc45dfe03ffe1cc00b6424c76a07dc7910024", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100716671"], 0x74}}, 0x0) r6 = socket$vsock_stream(0x28, 0x1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$nl_route_sched(r7, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000680)=@gettaction={0x168, 0x32, 0xf08, 0x70bd2c, 0x25dfdbfb, {}, [@action_gd=@TCA_ACT_TAB={0x70, 0x1, [{0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8001}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x2, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x3, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xff}}, {0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xc}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x4c, 0x1, [{0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0x14, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_gd=@TCA_ACT_TAB={0x3c, 0x1, [{0x14, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x4000004}, 0x40000) ioctl$F2FS_IOC_SET_PIN_FILE(r6, 0x4004f50d, &(0x7f0000000080)) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x4}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xb) sendmsg$nl_route_sched(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000002800270d0000000000000000f2390000c783ab8a592a831bc9e0f2536ac59ed1befabb99df6b16ec547a1634f19d347246b46a02008d2207f4c8a9909cc04c4f875cc2b620c7a24f4e055710271d5fb12e6b399bc7b98f2075c11e85c933d7e530d85bc67703ef62290616d54360c0290a95433ac4d99c8dff0c", @ANYRES32=r9, @ANYBLOB="0400000000000000000000000a00010072737670360000000c0002000800010002000000"], 0x3c}}, 0x0) 07:59:33 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84034235000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x60000000}, 0x0) 07:59:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xff}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x6c000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1087.969621][T16260] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 07:59:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x9effffff}, 0x0) [ 1088.018052][T16260] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. 07:59:34 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84004835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1088.125836][T16271] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1088.152498][T16270] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1088.203332][T16260] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1088.239518][T16275] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. 07:59:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x74000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1088.276089][T16260] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 07:59:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xf0ffffff}, 0x0) 07:59:34 executing program 1: r0 = socket$nl_generic(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) connect(r1, &(0x7f0000000200)=@ipx={0x4, 0x8, 0x1000, "2fa097b91894", 0x4}, 0x80) r2 = accept4(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80, 0x800) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, &(0x7f0000000080)=0x6, 0x4) 07:59:35 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e890cb9e4cafe0569942f464de7189668516700"}, 0x60) r1 = accept4(r0, &(0x7f00000001c0)=@rc, &(0x7f0000000000)=0x80, 0x800) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, &(0x7f0000000240)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f0000000100)=""/149, 0x207a0cb3) 07:59:35 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84024835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x2, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xfffff000}, 0x0) 07:59:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x7a000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:35 executing program 1: r0 = socket$nl_generic(0xa, 0x5, 0x84) shutdown(r0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) connect(r1, &(0x7f0000000200)=@ipx={0x4, 0x8, 0x1000, "2fa097b91894", 0x4}, 0x80) r2 = accept4(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80, 0x800) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, &(0x7f0000000080)=0x6, 0x4) 07:59:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x3, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:35 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84034835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xffffff7f}, 0x0) 07:59:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x9b110000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x4, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1089.342276][T16319] net_ratelimit: 2 callbacks suppressed [ 1089.342292][T16319] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xffffff9e}, 0x0) 07:59:35 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84004c35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:35 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) getsockopt$netlink(r0, 0x10e, 0x7, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) r2 = socket$l2tp6(0xa, 0x2, 0x73) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00\r'], 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x74000000, {0x0, 0x0, 0x3, r6}}, 0x20}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000180)={@mcast2, r6}, 0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@newqdisc={0x34, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x4}}]}, 0x34}}, 0x0) 07:59:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0xc0ffffff}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x5, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xfffffff0}, 0x0) [ 1089.741892][T16337] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1089.792772][T16339] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x1, &(0x7f0000000380)=0x1, 0x4) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x10, 0x70bd2d, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4044080}, 0x86) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r3, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x4, 0x4) write$cgroup_int(r3, &(0x7f0000000300), 0xfffffe8c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0xca2}, &(0x7f0000000180)=0x8) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="050000000000000000008100000008000300", @ANYRES32=r1, @ANYBLOB="060066008e8800000a0006000802110000010000220033"], 0x54}}, 0x0) ioctl$sock_TIOCINQ(r5, 0x541b, &(0x7f0000000080)) 07:59:35 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84005c35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x6, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1089.885642][T16343] bridge0: port 3(veth3) entered blocking state [ 1089.894745][T16343] bridge0: port 3(veth3) entered disabled state [ 1089.953523][T16343] device veth3 entered promiscuous mode [ 1089.997622][T16346] device veth3 left promiscuous mode [ 1090.011665][T16346] bridge0: port 3(veth3) entered disabled state 07:59:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x40030000000000}, 0x0) 07:59:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0xfdffffff}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:36 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84035e35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x7, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1090.146937][T16343] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1090.204942][T16371] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:36 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84006035000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x88, 0x0, 0x10, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3b}, @NL80211_ATTR_REG_RULES={0x4c, 0x22, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x2}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x69}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xffffffff}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x9}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0xffff}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x9}]}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4f}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1f}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1d}]}, 0x88}, 0x1, 0x0, 0x0, 0x4081}, 0x40000) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) ioctl$F2FS_IOC_FLUSH_DEVICE(r5, 0x4008f50a, &(0x7f0000000240)={0x9}) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x78, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x48, 0x2, {{0x7fff, 0x3}, [@TCA_NETEM_SLOT={0x2c, 0xc, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}}]}}}]}, 0x78}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a01093260004003002cfff57b016d2763bd56373780398d537503e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 07:59:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xf0ffffffffffff}, 0x0) 07:59:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0xfeffffff}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0xf, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1090.562269][T16393] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:59:36 executing program 1: shutdown(0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r0, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000300), 0xfffffe8c) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x20008094}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) 07:59:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x100000000000000}, 0x0) [ 1090.686469][T16399] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:36 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84026235000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1090.753607][T16396] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 07:59:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x2, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0xffffe000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:36 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000100)) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x2, 0x0) socket(0x10, 0x80002, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)=""/49, &(0x7f00000000c0)=0x31) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x3, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0xf00}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 07:59:36 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84026535000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x200000000000000}, 0x0) [ 1090.954176][T16413] IPVS: ftp: loaded support on port[0] = 21 [ 1090.977658][T16415] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0xffffffc0}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:37 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84006835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x3, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1091.281001][T16441] team0: Device vlan3 is already an upper device of the team interface 07:59:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x300000000000000}, 0x0) [ 1091.359052][T16460] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1091.824213][T16413] IPVS: ftp: loaded support on port[0] = 21 07:59:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x4, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:38 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84006c35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0xfffffffd}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x400000000000000}, 0x0) 07:59:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x10, 0x3f6, 0x1, 0x70bd27, 0x25dfdbfb, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0xc0c0}, 0x400c044) socket$phonet(0x23, 0x2, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) pwritev(r4, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000300), 0xfffffe8c) ioctl$FICLONERANGE(r4, 0x4020940d, &(0x7f0000000100)={{r3}, 0x9, 0x1, 0x2}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="00000000000000002800127f18ecd5a8000c0001"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYBLOB="5800000024001d0f00"/20, @ANYRES32=r6, @ANYBLOB="00000000f1ffffff0000000008000100736662"], 0x58}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8, 0x1, 'qfq\x00'}]}, 0x2c}}, 0x0) [ 1092.194146][T16496] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x500000000000000}, 0x0) 07:59:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x13, 0x16, &(0x7f0000000140)=ANY=[@ANYRES64], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={[], [], @empty}}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}]}, 0x38}}, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x45040004}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="31be8593b82da984f9689cebf6786823d32fe33813b0dcc3447eafdc8bdb728bec220ea6914c00a00518f2b3070000001c7238b689685a1ae537abc754023ef327e3242438f46f26fa22121f3044c04dd9e4a244aba6ec08307b7eb11dc875743262c4d695d5781c11ca12f2e63e1be329b8d26c668aefea6299d5b157cd13ad3e92fc7861194bdce92fd0e51c285f63415ecd535c815f1ffa8cef14bbd40cf18026f0fc4f0c3aee21d2d6bad5faeb48b1769d350f23f5796bd6768439000000", @ANYRES16=r3, @ANYBLOB="000229bd7000fbdbdf250100000005000300bc0000000500040003000000050003003a00000014000900fc020000000000000000000000000000060001004e200000"], 0x48}, 0x1, 0x0, 0x0, 0x810}, 0x4000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r5, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000300), 0xfffffe8c) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x20, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r5}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x40805) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) ppoll(&(0x7f0000000200)=[{r4, 0x8008}, {r2, 0x2441}, {r6, 0xa04e}, {r0, 0x1000}, {r0, 0x2}, {r0, 0x5010}, {r2, 0x2209}], 0x7, &(0x7f0000000240), &(0x7f00000002c0)={[0x18]}, 0x8) 07:59:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x5, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:38 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84036c35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0xfffffffe}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x600000000000000}, 0x0) [ 1092.595952][T16518] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x7, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x13, 0x16, &(0x7f0000000140)=ANY=[@ANYRES64], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={[], [], @empty}}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}]}, 0x38}}, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x45040004}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="31be8593b82da984f9689cebf6786823d32fe33813b0dcc3447eafdc8bdb728bec220ea6914c00a00518f2b3070000001c7238b689685a1ae537abc754023ef327e3242438f46f26fa22121f3044c04dd9e4a244aba6ec08307b7eb11dc875743262c4d695d5781c11ca12f2e63e1be329b8d26c668aefea6299d5b157cd13ad3e92fc7861194bdce92fd0e51c285f63415ecd535c815f1ffa8cef14bbd40cf18026f0fc4f0c3aee21d2d6bad5faeb48b1769d350f23f5796bd6768439000000", @ANYRES16=r3, @ANYBLOB="000229bd7000fbdbdf250100000005000300bc0000000500040003000000050003003a00000014000900fc020000000000000000000000000000060001004e200000"], 0x48}, 0x1, 0x0, 0x0, 0x810}, 0x4000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r5, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000300), 0xfffffe8c) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x20, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r5}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x40805) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) ppoll(&(0x7f0000000200)=[{r4, 0x8008}, {r2, 0x2441}, {r6, 0xa04e}, {r0, 0x1000}, {r0, 0x2}, {r0, 0x5010}, {r2, 0x2209}], 0x7, &(0x7f0000000240), &(0x7f00000002c0)={[0x18]}, 0x8) 07:59:38 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84027235000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x700000000000000}, 0x0) 07:59:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x7, 0x0, 0x0) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r1, 0x0, 0x0, 0x0) unshare(0x40000400) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x2, @private1, 0x5}, @in6={0xa, 0x4e22, 0xffffffe0, @private0={0xfc, 0x0, [], 0x1}}], 0x38) pipe(&(0x7f0000000040)) socket$phonet(0x23, 0x2, 0x1) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') 07:59:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0xffffffff}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x9, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1092.983547][T16538] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x800000000000000}, 0x0) 07:59:39 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84007435000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1093.044972][T16540] IPVS: ftp: loaded support on port[0] = 21 07:59:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0xb, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x900000000000000}, 0x0) 07:59:39 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84007635000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1093.362318][T16572] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1093.434355][T16543] IPVS: ftp: loaded support on port[0] = 21 07:59:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'macvtap0\x00'}) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xfffffffc, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "6b590e655b352ec146c412fb03495805dd40228c"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x2, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x70}, 0x1, 0x7}, 0x0) 07:59:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "023ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x2}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:42 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x7, 0x0, 0x0) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r1, 0x0, 0x0, 0x0) unshare(0x40000400) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x2, @private1, 0x5}, @in6={0xa, 0x4e22, 0xffffffe0, @private0={0xfc, 0x0, [], 0x1}}], 0x38) pipe(&(0x7f0000000040)) socket$phonet(0x23, 0x2, 0x1) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') 07:59:42 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84037835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xe00000000000000}, 0x0) 07:59:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x3}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "033ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x2}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1096.334476][T16653] net_ratelimit: 1 callbacks suppressed [ 1096.334490][T16653] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={r0}) sendmsg$NL80211_CMD_RELOAD_REGDB(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x50821008}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x0, 0x300, 0x70bd24, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8881}, 0x5) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') unshare(0x60060480) 07:59:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xf00000000000000}, 0x0) 07:59:42 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84007a35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1096.421361][T16659] IPVS: ftp: loaded support on port[0] = 21 07:59:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "073ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x4}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1096.612272][T16670] IPVS: ftp: loaded support on port[0] = 21 07:59:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x400b000000000000}, 0x0) [ 1096.689675][T16690] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:42 executing program 5: ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x66, @bcast, @bpq0='bpq0\x00', 0x7, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)=0x9) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000780)) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f00000007c0), &(0x7f0000000800)=0x4) sendto$unix(0xffffffffffffffff, &(0x7f0000000840)="a3fe05784d2ccc5dbaf42f5020231a3b8980ce6a3220ee5a6e1f0f2deff9ff888d871ac5f466d28860d38aa11194949577c51dbb87cc03a86a94b06a571aaaf5b121015167d3bc64ce46e43f175801ff83c60a35ab71d6a436305f03ddbc299894f65b19a74150af1df6c036498e6e18417f2a2563fae6cef1ba6c8d470c1b8096067b449779d796f6bfc61e7df0c866f9e711a1d77cf82a0b5528d0f99689182e8a28a35b", 0xa5, 0x80, &(0x7f0000000900)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000b40)={&(0x7f00000009c0)={0x16c, 0x0, 0x318, 0x70bd2c, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x1}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40005}, 0x4) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000bc0)='memory.events\x00', 0x0, 0x0) sendmsg$AUDIT_TTY_SET(r3, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x18, 0x3f9, 0x10, 0x70bd25, 0x25dfdbff, {0x1, 0x1}, [""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000040}, 0x8080) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000d00)={'veth1_to_hsr\x00'}) bind$bt_rfcomm(r3, &(0x7f0000000d40)={0x1f, @none, 0x6}, 0xa) sendmsg$NL80211_CMD_STOP_NAN(r3, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x1c, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1c}, 0x40) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000e80), &(0x7f0000000ec0)=0x4) socketpair(0x2a, 0x4, 0x4, &(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}) connect$qrtr(r4, &(0x7f0000000f40)={0x2a, 0xffffffff, 0x3fff}, 0xc) getsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000f80)=@assoc_id=0x0, &(0x7f0000000fc0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000001000)={r6, 0x66, "eacae10588e960137b6dda22d16450c28c0c24096647277c5863454635f57808d9b13a4be1193538aec0276ec122b05439429d2d616771f6d8b6f01c07f9a178ce24c926268478f54ea7a5fbbc92bd92627c4b4f02fdbebc753ab120b4296ad5ffe42635a653"}, &(0x7f0000001080)=0x6e) ioctl$int_out(r2, 0x5462, &(0x7f00000010c0)) 07:59:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "093ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:42 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84027a35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x5}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x6000000000000000}, 0x0) 07:59:43 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="220800d7", @ANYRES16=r1, @ANYBLOB="0400000000000000000006000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004000) 07:59:43 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84037a35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0b3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1097.144941][T16731] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:43 executing program 5: ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvfrom$inet6(r0, &(0x7f0000000200)=""/124, 0x7c, 0x40000000, 0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e35, 0x0, @local}, 0x1c) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@local, @in6=@private0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@private1}}, &(0x7f0000000000)=0xe8) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 07:59:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x9effffff00000000}, 0x0) 07:59:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x6}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:43 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84017d35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@setneightbl={0x2c, 0x43, 0x2, 0x70bd29, 0x25dfdbfb, {0x2}, [@NDTA_THRESH1={0x8, 0x2, 0xfffffffd}, @NDTA_NAME={0x7, 0x1, '-:\x00'}, @NDTA_THRESH1={0x8, 0x2, 0x80}]}, 0x2c}}, 0x0) 07:59:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a0bf2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1097.507784][T16755] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xf0ffffff00000000}, 0x0) 07:59:43 executing program 1: r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000000)=0x80) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x70, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x44}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x14}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x33}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x13}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0xd}]}, 0x70}}, 0x4000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b2a00) 07:59:43 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84038035000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x7}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xffffff7f00000000}, 0x0) 07:59:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x3, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1097.893373][T16771] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x8}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:44 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84028a35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xffffffff00000000}, 0x0) 07:59:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x13, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000d40)={'wg1\x00'}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000d80)={0x14, 0x0, 0x1, 0x70bd26, 0x0, {0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x4044015}, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_icmp(0x2, 0x2, 0x1) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000740)={'syzkaller0', 0x32, 0x38}, 0xd) unshare(0x40000000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r2, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000300), 0xfffffe8c) ioctl$FICLONE(r1, 0x40049409, r2) 07:59:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(anubis)\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000b00)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28012, r1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) ioctl$F2FS_IOC_START_VOLATILE_WRITE(0xffffffffffffffff, 0xf503, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r3, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000300), 0xfffffe8c) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r5, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000300), 0xfffffffffffffd29) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYRESOCT=r5, @ANYRESHEX, @ANYBLOB="be0bd7643151dfe738928feacdc226f375e03e205538abf0f948dcf0c801707cd6e5121e5010ae8ce2e7bea32db4574044f3bac4c4e1acce72fc7dd524a252f492a55329ee4e31af0610391a0d570b5a862632b00424f7bc23f15c9ed8c6d18eaa04d59d08e4edef9c72e27df16b8b15930c2250f5a089455b6b640ef871ab4656a3bb5c538b62cfcd2b286c48118931b347b3b6fa40539071668921dcea5f7d687ef66fbf125ab49f8e9a", @ANYRES32, @ANYRESOCT, @ANYRES64=r2, @ANYRES32, @ANYRES32=r3, @ANYRES32], 0xfffffdef}, 0x1, 0x300, 0x0, 0x4}, 0x4000) [ 1098.693795][T16791] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x2, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0xfffffffffffff000}, 0x0) 07:59:44 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84019c35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1098.923606][T16801] IPVS: ftp: loaded support on port[0] = 21 [ 1099.013122][T16816] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x2}, 0x0) 07:59:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x3, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:45 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84039c35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xb}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x3}, 0x0) [ 1099.397035][T16808] IPVS: ftp: loaded support on port[0] = 21 07:59:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x4, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1099.442680][T16852] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:45 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400a535000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x48}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:45 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = getpid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001500)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r4, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000300), 0xfffffe8c) r5 = epoll_create1(0x80000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r6, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000300), 0xfffffe8c) r7 = accept4$netrom(0xffffffffffffffff, &(0x7f0000001840)={{0x3, @bcast}, [@netrom, @bcast, @remote, @bcast, @default, @remote, @netrom]}, &(0x7f00000018c0)=0x48, 0x80000) r8 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r9, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmmsg$unix(r0, &(0x7f0000001c40)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000180)="769db509063c0bc83d312523b19b1ef449bc51bb9effcb8021ee0c2099935cafa53274717175f4fd61982083146cf6516484bb62f2ac8fc4a827f34d96b648af4876a2d428e3662eed9e8de548403a37b733636e0cd2b22373da94c995110b10738a30168153f5d770bfd60f7a78c2e9ada8cd43e38d995702", 0x79}, {&(0x7f0000000200)="ee6948b4b1f54e1298ab7cb94f755925ecaa08bc52db0fe39cc0cf279c8caeba5ee4947e41ac6efd173c5cd40a84dafbd1219ca0b58784fae86a9242ecdb24c9ca4fe8dd694b0972b2cf5be7eb38791ebcfa55b07edc31d0158339e634705dcebe8e7ce1df55add0ad8c6d8042bda2ea811ed96accbf64908eb7f6f0c9a5b4e7efb6d57bb4869472041db3b3d483e57afd252ac00263de2e8a22b6a0e0cd8bc0b2f3454b6e67727feaa246bc79efc69f124e6f5fb08f5f78f0318368ba7f74faeeb632aef6b45877d8cd547d637e5306e7a89603c7944b802a773026c0914df6a9", 0xe1}, {&(0x7f00000003c0)="96efc618bc824bac8d99b2cadfbf170b8fdf5e7a3e0106a6b04e1c6dc000f6343ee16b77089948f0555729f71e340a033b94d3e1a21470d42fb70c4b6f3c00ee80c015dcc63120d8fdb3bc6f35c71d3e1d87b7a6b7681b4a51359eb93d621ff933cf1f8e2f9ff52e422a74da9ec50ee088df0844b3d3fa00a2fd3ef87a83820be55f07a71bac1a2c4a217badb54d3b5268a913ab659a72ab2213a8831cbe3ef131dde6461cdeb2267f69", 0xaa}, {&(0x7f0000000100)="651f6fc12139765aa4cea5270b780bed4a974d", 0x13}, {&(0x7f0000000300)="c105f874a729f8c40540a642aa2013cb1dac49b559ec4329d540239f56bd3106e87ace3f39e5506cc24176a5dce7d6d15d76b41b62dd", 0x36}, {&(0x7f0000000340)="2910210da07d9d52bc36406d58e5b4ff91c8744d66e7aa651787036d9b99ba4b5d3c6fbd3d0351cfef33ff683fd1d130dab7525b", 0x34}], 0x6, &(0x7f0000000500)=[@rights={{0x24, 0x1, 0x1, [r0, r0, r0, 0xffffffffffffffff, r0]}}], 0x28, 0xc840}, {&(0x7f0000000540)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000005c0)="79801c37eb29ae3cbb39c91b0c5d7e16a8328e8f7ded156c0a9c6b5662b1cc8b55e8409aff3ca97e84520b94ffac01272b15a8763d5cf5d923652faadd54e4a0784ac253efe29edbf47bffd395266860ad27f1b01efdc40879e9eba120a16bee3001780464f4d34b2afdf482b219fe395e79b3bd6307eb3dc6269e0450cabfa1c2e93581a0d899efd52f602fa367b532b59d6f6619302e4a0daaa7eee239cb9388a4bf1c52c3a960245723af1579c32e9af32dda8e0cbbbae2759fe7288886dd4a21c1", 0xc3}, {&(0x7f00000006c0)="7f590cfc1a4266d3a3d38565cb3705f21117d8c4fd11c6554138c3b1a2705ec76fdc24210c84014b24a57dd59b1542e6c0bc592ea025688062b843d9626041e793", 0x41}, {&(0x7f0000000740)="af1c4608aa498f21d7186fb6b1400de0167f5bbe6ea2d368d541cc947cf8afe583924e0d8545cba6aa01d23fbd4ca92e336838dccb0348625caa56c0b4a8384cfefcd9d30234cda9e896b1a85374c6a5f6f1f894be6f6529f9391188e1d4f774a6bc47d0265c39", 0x67}, {&(0x7f00000007c0)="d9ff2a3dcd812b1015c02c1539113b48741ec1a7b02b06b550ac2e8c5aea2bcee5e05bd2e0a84364b9551a0a94ef7fa3dbbf4f69e26a513a562a5ca203518085375686be85aeb65445db010b4489bd59c785176dab69e83961bf914a5e6f6a499446f72a7b25a2cb35a9f664d50df6eeaf6be4764702e0026cb979548eb55b8dbec4cb6c1dc15ece380aa2921e29d18c8eb99aee83ec93a754dffbbc0c8f6703a2f2da5633e7821c6d6816c8f2e8d0adcfa78a4cb08e636c", 0xb8}, {&(0x7f0000000880)="71e1870ef965e361a003013f0f42582660f63d93bdef60a6abdb12d0cd0acf492f20f7a4c5135d73fb203cc7046229967bb4e9e1d4bf5fe50fad90c0034f76ab67a1f3b9772726f4eb7063ca086d145c7c4479cfe8f4827eaf90d9162bbc16e8572be28779a569f7e50de0d6e30a354da7d61c3e1ab084bb4f4ddf7cd98a22b6c832869f9ea09fc7c852ce0b72dcc1188ca47c55e4790ba1b1bc7930686d44156084f7472061b2c3dd934a6e39042060543394f10a212e35cd5adc554533eadcab01", 0xc2}], 0x5, &(0x7f0000000b80)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xffffffffffffffff}}}], 0x90, 0x40840}, {&(0x7f0000000c40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001380)=[{&(0x7f0000000cc0)="24af371d18085535ea8d8f6feda89c47bf11b5e9e4dcefc93212c0f24220e494b748e4a4e5877009a3a002e0fd51ad749fdc2928cd0c0c405108522907722ea287605704c89802940fad078d51b485647aa17b451b4977444a846d7d5f", 0x5d}, {&(0x7f0000000d40)="6f7b369fbf7f67cc0da3f41fe43f697c82d381675dca6f0558747e838e90baac972f1a18553512d3e4d67c35b417531ccf83fafaa21dc9f6eef6046218755999ed0a091cc255e60dbd760238a952d3697e4dfae636604575a8af6e4331893af477b7dc66fd96532a6a6a1311f6e31d6c3c65589284821ee79e3042f59fe2ccaec6cb641b6d6549498542cfce1b774ab2b225a0685dd14a7224b05f4ae30891e90418db29cde90eb551a37b8dcc5ee07b80b140a633e87356f2368bf32bb590fa4116d92cafdede", 0xc7}, {&(0x7f0000000e40)="79c7663f69a561d85db9115fe2c3d3f80c952a78531b29118f5e2e1edbe6f424ea6704741e91a7437f325b7c95adf6a02143efeb5e73b61ea4c465e362d7d06edbfab5b47ae2d740d93eaa3feb00f682c5356580645460372731903bee7f0b7e666b8006ee95116775b7b00b563f78c60cef73fd4aee3f47b640783d06832cda4d5e79f7e174a00579dfb7767c85645a54d2bf154a81d42d7cbca2787def6dec05", 0xa1}, {&(0x7f0000000f00)="aaafaf6d3cddcd4eeb33a46cf0db98e491db0118981b80ab40c13fe5ffcc02e6f4750035cf9e89b14acddc3fbf5b4722aebf0d205263363bc2bcc8ef9e7bd542b84f28b52d6b4a55133a68759d5ad2cfd61fe7f6feea5de5042647e0b0718e22ad622dca718cd8ab98f097083969cb961c7e66ed59e3c3dd5e320497aa7b6f210f7235c50f8691f1c0415368a95bd93bd24341de60973bb1b17f3b86100feb8b321d846b0889a155ac95ea91611e1b9a49312bbce4bfc51b488fa0f863c28713f50430895ff53d9c7b40885ea86edeafa875f5686b3d4fb39f66ed7f545da3f862c590bb8d", 0xe5}, {&(0x7f0000001000)="8151089a58acc550bf51efd6a5385e1e438a28597a39112891cc555595da86117ed564ec7093e53c9241dfc9869113df21cf0a21a2a4f2ec00605efc133a3949a12eb8444818415c80e1800a5292f370bf0843df7869ad1b8b2c0d080788c37cb06b6c3732cf040f373007051c2b019d7f7da57b86933def3b13853f88826d7bcda2578ad550545ad1742d91e6dff221f51e3266d654e01548cea30656b6b50e5083e363e18d84000b148b11eedc6f9fa712e5cff575babab652f482859380ae07a4b5c67a3bc47c8673345e98b767800749366358c85d8440ab0a8875f51ea7df1b87ad8d8d3bdb2e1f15c0e88e14", 0xef}, {&(0x7f0000001100)="6473c5ace2fd4050b9759bc7bae46195060fc34349016c18e4357ff2b5ecc651bfe4940e6140339791c91550784a1e390dee8fdfba767df2037c86251575918954cb58f09ad3d1a3a95481369c691f9996161015a23ddb40a7153c8b773fcdce0905a2c11023d021e7f9e90a0870f523", 0x70}, {&(0x7f0000001180)="377ef79c605a89c4a901406c1e57728bb5b5aebfe69e43e3e979ecd124ea95561f77cecb3d2b1d5a092dad3d0d875756d83648d0d1aafd2f70913deed25df2c11e768fd556eff5698cf177ca197281deb7d03d4f34cab87c383282da0f878329c74591da9d48f36ce37984d54f846637085e72deb33ea5ea7062ff719e526fcd235e7902a698636c39d37ddae3b33128fdaf4a4d63e525467a80d45bd7d80ece9ee7b441822f1a0dd7796c649c1b161eafcf", 0xb2}, {&(0x7f0000001240)="84ecbe21486281b1e22102afa9aa715e537689da6cc1dabf3270b016f3af7aae7c6372c4c291b519e7fc3936a04349c70c1592d0e93bcf0d19ea74b30e05026bfb34e7c57af890d56861b26712d075c0f78d3248294bfb1e7cddd1c46010c4f1b5f0644bbb7f15d10ac70670f148f09eb024d5f6c99abcdb458c3a490c782f2a393e589353cfdbf651d06f9834b72a50dcfd9023e1504632b1d65b6f3902bbe25ef67e2d09a2e23750a551e3c7076d563ae6e37dd6b2007f8a0e1667b781a45fdcd175d95f46272cd95ab68c622fe70c442585dd91581da30528c3ad39a748a6adee1a21472300bd4694bfacfdbb5fd8", 0xf0}, {&(0x7f0000001340)="b6", 0x1}], 0x9, &(0x7f00000019c0)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff, r3, r4, r5, r0, r6, r0, r7]}}, @rights={{0x10}}, @rights={{0x24, 0x1, 0x1, [r8, r0, r9, r0, 0xffffffffffffffff]}}], 0x70, 0x10}, {&(0x7f0000001a40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001c00)=[{&(0x7f0000001ac0)="fd3a3219d60210dc016e1f331f14928158516db93445a454e0dd4ef84ef5", 0x1e}, {&(0x7f0000001b00)="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", 0xfd}], 0x2, 0x0, 0x0, 0x8010}], 0x4, 0x90) sendmmsg$unix(r0, &(0x7f0000009c00)=[{&(0x7f0000000000)=@abs={0x1}, 0x6e, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000140)=']', 0x1}], 0x2}], 0x1, 0x0) 07:59:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x4}, 0x0) 07:59:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x5, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x60, 0x2, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000404) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f0000000240)={0x6, 0x7, 'syz1\x00'}, &(0x7f00000002c0)=0x28) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x88, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_TUPLE_MASTER={0x24, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @local}}}]}]}, 0x88}}, 0x0) [ 1099.854881][T16892] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x5}, 0x0) 07:59:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x7, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:46 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8401aa35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x4c}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x6}, 0x0) 07:59:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3e8, 0x1d0, 0x0, 0x0, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}, {{@arp={@remote, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'lo\x00'}, 0xc0, 0xe8, 0x0, {0x7600}}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}, {{@arp={@multicast1, @loopback, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team0\x00', 'veth1_vlan\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "1b1787fa5c4c6bff3c56612de26f4f6f845e58baf6fded8f4ac3a04c04000000000000001674b9e370cfc25b155cc7885a000000000000000000000000380300"}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x438) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r2, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000300), 0xfffffe8c) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000480)) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000440)={0xc143fd8cf7691aff, @multicast2, 0x4e23, 0x3, 'sed\x00', 0x4, 0x8000, 0x5}, 0x2c) [ 1100.248240][T16913] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:46 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8401ac35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x9, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f0000000140)) 07:59:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x7}, 0x0) 07:59:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x58}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:46 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8402ac35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0xb, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) accept4(0xffffffffffffffff, &(0x7f0000000540)=@nfc_llcp, &(0x7f0000000000)=0xa9, 0x40000) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) sendfile(r1, r0, 0x0, 0x10000002a) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="2b03000000000000240012800b00010067656e657665000014000280060005001091000005000a000100000008000500", @ANYRES32=0x0, @ANYBLOB='\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="87eef7653d60f6fddc8e"], 0x54}}, 0x0) 07:59:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x8}, 0x0) 07:59:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x60}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1100.792415][T16940] device geneve2 entered promiscuous mode 07:59:46 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8402b235000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002540)}, 0x4040) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 07:59:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x11, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x9}, 0x0) 07:59:47 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x104, 0x38, 0x8, 0x70bd25, 0x25dfdbfb, {0x1}, [@typed={0x8, 0x48, 0x0, 0x0, @u32=0x9}, @generic="9ee3d528fd078fd9638b5f46736d366a61555d7fd0b2763a6b8b7cd075d4635c30c5d02019137c8a96cc7d5bd6a4bb6ec89e4b19561ec230132c00bea737ea9dca8fa76c285abff441230886e06331cd366b3c4b15bc397e4cee57602a771e37824c51bad7906882cc3994bfcad109b97da6e124faf675cc68c85f3f0e4ab5cc9c8f17f8b4f1f91bfb8bb0dbaafeeba1ddb014ba0612d2b7fab204b1a7ca298c09c6ea0f7f8acfb3221ce85f8265b45dde1dba40289621937c6591594d5694ce4b265ff5a21dfa576dfdde17c206d4172dd2f1f6a5cd3a7cff5e76901dd26213e1910cb151"]}, 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x4000800) unshare(0x44000200) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) 07:59:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x68}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:47 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8403b435000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1101.384689][T16965] net_ratelimit: 2 callbacks suppressed [ 1101.384703][T16965] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1101.421024][T16963] IPVS: ftp: loaded support on port[0] = 21 07:59:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xe}, 0x0) 07:59:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x21, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:47 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8401b735000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x6c}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1101.675421][T16992] dccp_invalid_packet: P.Data Offset(68) too large 07:59:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xf}, 0x0) [ 1101.742217][T16970] IPVS: ftp: loaded support on port[0] = 21 07:59:47 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400b835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1101.791865][T17003] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendto$inet6(r2, &(0x7f0000f6f000), 0x0, 0x20004005, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty, 0x1}, 0x1c) r3 = socket$inet_sctp(0x2, 0x7, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000040)=0x7, 0x4) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_dccp_int(r4, 0x21, 0x3, &(0x7f0000000440)=0x4, 0x4) 07:59:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x29, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x74}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:48 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000000)=0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x74, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2c}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x20}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x5}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r1}, {0x8, 0x1, r1}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x4840}, 0x4000) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 07:59:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x60}, 0x0) 07:59:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x2b, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:48 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8403c435000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1102.158190][T17039] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xf0}, 0x0) 07:59:48 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8401c835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x7a}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x2c, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:48 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000017c0)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) close(r0) unshare(0x64020000) r2 = socket(0x2b, 0x80000, 0x3) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') syz_emit_ethernet(0x1e, &(0x7f0000000200)={@dev={[], 0x15}, @multicast, @void, {@can={0xc, {{0x4, 0x1}, 0x6, 0x1, 0x0, 0x0, "5df7c9151ee4de22"}}}}, &(0x7f0000000340)={0x1, 0x2, [0xd03, 0x798, 0x356, 0xc2]}) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x30, r4, 0xe01, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x70, r4, 0x10, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x26}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}]}, 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x20008009) [ 1102.550545][T17064] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x300}, 0x0) 07:59:48 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400ca35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x300}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1102.956748][T17079] IPVS: ftp: loaded support on port[0] = 21 [ 1102.959747][T17082] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1103.213290][T17072] IPVS: ftp: loaded support on port[0] = 21 07:59:49 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000000), 0x4) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000100)=""/4096, &(0x7f0000001100)=0x1000) connect$ax25(r0, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 07:59:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:49 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8403cc35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x500}, 0x0) 07:59:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x500}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1103.483667][T17134] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x600}, 0x0) 07:59:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x33, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:49 executing program 1: unshare(0x40000000) mmap(&(0x7f0000094000/0x1000)=nil, 0x1000, 0x1000004, 0xe031, 0xffffffffffffffff, 0x5c195000) socket$inet6_sctp(0xa, 0x0, 0x84) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000006100)=[{{&(0x7f0000000580)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000000700)=[{&(0x7f00000005c0)='D', 0x1}], 0x1}}], 0x1, 0x24040045) 07:59:49 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8402ce35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1103.597324][T17138] ax25_connect(): syz-executor.5 uses autobind, please contact jreuter@yaina.de 07:59:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x600}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1103.693810][T17144] ax25_connect(): syz-executor.5 uses autobind, please contact jreuter@yaina.de [ 1103.768228][T17146] IPVS: ftp: loaded support on port[0] = 21 07:59:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x700}, 0x0) [ 1103.818070][T17155] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r4, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000300), 0xfffffe8c) getpeername$netlink(r4, &(0x7f0000000100), &(0x7f0000000140)=0xc) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000005c0)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc, 0x1, 'ingress\x00'}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@delchain={0x24, 0x65, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x9, 0xffff}}}, 0x24}}, 0x0) 07:59:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x3a, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:50 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8403d535000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x700}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x900}, 0x0) 07:59:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x3b, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1104.189643][T17193] __nla_validate_parse: 2 callbacks suppressed [ 1104.189658][T17193] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1104.211519][T17146] IPVS: ftp: loaded support on port[0] = 21 07:59:50 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8401d635000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1104.233919][T17194] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xa00}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1104.475469][T17193] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1104.616090][T17234] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet(r0, &(0x7f0000001f40)=[{{&(0x7f0000000040)={0x2, 0x0, @private=0xa010102}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000080)='V', 0x1}, {&(0x7f0000000100)='K', 0x1}], 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="1000000000000000ff00000000000000"], 0x10}}, {{&(0x7f0000000280)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{0x0}, {&(0x7f00000003c0)="dd", 0x1}, {&(0x7f0000000180)='d', 0x1}, {&(0x7f00000002c0)="a0e844e1af165a6e5e465093f4b2aa3048ce7a7d5d52a2744f11d10af42c8fff1459b104824094c6c8c4eb0662d40d0581b0a7247b0188f7f443081e4c246ace86bd304054438490e5fa55a8bbf0dfd964eb787d1ca28063f656a04ceded892baad80b556ba67af484488b9b0db6647470e14f65b45543c795921850425e2ba22ad9c02aa9b04f3405916d80a3c0f7c821d7b3a03a7da256e23df91748418febadfd109ea99bf93b4de315ff68512504fba869caab120ddb8398040581a311ae08500093a2a49b66a03599ce6e26b7824125adada52970820b8d4386", 0xdc}, {&(0x7f0000000400)="221cfa0c976aa8aa7d124535fb31f7603750dfa3b706aa22fa6ebe8112c6e0010e64dd096903426be26ad61f62c68623115cb969a5f8bebedfa159a93a1c71fb285228bcef3cb4f9b4dcba2e38c1d12b241717b1b2a09c5b2848731a237560b583df5fc272e0de78ef3c910c6ed45d0949c200fead710c74d440de45add30bfa11665859213ef0b4dad513c90640ba2d818a6a5569e631c68e3b858e2841", 0x9e}], 0x5}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="ec0000000000000000000000070000004410b99c92865000000002000000de0000003f830ff7f21414bb0a010102e0000009070759e0000002892b82ac1e0001488e74efa02c64a9000000f4df000001e0000001e0000001ac1414390a0101020a01010001444c2d81ac1e0001000100007f000001000007ffac1414aa00000004ac1414bbf00000007f000001ffffffffac14143e00400000ac1414aa00000b7fac14141a00000009ac07000000000000002c3c818a01010200000009e0000002000000ff0a0101006d0f3830ffffffff1c0000007f000001000000018611ffffffff010b10ca9f413f218b9e7f01000000b6"], 0x150}}], 0x3, 0x4008851) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x3, 0x1, 0x9}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r1, 0x4) 07:59:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xb40}, 0x0) 07:59:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x3c, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:50 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8403d635000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r4, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000300), 0xfffffe8c) getpeername$netlink(r4, &(0x7f0000000100), &(0x7f0000000140)=0xc) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000005c0)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc, 0x1, 'ingress\x00'}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@delchain={0x24, 0x65, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x9, 0xffff}}}, 0x24}}, 0x0) 07:59:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xb00}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xe00}, 0x0) 07:59:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:51 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400da35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1104.934009][T17255] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 07:59:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x119b}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:51 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={r0}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000380)=0x4, 0x2) write(r0, &(0x7f0000000000)="05", 0x3f9b4) 07:59:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xf00}, 0x0) 07:59:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x2, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:51 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8402de35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x2000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x400b}, 0x0) 07:59:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$BTRFS_IOC_BALANCE_CTL(r2, 0x40049421, 0x1) ioctl$TUNATTACHFILTER(r3, 0x400454d4, &(0x7f0000000040)={0x0, 0x0}) 07:59:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x3, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:51 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400e235000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x6000}, 0x0) 07:59:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x4000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005c80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000005c40)={&(0x7f0000001f00)={{0x14}, [@NFT_MSG_DELSET={0x164, 0xb, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_TIMEOUT={0xc}, @NFTA_SET_ID={0x8}, @NFTA_SET_USERDATA={0x104, 0xd, 0x1, 0x0, "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"}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_TIMEOUT={0xc}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_NEWOBJ={0x1c, 0x12, 0xa, 0x3, 0x0, 0x0, {}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_TYPE={0x8}}, @NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_COMPAT={0x34, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV4={0x8}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8}, @NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8}]}, @NFTA_RULE_POSITION_ID={0x8}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_NEWSETELEM={0x1bdc, 0xc, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1ba4, 0x3, 0x0, 0x1, [{0x1ba0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x112c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x6d, 0x1, "a746c538fe63d80eaba773a9aba3dfa6266515e9b6044eb955e10dfd5f9a28ffce9e99fa8707efaf9d13c4be0aff938a49f35ea621139254ea99ff988216b606a4a7ef2b282a893ba45dce19928421f942dc33f04662c88187277d937631792bbb1ee7b1749a4f72ab"}, @NFTA_DATA_VALUE={0x1001, 0x1, "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"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x64, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0x29, 0x6, 0x1, 0x0, "bdb72741842b3b3416d287e60055f82ff6dcac6966a30334cc279041dba714e2144b8c77a3"}, @NFTA_SET_ELEM_DATA={0x298, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x75, 0x1, "f3b8b973ce1268b065ea3cea231269f23b4d1ec6df515ab997f15474c005adddf0ae31feaaedfb08e40b18689bb5d769d89f111aff19d777b06f00aa89663871599170aeae7dfdb434b360af00e61a10c8a7edf6c5395fecfb629ab0edf83f062f4ba57f34b938e5e65ab78e89f4df4a9f"}, @NFTA_DATA_VALUE={0x21, 0x1, "984280dc64cea5b8033443ab263295cd33705683cd6db11e3cfa0d96e1"}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x19, 0x1, "d28e974200005405059886acadea037359b17ab386"}, @NFTA_DATA_VALUE={0xa9, 0x1, "d20a0bd3c5be7f0210bccaff8f9b46a7243e11e641b90f3a6a9c2969b39d4b9a09605b7a714654f48815bf5b4a81807bdd84fc5beeff44283e505602adf50a0e887d72c4ef81cf28d89a09f42f87663f583500589ddf6a2cc16524e7f27395342b3d2a4ee35ecd098372d40aaa062fa9e1a5352739e208a2c847a5edca8f0db7f81819b3f9168075e235b2d3a1b43000fd95b93442ca761036e6be06427c68092a94f88cfd"}]}, @NFTA_SET_ELEM_USERDATA={0x7d, 0x6, 0x1, 0x0, "80a6687855d5b42fed92ba818bb09487b455c1ab555ee4e7f0f98f54bca51ca48f9dae231da484083c9d82ffc77f10e9062ff6f97601132eef56f156f79dc74f1c5676abdfb2e0f2fc98f2a979c69e34899e993472049f76bc6bc60cc8a33a807ffc45e3250aed9d352f7110675365c70ca03894ecbf643e6d"}, @NFTA_SET_ELEM_USERDATA={0x15, 0x6, 0x1, 0x0, "42f75621b3d132505723c6ad548988b0c6"}, @NFTA_SET_ELEM_KEY={0x710, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x75, 0x1, "dd89d193550cf75c694303c41100faf4d67b6bc0e14752673737e4c4c5c60546601d18da00426fddbc99ccab982eb7b760d5cb5348dd1651fc3a948562df283f34287ad793d0deefd77fca56561cea573c1dddcb2df06def85eff0b158065cedef7ff7c93c5ad289910f394cdfdc8729e6"}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x61d, 0x1, "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"}]}]}]}]}, @NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELCHAIN={0x20, 0x5, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWSET={0x14, 0x9, 0xa, 0x401}, @NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x801, 0x0, 0x0, {0xa}}, @NFT_MSG_NEWFLOWTABLE={0x20, 0x16, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x1ec0}}, 0x0) 07:59:52 executing program 1: ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000080)=ANY=[@ANYBLOB="060000000000000053cdb4c1ae23f37100000000000000000000000000000000000000000000000080000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000070000000000000000000000000000000000000000047cb655ee6a8b5239ec0ea009aba400744cec2ef15a5c57072a15c8f06ec9d8d853fc26d130ac705dd9d53ee69b69ca10c5edcd8cc91ea779d44c802f49df246ed7f9626ea096c4ab98331a0911480b184b554ee75a49917893578b511f447516a57288279d52b5329edd42039aa3106e2aec3cb7ad21a9171396005000000e0"]) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x2, 0x0, &(0x7f0000000040)) unshare(0x40040280) 07:59:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x4, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:52 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8401e835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xf000}, 0x0) 07:59:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x4800}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x34000}, 0x0) 07:59:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x4c00}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x5, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:52 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8403e835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1106.379062][T17331] IPVS: ftp: loaded support on port[0] = 21 [ 1106.529797][T17345] net_ratelimit: 5 callbacks suppressed [ 1106.529811][T17345] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x400300}, 0x0) 07:59:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x6, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:52 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8402ea35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1106.716733][T17363] IPVS: ftp: loaded support on port[0] = 21 07:59:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x5, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x5800}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xf0ffff}, 0x0) 07:59:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x7, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:53 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400f035000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1107.138143][T17399] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x1000000}, 0x0) 07:59:53 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84fff035000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x11, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x6000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r1, 0x40305839, &(0x7f0000000240)={0x0, 0x0, 0x2be20000}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f00000002c0)) pipe(&(0x7f0000000180)) r2 = socket(0x4, 0x80000, 0x0) close(r2) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000300)={r4}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000000c0)={r4, 0x3}, 0xfffffffffffffdcb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x23fa00) 07:59:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x2000000}, 0x0) 07:59:53 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400f435000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1107.502547][T17418] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x3c, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x6800}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x3000000}, 0x0) 07:59:53 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8401f635000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1107.807018][ T34] audit: type=1800 audit(1606377593.872:301): pid=17423 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="memory.events" dev="sda1" ino=16363 res=0 errno=0 07:59:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0xff, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1107.897794][T17439] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x7, 0x1, 0x7f, 0x6}, 0xc) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r4, r3, 0x0, 0x100000001) r5 = socket$xdp(0x2c, 0x3, 0x0) syz_open_procfs$namespace(0x0, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000880)={&(0x7f0000001000)=""/102387, 0x120933, 0x1000}, 0x20) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f0000000200)={"6f8d4a56189061ec88364e52b3aeecd6", 0x0, 0x0, {0x63, 0x9e49}, {0x7, 0xffffffc0}, 0xf5cf, [0x7ff, 0xd23, 0x0, 0x6, 0x10000, 0x52, 0x0, 0x2051, 0x9998, 0x66dfd670, 0x5, 0x1ff, 0x40, 0xff, 0x9, 0x7]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000300)={"749c3dc6ed07ba718ea2ee38a3e3f57c", 0x0, r6, {0x80000000}, {0x1000, 0x1}, 0x7, [0x3, 0x7f, 0x401, 0x7fffffff, 0x2, 0x1, 0x2, 0x100000000, 0x5, 0x76, 0xfffffffffffffff9, 0xfffffffffffffffc, 0x2, 0x1, 0x3, 0x4]}) 07:59:54 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8403f835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x4000000}, 0x0) 07:59:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x6c00}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1108.276324][T17456] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:54 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8403fa35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x5000000}, 0x0) [ 1108.364438][ T34] audit: type=1804 audit(1606377594.432:302): pid=17457 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir578001787/syzkaller.ZsHUAC/999/cgroup.controllers" dev="sda1" ino=16384 res=1 errno=0 07:59:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x7400}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x6000000}, 0x0) 07:59:54 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400fc35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1108.716236][T17471] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x7a00}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:55 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8401fe35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x7000000}, 0x0) [ 1109.033608][T17482] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x9b11}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x8000000}, 0x0) 07:59:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={0x0, 0xbc48}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r1}, &(0x7f00000002c0)=0x8) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000003140)={0x0, 0x0, &(0x7f0000003100)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000b06010300000000e00000000000000005000100070000000900020073797a3000000000100007800c000180"], 0x38}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000001) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x4c, 0x0, 0x7, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x37}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x269}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x36}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x81}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0xffffffffffffff0c}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) 07:59:55 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84fffe35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1109.351716][T17496] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x9000000}, 0x0) 07:59:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xe0ffff}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1109.525941][ T34] audit: type=1804 audit(1606377595.592:303): pid=17499 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir578001787/syzkaller.ZsHUAC/1000/cgroup.controllers" dev="sda1" ino=16371 res=1 errno=0 07:59:55 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84f0ff35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xe000000}, 0x0) [ 1109.722304][T17512] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:55 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84feff35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:55 executing program 1: socket(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) recvmmsg(r0, &(0x7f0000006680)=[{{&(0x7f0000001ac0)=@isdn, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001b40)=""/9, 0x9}, {&(0x7f0000001b80)=""/113, 0x71}, {&(0x7f0000001c00)=""/35, 0x23}, {&(0x7f0000001c40)=""/119, 0x77}, {&(0x7f0000001cc0)=""/19, 0x13}, {&(0x7f0000001d00)=""/252, 0xfc}, {&(0x7f0000001e00)=""/199, 0xc7}], 0x7}, 0x8}, {{0x0, 0x0, &(0x7f00000033c0)=[{&(0x7f0000001f80)=""/190, 0xbe}, {&(0x7f0000002040)}, {&(0x7f0000002080)=""/130, 0x82}, {&(0x7f0000002140)=""/66, 0x42}, {&(0x7f00000021c0)=""/73, 0x49}, {&(0x7f0000002240)=""/194, 0xc2}, {&(0x7f0000002340)=""/91, 0x5b}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x8}, 0x8}, {{&(0x7f0000003440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f00000045c0)=[{&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)=""/210, 0xd2}], 0x2, &(0x7f0000004600)=""/138, 0x8a}, 0x1f}, {{0x0, 0x0, &(0x7f0000005940)=[{&(0x7f00000046c0)=""/118, 0x76}, {&(0x7f0000004740)=""/4096, 0x1000}, {&(0x7f0000005740)=""/240, 0xf0}, {&(0x7f0000005840)=""/195, 0xc3}], 0x4}, 0x8}, {{&(0x7f0000005980)=@can, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005a00)=""/29, 0x1d}, {&(0x7f0000005a40)}, {&(0x7f0000005a80)=""/117, 0x75}, {&(0x7f0000005b00)=""/97, 0x61}, {&(0x7f0000005b80)=""/190, 0xbe}, {&(0x7f0000005c40)=""/20, 0x14}, {&(0x7f0000005c80)=""/138, 0x8a}], 0x7, &(0x7f0000005dc0)=""/128, 0x80}, 0x5}, {{0x0, 0x0, &(0x7f0000005f00)=[{&(0x7f0000005e40)=""/182, 0xb6}], 0x1, &(0x7f0000005f40)=""/178, 0xb2}, 0x5}, {{&(0x7f0000006000)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)=""/1, 0x1}, {&(0x7f00000060c0)=""/235, 0xeb}], 0x2, &(0x7f0000006200)=""/231, 0xe7}, 0x9}, {{&(0x7f0000006300)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f00000065c0)=[{&(0x7f0000006380)=""/235, 0xeb}, {&(0x7f0000006480)=""/22, 0x16}, {&(0x7f00000064c0)=""/208, 0xd0}], 0x3, &(0x7f0000006600)=""/107, 0x6b}, 0xd1d5}], 0x8, 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r1, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) 07:59:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x1000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xf000000}, 0x0) 07:59:56 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000400000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1110.068828][T17531] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x400b0000}, 0x0) 07:59:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x2000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x3000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x60000000}, 0x0) 07:59:56 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000003000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x9effffff}, 0x0) 07:59:56 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000005000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x4000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xf0ffffff}, 0x0) 07:59:57 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000006000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x5000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xfffff000}, 0x0) 07:59:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:57 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000007000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x6000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 1111.580353][T17595] net_ratelimit: 4 callbacks suppressed [ 1111.580368][T17595] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:57 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000009000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x7000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xffffff9e}, 0x0) 07:59:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1111.898726][T17608] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:58 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400000a000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x8000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xfffffff0}, 0x0) 07:59:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1112.218853][T17622] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x40030000000000}, 0x0) 07:59:58 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400000b000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xa000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) [ 1112.517129][T17636] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:58 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400000c000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xb000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x100000000000000}, 0x0) 07:59:58 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400000d000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1112.849622][T17653] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x20000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x200000000000000}, 0x0) 07:59:59 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400000e000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1113.170832][T17666] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x300000000000000}, 0x0) 07:59:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x40000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:59 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400000f000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x400000000000000}, 0x0) [ 1113.476340][T17679] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:59:59 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000011000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 07:59:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x48000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 07:59:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:59:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x500000000000000}, 0x0) 07:59:59 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000012000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1113.820717][T17694] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x600000000000000}, 0x0) 08:00:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x4c000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:00 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000013000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x700000000000000}, 0x0) [ 1114.184644][T17710] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x58000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:00 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000014000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x800000000000000}, 0x0) 08:00:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1114.489581][T17724] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1114.502565][T17723] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1114.566657][T17729] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x60000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x900000000000000}, 0x0) 08:00:00 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000015000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xe00000000000000}, 0x0) 08:00:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x68000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:01 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000016000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xf00000000000000}, 0x0) 08:00:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x6c000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:01 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000017000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x400b000000000000}, 0x0) 08:00:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x74000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:01 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000018000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x6000000000000000}, 0x0) 08:00:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x7a000000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:01 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000019000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 08:00:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0x9b110000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:02 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400001a000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 08:00:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xc0ffffff}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:02 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400001b000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 1116.556038][T17817] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xfdffffff}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xffffffff00000000}, 0x0) [ 1116.631208][T17819] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:02 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400001c000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1116.781292][T17824] net_ratelimit: 7 callbacks suppressed [ 1116.781306][T17824] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 08:00:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xfeffffff}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:03 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400001d000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:03 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400001e000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xffffe000}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2}, 0x0) 08:00:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1117.423892][T17855] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:03 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400001f000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xffffffc0}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3}, 0x0) [ 1117.644418][T17864] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1117.714435][T17866] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1117.725482][T17867] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:03 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000020000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xfffffffd}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 08:00:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5}, 0x0) [ 1118.093565][T17882] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:04 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000021000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xfffffffe}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x6}, 0x0) 08:00:04 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000022000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1118.454792][T17898] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x7}, 0x0) 08:00:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa, 0x0, 0xffffffff}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:04 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000023000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1118.832325][T17915] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8}, 0x0) 08:00:05 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000024000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x7a, 0x10}]}}}}}}}, 0x0) 08:00:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x9}, 0x0) [ 1119.153507][T17926] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:05 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000025000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x2}]}}}}}}}, 0x0) 08:00:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xe}, 0x0) [ 1119.425896][T17938] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1119.446043][T17940] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1119.491049][T17945] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x3}]}}}}}}}, 0x0) 08:00:05 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000026000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf}, 0x0) 08:00:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1119.811575][T17955] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1119.813043][T17956] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x60}, 0x0) 08:00:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x4}]}}}}}}}, 0x0) [ 1119.937192][T17960] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:06 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000027000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 08:00:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1120.157451][T17967] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1120.285114][T17978] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x300}, 0x0) 08:00:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x5}]}}}}}}}, 0x0) [ 1120.346377][T17971] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 08:00:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1120.391097][T17978] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1120.420652][T17971] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 08:00:06 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000028000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x500}, 0x0) 08:00:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x6}]}}}}}}}, 0x0) 08:00:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x600}, 0x0) 08:00:06 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000029000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x700}, 0x0) 08:00:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x7}]}}}}}}}, 0x0) 08:00:07 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400002a000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x900}, 0x0) 08:00:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x8}]}}}}}}}, 0x0) 08:00:07 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400002b000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xb40}, 0x0) [ 1121.465243][T18027] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x9}]}}}}}}}, 0x0) [ 1121.536143][T18029] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:07 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400002c000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xe00}, 0x0) 08:00:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0xa}]}}}}}}}, 0x0) 08:00:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1121.839795][T18042] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1121.898739][T18045] net_ratelimit: 5 callbacks suppressed [ 1121.898754][T18045] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1121.926803][T18047] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 08:00:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0xb}]}}}}}}}, 0x0) 08:00:08 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400002d000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400b}, 0x0) [ 1122.220783][T18056] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1122.260586][T18057] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:08 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400002e000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0xc}]}}}}}}}, 0x0) 08:00:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 08:00:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1122.570036][T18071] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:08 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400002f000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 08:00:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0xd}]}}}}}}}, 0x0) 08:00:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:08 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000030000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x34000}, 0x0) [ 1122.936907][T18087] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 08:00:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0xe}]}}}}}}}, 0x0) 08:00:09 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000031000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1123.257904][T18103] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 08:00:09 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000032000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x11}]}}}}}}}, 0x0) 08:00:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) [ 1123.609661][T18118] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:09 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000033000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x12}]}}}}}}}, 0x0) 08:00:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 1123.901928][T18131] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:10 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000034000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 08:00:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x2f}]}}}}}}}, 0x0) 08:00:10 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000235000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 1124.333568][T18148] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:10 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000335000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 08:00:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x7a}]}}}}}}}, 0x0) 08:00:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1124.654599][T18163] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:10 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000435000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 08:00:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) [ 1125.000329][T18178] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:11 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000535000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x2}]}}}}}}}, 0x0) 08:00:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 08:00:11 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000635000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x3}]}}}}}}}, 0x0) 08:00:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) 08:00:11 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000735000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x4}]}}}}}}}, 0x0) 08:00:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) 08:00:12 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x5}]}}}}}}}, 0x0) 08:00:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 08:00:12 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000935000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x6}]}}}}}}}, 0x0) 08:00:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400b0000}, 0x0) 08:00:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:12 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000a35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x7}]}}}}}}}, 0x0) 08:00:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 08:00:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:12 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000e35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 08:00:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x8}]}}}}}}}, 0x0) 08:00:13 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000f35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1126.965966][T18269] net_ratelimit: 6 callbacks suppressed [ 1126.965980][T18269] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 08:00:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0xa}]}}}}}}}, 0x0) 08:00:13 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84001e35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) [ 1127.399704][T18285] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:13 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84002c35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 08:00:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0xb}]}}}}}}}, 0x0) 08:00:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:13 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84003435000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1127.746760][T18299] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 08:00:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0xf}]}}}}}}}, 0x0) 08:00:14 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84004835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) [ 1128.111537][T18317] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 08:00:14 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84004c35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x3}]}}}}}}}, 0x0) 08:00:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x2) [ 1128.455275][T18332] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:14 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84005c35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x4}]}}}}}}}, 0x0) 08:00:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x3) 08:00:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1128.777539][T18344] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:14 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84006035000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x5}]}}}}}}}, 0x0) 08:00:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x4) 08:00:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:15 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84006835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1129.102908][T18358] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x5) 08:00:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x6}]}}}}}}}, 0x0) 08:00:15 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84006c35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x6) 08:00:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1129.459216][T18374] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:15 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84007435000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x7}]}}}}}}}, 0x0) 08:00:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x7) [ 1129.808276][T18386] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:16 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84007635000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x8) 08:00:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x8}]}}}}}}}, 0x0) 08:00:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:16 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84007a35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x9) 08:00:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1130.201622][T18405] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x9}]}}}}}}}, 0x0) 08:00:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xe) 08:00:16 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400a535000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0xa}]}}}}}}}, 0x0) 08:00:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xf) 08:00:16 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400b835000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x60) 08:00:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:00:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:17 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400ca35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xf0) 08:00:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x2}]}}}}}}}, 0x0) 08:00:17 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400da35000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x300) 08:00:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x3}]}}}}}}}, 0x0) 08:00:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:17 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400e235000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x500) 08:00:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x4}]}}}}}}}, 0x0) 08:00:17 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400f035000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x600) 08:00:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x5}]}}}}}}}, 0x0) 08:00:17 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400f435000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x700) 08:00:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x6}]}}}}}}}, 0x0) 08:00:18 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400003f000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x900) 08:00:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1132.162646][T18502] net_ratelimit: 7 callbacks suppressed [ 1132.162660][T18502] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xb40) 08:00:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x7}]}}}}}}}, 0x0) 08:00:18 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400005a000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xe00) [ 1132.498711][T18519] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:18 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400006b000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x8}]}}}}}}}, 0x0) 08:00:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xf00) [ 1132.786392][T18533] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:18 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a840003c0000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0xa}]}}}}}}}, 0x0) 08:00:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x400b) 08:00:19 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000002000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1133.057152][T18544] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x6000) 08:00:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:19 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000003000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0xb}]}}}}}}}, 0x0) 08:00:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1133.394258][T18563] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xf000) 08:00:19 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000004000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x48}]}}}}}}}, 0x0) 08:00:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x34000) 08:00:19 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000005000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1133.709650][T18575] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x400300) 08:00:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x4c}]}}}}}}}, 0x0) 08:00:20 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000006000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1134.008583][T18591] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xf0ffff) 08:00:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:20 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000007000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x58}]}}}}}}}, 0x0) 08:00:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x1000000) 08:00:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:20 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000008000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1134.363500][T18609] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x2000000) 08:00:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x60}]}}}}}}}, 0x0) 08:00:20 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000009000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1134.652246][T18622] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x3000000) 08:00:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x68}]}}}}}}}, 0x0) 08:00:20 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400000a000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x4000000) [ 1134.917010][T18635] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:21 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400000b000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x6c}]}}}}}}}, 0x0) 08:00:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x5000000) 08:00:21 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400000c000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x74}]}}}}}}}, 0x0) 08:00:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x6000000) 08:00:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x7a}]}}}}}}}, 0x0) 08:00:21 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400000d000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x7000000) 08:00:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0xff}]}}}}}}}, 0x0) 08:00:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x8000000) 08:00:21 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400000e000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x2}]}}}}}}}, 0x0) 08:00:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x9000000) 08:00:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:22 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400000f000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xe000000) 08:00:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x3}]}}}}}}}, 0x0) 08:00:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:22 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000010000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xf000000) 08:00:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x4}]}}}}}}}, 0x0) 08:00:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:22 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000011000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x400b0000) 08:00:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x5}]}}}}}}}, 0x0) 08:00:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:22 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000012000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x60000000) 08:00:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x6}]}}}}}}}, 0x0) 08:00:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x9effffff) 08:00:22 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000013000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xf0ffffff) 08:00:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x7}]}}}}}}}, 0x0) 08:00:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:23 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000014000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1137.195300][T18757] net_ratelimit: 9 callbacks suppressed [ 1137.195314][T18757] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xfffff000) 08:00:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1137.248129][T18759] __nla_validate_parse: 9 callbacks suppressed [ 1137.248143][T18759] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:23 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000015000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x8}]}}}}}}}, 0x0) 08:00:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xffffff7f) 08:00:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1137.512308][T18770] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xffffff9e) 08:00:23 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000016000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xa}]}}}}}}}, 0x0) 08:00:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xfffffff0) 08:00:23 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000017000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1137.802855][T18786] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xb}]}}}}}}}, 0x0) 08:00:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x40030000000000) 08:00:24 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000018000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1138.096976][T18803] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xf0ffffffffffff) 08:00:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x48}]}}}}}}}, 0x0) 08:00:24 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000019000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x100000000000000) 08:00:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1138.361875][T18815] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x4c}]}}}}}}}, 0x0) 08:00:24 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400001a000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x200000000000000) 08:00:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1138.631309][T18828] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:24 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400001b000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x300000000000000) 08:00:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x58}]}}}}}}}, 0x0) 08:00:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1138.869484][T18841] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x400000000000000) [ 1138.926780][T18843] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:25 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400001c000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x60}]}}}}}}}, 0x0) 08:00:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x500000000000000) [ 1139.205009][T18860] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:25 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400001d000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x600000000000000) 08:00:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x68}]}}}}}}}, 0x0) 08:00:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:25 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400001e000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1139.496715][T18873] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x700000000000000) 08:00:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x6c}]}}}}}}}, 0x0) 08:00:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:25 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000021000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x800000000000000) [ 1139.728250][T18885] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x74}]}}}}}}}, 0x0) 08:00:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:26 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000022000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x900000000000000) 08:00:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x7a}]}}}}}}}, 0x0) 08:00:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xe00000000000000) 08:00:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:26 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000023000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x300}]}}}}}}}, 0x0) 08:00:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xf00000000000000) 08:00:26 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000024000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x500}]}}}}}}}, 0x0) 08:00:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x400b000000000000) 08:00:26 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000025000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x600}]}}}}}}}, 0x0) 08:00:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x6000000000000000) 08:00:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1140.732582][T18943] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x700}]}}}}}}}, 0x0) [ 1140.804599][T18947] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x9effffff00000000) 08:00:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:27 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000026000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xf0ffffff00000000) 08:00:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xa00}]}}}}}}}, 0x0) 08:00:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1141.095554][T18959] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xffffff7f00000000) [ 1141.161288][T18963] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xb00}]}}}}}}}, 0x0) 08:00:27 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000027000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xffffffff00000000) [ 1141.408511][T18977] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1141.463613][T18973] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 08:00:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x119b}]}}}}}}}, 0x0) 08:00:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0xfffffffffffff000) [ 1141.541484][T18977] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1141.563753][T18973] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 08:00:27 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000028000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x2000}]}}}}}}}, 0x0) 08:00:27 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000006040)={0xffffffffffffffff}) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000006180)={&(0x7f0000006080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000006140)={&(0x7f00000060c0)={0x50, 0xe, 0x6, 0x801, 0x0, 0x0, {0xc, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004801}, 0x40004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r1, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:28 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000029000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0xe8, 0x0, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x2}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MLSLVLLST={0x80, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4406b9dd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x69705f06}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x90f7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xab}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc5}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xcd88e22}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e3ad6b4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x81}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0xe8}}, 0x20000051) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000003100)={r1}) sendmsg$IPCTNL_MSG_CT_DELETE(r2, &(0x7f0000003200)={&(0x7f0000003140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000031c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000201011600000000000000000c01000a06001240000300001cb732cc59dba0a2b6fdf66272"], 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x0) 08:00:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x4000}]}}}}}}}, 0x0) 08:00:28 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400002a000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x4800}]}}}}}}}, 0x0) 08:00:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1142.405838][T19024] net_ratelimit: 11 callbacks suppressed [ 1142.405851][T19024] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:28 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400002b000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c000000170a0104000000000000568269439d001900010073797a3100000000000000000000000000000000cfce88324a16d44f0a93135451a97a074312b7047ea629de27ce406b666de5b18d9767311b94fcf89c00"/96], 0x2c}}, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80) [ 1142.553602][T19030] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x4c00}]}}}}}}}, 0x0) [ 1142.624836][T19033] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1142.646649][T19034] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1142.685276][T19033] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 08:00:28 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400002c000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1142.761676][T19040] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1142.912203][T19045] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x5800}]}}}}}}}, 0x0) [ 1142.975313][T19049] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x14, 0x17, 0xa, 0x401, 0x0, 0x0, {0x2}}, 0x14}}, 0x50) 08:00:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:29 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400002d000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1143.102261][T19053] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x6000}]}}}}}}}, 0x0) [ 1143.225423][T19060] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1143.246636][T19062] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:29 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400002e000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1143.378708][T19065] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x6800}]}}}}}}}, 0x0) 08:00:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x10, 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x100, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x2400c011}, 0x80) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000000)={0x8c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0x6c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_DEVS={0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'caif0\x00'}, {0x14, 0x1, 'veth0_to_team\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x400}]}]}, 0x8c}}, 0x0) [ 1143.482132][T19071] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1143.527510][T19074] netlink: 32998 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1143.605327][T19077] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:29 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400002f000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0xc, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40800}, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x8000, 0x9e}, &(0x7f0000000040)=0x8) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x1, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x40894) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={r1, @in6={{0xa, 0x4e21, 0x4, @mcast2, 0x4000}}}, 0x84) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) getgid() r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x5}, 0xc) ioctl$BTRFS_IOC_FS_INFO(r2, 0x8400941f, &(0x7f0000000380)) 08:00:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x6c00}]}}}}}}}, 0x0) 08:00:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:29 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000030000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1143.897635][T19092] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x20008010) 08:00:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x7400}]}}}}}}}, 0x0) 08:00:30 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000031000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:30 executing program 3: setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000000)={0x2e, 0x0, [], [@generic={0x1, 0x2, "bfa8"}]}, 0x10) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000040)={0x110, 0x17, 0xa, 0x401, 0x0, 0x0, {0x3}, [@NFTA_FLOWTABLE_HOOK={0xf0, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'batadv_slave_1\x00'}, {0x14, 0x1, 'bond0\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'macvlan1\x00'}, {0x14, 0x1, 'caif0\x00'}, {0x14, 0x1, 'veth1_to_team\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'team_slave_0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x110}}, 0x0) [ 1144.262308][T19109] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:30 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000032000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="980000000b060108000000000000000002000003500008800c00078005001500840000000c00078005000300010000000c00078005000700040000000c00e08008000840000000200c0007800500150013000000100007800c00148008000140ac1414bb2c00078008000b400000800008000a40000000001800168014000240fe8000000000000000000000000000240500010007000000"], 0x98}, 0x1, 0x0, 0x0, 0x8015}, 0x4004009) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x0, 0xb, 0x401, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x40448d1}, 0x8000) 08:00:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x7a00}]}}}}}}}, 0x0) [ 1144.484584][T19121] nft_compat: unsupported protocol 1 [ 1144.540047][T19128] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:30 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000033000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, 0x2c}}, 0x0) 08:00:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x9b11}]}}}}}}}, 0x0) 08:00:30 executing program 3: ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x3ff, 0x0, 0x6, 0x7}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:31 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000034000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1144.900943][T19141] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:31 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) 08:00:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xe0ffff}]}}}}}}}, 0x0) [ 1145.228755][T19151] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x0, 0x3, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010100}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, ';)L\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @remote}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x2f}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private1={0xfc, 0x1, [], 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x20000034) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x280, 0x17, 0xa, 0x401, 0x0, 0x0, {0xc, 0x0, 0x4}, [@NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HOOK={0x78, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xffffffff}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ip6tnl0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HOOK={0x1b0, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x400}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'wlan1\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0xb8, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth0_to_team\x00'}, {0x14, 0x1, 'macvlan1\x00'}, {0x14, 0x1, 'veth1_to_hsr\x00'}, {0x14, 0x1, 'netdevsim0\x00'}, {0x14, 0x1, 'batadv0\x00'}, {0x14, 0x1, 'veth1_to_bond\x00'}, {0x14, 0x1, 'veth0_to_bridge\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'syzkaller1\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xb8, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'caif0\x00'}, {0x14, 0x1, 'wg2\x00'}, {0x14, 0x1, 'wlan0\x00'}, {0x14, 0x1, 'veth0_to_team\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'macvlan0\x00'}, {0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth0\x00'}]}]}]}, 0x280}}, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 08:00:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x1000000}]}}}}}}}, 0x0) 08:00:31 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400005a000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x2000000}]}}}}}}}, 0x0) 08:00:31 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400006b000511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:31 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a840000c0030511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x3000000}]}}}}}}}, 0x0) 08:00:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:32 executing program 3: sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xfc, 0x0, 0x300, 0x70bd25, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x9}, {0x5}, {0x6, 0x11, 0x3}, {0x8, 0xb, 0x8000}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x80}, {0x6, 0x16, 0x2}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x8}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x2}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0xd8b1}}]}, 0xfc}}, 0x11) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x28, 0x17, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_FLAGS={0x3, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x2400c000}, 0x4000084) 08:00:32 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035040011d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x4000000}]}}}}}}}, 0x0) 08:00:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000280)={0x4001}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, 0x16, 0xa07, 0x0, 0x0, {0x0, 0x0, 0x300}}, 0x14}}, 0x0) ioctl$sock_proto_private(r0, 0x89e6, &(0x7f0000000000)="d7bc22f3cf56cbe4d593ac2a78831da94e109a3d5f8397b9f1802fdb49ce0812129c881ddb394d88d17543ecedd5e70a69915e353fa32373338c95c65a0b75484fc6692281f15a131f2fce381469e0a5fb45770daef8e16d5106aba2363f897146c83361d019964fb9d9b54258e1d2a02fd9c7dfc6b34f27fdcfbc20157ad05fd74a34a747743f441c0ec27edc75b3a43e4d5d9abb6edeca0473adb502c0bf068490fe4f5213") sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:32 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035020511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x5000000}]}}}}}}}, 0x0) 08:00:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000002580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002540)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2468, 0xc, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x5}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x1d8, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x6}]}, {0xb0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0x40, 0x6, 0x1, 0x0, "1306b28e085100b04accdceebd74b730c24c5c6d80d0cefa8990408cebdaa37cf0dcf5c596b21095337549e88792e8724d884b8985bfa2df0ccf9fc0"}, @NFTA_SET_ELEM_DATA={0x54, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa, 0x1, "ba8e09516a26"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x1}]}, {0x114, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x104, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x93, 0x1, "b3e66333a58bc3d7e3f29a7f6bbfb2c469be364efda00d4285ab63021d9d2f3c04ca23fd37606df2917a4fb5bf0c8bee0df1f651d02da2e0ff997ba566f5a2c9b3be3a23e8f65d941ad15fa93818479d7b8885e5ac7297b2b337dab0090606896e741cd777425f8a23c4b81b6ee96f737e39b2291c1efb1fa60624b0195ea1d2d4bacfa4ef335ad25b3f23b5c97675"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x5}]}]}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x2268, 0x3, 0x0, 0x1, [{0x290, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x280, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0xe9, 0x1, "d9d3e00b09dbde80649182870c7d7bb749126af5ad4d580c8ae0105e7f5131c2d8e649c911347ead095d35c426721ec0f60e03259e40d4fe76c1e31d0fe9eec8ae082ee8a6bd3fd2148b17f937c94c4519fe639b2984493486a6621566126e454e0f27e684a41a91304d30d23cee0a0ba93c4e46f6a9f6f29784bf04439d7526aae0c8420fd4f0a0a7d9e3a1a035cb961fa9edecf6a93746b19bf4011dc3b0b0953ba143f006d0880c3c5b5ee7edc0b24f6465ebc663faf31451374e41e1ced1cc31a51c8960d5d13a4a7016591869c5f110f0a9e07471eb29ad595bf55e3e769ee2d65e64"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x800000000000000f}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0xbe, 0x1, "aee5944d6d4ee5a45cbc5ad8a708599fd9111bc1eefe9d3b40627b119077355ec9105d068bd2e5219ce0ef088b3842e75f6e812d9ec8d855da988d5137617c4cee9aea00c817f1c84c75a1ebdad2ffca763f9afcef00f53cfa2458084a4a90cba20cf91035b3fb080ec1725d0b4dbbd38a23a660b364d1af912c1c674c4bceec8f24dcada63ebeb5dbfdd4998b98365ec2667ac02583f9da6f72a65ec2fc179ffd3eaafd1b58c0bdb6fda6490e912f3f4e19f14024bae39593ca"}, @NFTA_DATA_VALUE={0x54, 0x1, "e6992105874e2c2faf2ee265d13da8baa33286af899e4217a6b0e0abdb54a57735b19d99ade9960ff8e9333e648e359980e70ddb41ddbd08fd6e51e4baba2948aeb8cf28ded71077ecd73085ba2ac1e5"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xbb}]}, {0x1658, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x102c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}]}, @NFTA_SET_ELEM_DATA={0x33c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x19, 0x1, "03efc5d01f4c27e6909e0f924d14d1930e088edae9"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xc3, 0x1, "49e1785b81c7aeadab07640eaf247564818ab9997eacbc1ff1d0e201780b185e9b4e6080ebbf9617c9074970725616aec9e98c05dc5a2e0567c6dd8434de7e3de6af12ff84f5a93da98e83c9abff3bde34706be8e3019c11855cf5a49273843cf5789e48ea7658df9d05c5b66504d22774396f56b30551b4b37b5f2de86e8f013af31d82bb7a20d7328b9ade675c07e20ab2900cf31f6b1cc6ba53429a479e70ea803db96702fd213c768ffa200b51b8845be5c9bea9b7d7b2e35993fd6e84"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x71, 0x1, "116c81c36029a46f5d589c41e149257ae36b8e50679c5e8a0abdbf643145abacc223b90d177ba7758db8df15ae3af14d14710b7f21af8363ed490602a9a8b9f89104d65ef64d1e0990a91be67c2b97f61608098df133acebd0677942d30155df8a8dbf8e4be1276d2ae76e4e63"}, @NFTA_DATA_VALUE={0xa, 0x1, "f4874e90b7d7"}, @NFTA_DATA_VALUE={0x3e, 0x1, "b0aabb91fced99cba10bfaa99bb1d3a38c47f5630fac6fdc51b79f50ad5aed6c602525a2620f7e753866e08bd29e5851162585c73800847bdaad"}, @NFTA_DATA_VALUE={0xba, 0x1, "42c9b7607d4a29eb074a2c002a2bcb9e5d2558346cbae78dfabec97b792d0a81a6df14832bc4a47466423e38198be999d5c46f1bd9b657a16fc5cbf67113d593a9e9cb3c93cad5714248aa83f5b7a653f19475c9651c638618870d0fb4e6812f4e132cfe556ed6d090cc5e179217e9c3b71ac97ba564758ef71e8620c0e0865512e4d5f6b6162c9bc5d0f961127f150c8da91b99147e128321ebf24d18c0c37ec8e2711cad6a614f8d03a5ef8f45c2c625fed7b5a51e"}, @NFTA_DATA_VALUE={0xbd, 0x1, "025d6b61e88fade7a3bdc306ea81ab7033ec3cae5d38b54f5046cf112723d2a95747b938b13c6b6ac891362875d0645b6f9e2acf6dd9313d01fd5edff5242677a39ba5a1c1897c9c7501e91080b6082b9f32fbc63b76a8359d64f93cea8b3fd53ed3b94f6708259313a02a5276dec0658cff89ff26395298c0213d43bc51b89618b791ae4f3ac841434ef0c6f722ca1daa258e34c191585a3ecdbef3f4fdc2cb5b2743403159f17dab70cff4920ba6782b7aa0d471e95acb6f"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_DATA={0x64, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5f, 0x1, "57b5c83ef773c3dfe80f525986b91ae790c657c0b6a28d831ef92adef93e2381e17988332e61e53e613370c1844ac8eb594ac30921d4f16f8949b8e4cd21c65f7d729a54673c4eb9755a9b2d09534127f43387ae1adba53540620e"}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_USERDATA={0x49, 0x6, 0x1, 0x0, "f95cfc3d21f9dc4aa62e70f4095afb98bf89e224cc09dd9374da76aa4cc4338f7123c491a0e810fb4ff76c6dab71f608a422372f9a47e435db87117746965c6c343f827d7c"}, @NFTA_SET_ELEM_KEY_END={0x17c, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xed, 0x1, "254bdbb4a83e9676a99ddd8b347008a7d4d5020142c7c9ca74f5bc955293dbd1fd78f2d5a468b9c53d20feedf626c5a166898d5d3792fdc9b35c8720a636fc46b3856d868f14b35656c930e7e72268633c2df3ffd08bcc2f2023ac3a51cc076cc9b34ce6245c2a5c303b4a4c785cf67f1893c290fb5dc43b09ee883c1aaf9034518e32c6305a1a59b7b76255200a98a98952c55e4843afbd7e04925b35ed91609d4b50514435ee07f8ed95992e2fe733de5bfc2292582186c3941e5679e800a691bfd6f263bd4bcb259ecbdaecf1371a0831b13ede73d3de87489695d245d893db721b332ee6ca7c21"}, @NFTA_DATA_VALUE={0x1f, 0x1, "cbe3264659eaf24857bd1a8d8c224049298202c735c676aaf24c6f"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x4}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_USERDATA={0xab, 0x6, 0x1, 0x0, "0f5f499e79d0b79e056f364dc052c352ea40575fe000c8fe210d8ab4e24f1e5af306a673bb9d27d809106e00ca515747af67b4b6ba84021eac59a1051f6fa55186139b24ae835681af6cf988099e0773474289cff8cd7970f0a4d60a5f1d7ecd4fad4b3cbbb3052c093af661b5d902ff4bc84db75e2762da02815a3d2ca9a415e8a7edaede60c063c0167f60a5d35150219dfdd220ff4eed77a024866f0dbfafa9429a09e2695c"}]}, {0x6b0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_DATA={0x338, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xff, 0x1, "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"}, @NFTA_DATA_VALUE={0xcf, 0x1, "e418d58e7f46524c9c0fa88158bbba5fe17ccebd429a71038f451bfbd6869af58693b4597000c31634d065024918f3f17c0711ee54dbaa084de402dcf154a935c30fc0f50715127bbd9861790e514b85d3ce6d2a60f974ed6ad765dcb2f7396bcc8ac9ddd02107c26fcc7151f6ff180addd7620b43da6b49df4452faa3ef80314f9811f90b3596a2ae4267068ecf0665a9e7723c7874e1ee3c20d5803da6b9dab60d291cd5cdcb0c748e44afc6f3abfbfcd7188baa6a76e173569f64b83b478bab82531641c0be0fe1455a"}, @NFTA_DATA_VALUE={0x5, 0x1, "a5"}, @NFTA_DATA_VALUE={0x43, 0x1, "9c814ab1244aaeced025fdd7e76f1463777b9d08997e22a7686117d599976d4dcbb8ddf18c3e15d24478f3445559907f2c7ef64251f3207580be1bd5da4793"}, @NFTA_DATA_VALUE={0x88, 0x1, "da15f78b8a21e4a5ea8720e1f0057fbcec06fa9a59e4057b0efe9537331e5379ea3d79608ac6c0989676b3eab64030ce2ae0a0858efbe8f1dbc8217cad3145410a757d896b723cc2769883ee5d7c3a37c80af9429fb2330b150fff9496a46e11b895559faa98bc870ff3347fd80f604beec1479a8885998064b3e5daa54ff11d4e2c2ae1"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}]}, @NFTA_SET_ELEM_DATA={0x1c0, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x5b, 0x1, "a933d25225e62ad169d782817591e1ac0574dca56f20f8d0d5e13dd30b4d1ac805c46bcdb044d6db7fa29a460bd321a4e850a248c71ef579f731e972b162c0392562df61343801142842b77f152ccbac6bfd9e19c39508"}, @NFTA_DATA_VALUE={0x5f, 0x1, "17076d1b00607d0d791f3890862b1917a933659aa1c6119df060ae3d1c5cf04ce7d2ec72472afa04717396cb82b32921d344d05546aca2d7aa5cf6a714130fe11ce5cc955a33bf9a424feb7c587583d530f6c2c14dd327a3a7b364"}, @NFTA_DATA_VALUE={0x40, 0x1, "ce9f5e545a19ce89153ec7cc58e970fc743131656477ee4c12d8c57d0a9b227131830fe502f659b2822a9695a91353436f6878b45c1faf825f67b8e7"}]}, @NFTA_SET_ELEM_DATA={0x114, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc7, 0x1, "196af7450ea5d96415e2f567a8c768f694f8e367be772c193119f1a03af4b4b4d06be6911d7bc559a5cd7e7cea9f101da1622408aa84211e07e67a9a58cbf8c40bfaece61e49e380e804319bab1674950689cfb9d2553e1de7c7f6a9cc1ac46da3eab8332fe906daed86292ba6499ec519f25c29ef20c2c347af95cac19364ca702db7e1a2a4a2dbb84127564437b33625eeba51737f544a63c860fb196addf1e158c0fdef1c14d58e79d64cce0c990929743b15f0f3e625e18e59ec52a01263063600"}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}, @NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_DATA={0x98, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x7c, 0x1, "1b27c505ca4b09e0527669b5865f0b1675d643e654605eee68db2f7ae4ccf808a2d3d256fc6fc1fb9faa2bf346104f1fcf2ab96040ae646efe3b5abfd8f2a63b53cad0ff93cd6a867189e46574bf997002f553f5b68cee9774f9e39cf572ffc3352b95e4ec98e66d0a5b82bfe925e8cb1456059cf1668935"}]}]}, {0x19c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_KEY={0x18c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xfd, 0x1, "274dafafba772bddfb95d6ad4b1913296204c241090b90584728fab3633d02c3b4741c4dd38fed9e840cfa7dd8c034667cfd733dbaf829da7b3bb5bebd35c7a49d8569bb6c4dff10620c66bd102545443e89bd95df24342690330164058929019d994dc5effcf263bec1fb83d0a2c82d54a2080ec00c9847b97a178623670e13bce17a97133e98f689d9300cd7ac29ebe01cf5b429c819b34ecd14bb0d185d8ee29db356750c5f45048a7af6ba62c495ea8c1ff5f9343f9c55a8572cd6f4cf52a23fb11d676dfce9f134075f3b265a4f4c06dd15365c9a217433778da7919b46c1fd1c83e453327c5f86f0b266cf667caccf4331ae953e0ace"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x7b, 0x1, "5fa0d25cb15b7d99b69565b207273b204c113306868bf3e203cc5240ee11ea8e172dad307a9617c0efaf472ec5da5131300fe62321ce70f292045cf13a77541f9cae1720649a7585cf42db79e6aeda7257194eb980537ab17c0406c27f7d85a176689060028e7c90cbbb948d16119fb746c388fb1ede32"}]}]}, {0x130, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x100, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x68, 0x1, "3ee67a3ed30e03132aba0fccfe3750007744b859968b66dfaafa3d5b52e0e9b3ac940b0a2bc1ec2c414f35d2789fd2a062ba91cbbc884e7754d0edd7d9ec4f2fb8cc452d73c734fa1459d5a4dbe0af571c53eb7942ee81d221e068d60c8012b906bf57b7"}, @NFTA_DATA_VALUE={0x93, 0x1, "5c91c2ad8dfcef135c68f57eb832fb0fdb04fa4b67ad2e3d1d180f0f16764171014406461c4bcb7f8e098a1b3ff5beaf1a2fad2879854f290d98b13ed8d57ff4e99aed975663622b16f54c38954f10f79d1c47203a1ed76387131a6c259812874e0ea83f6d144a30fdfb20d70ebd5b268c6a43b1be429584bd0d5d4deb7a31e9df792c45d51edb5020b9591899118e"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x81}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_FLAGS={0x8}]}]}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_NEWTABLE={0x40, 0x0, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x4}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x24d0}, 0x1, 0x0, 0x0, 0x1}, 0x4010) 08:00:32 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035030511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x6000000}]}}}}}}}, 0x0) 08:00:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000000)=ANY=[@ANYBLOB="44000000170a01020000000000000000000000000900000073797a31000000000900020073797a31000000000c00059c0d000000000000050c0005400000000000000004"], 0x44}}, 0x0) socketpair(0x25, 0xa, 0x80000001, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000001c0)=0x401, 0x4) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, 0x1, 0x4, 0x101, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x6}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x7205}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040020}, 0x8000) 08:00:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:32 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035040511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x7000000}]}}}}}}}, 0x0) 08:00:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="000000ff000100000908010073797ac1ffffffffffffff0073797a31ecffffff"], 0x2c}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x503, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8015}, 0x4000) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00\r'], 0x28}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x1, 0x0, 0x74000000, {0x0, 0x0, 0x3, r4}}, 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'syztnl0\x00', r4, 0x0, 0xc7, 0x4, 0x2, 0x2, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80, 0x1, 0xb91f, 0x31e}}) 08:00:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x8000000}]}}}}}}}, 0x0) 08:00:33 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035050511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1147.040854][T19242] bridge0: port 3(veth67) entered blocking state [ 1147.067332][T19242] bridge0: port 3(veth67) entered disabled state 08:00:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1147.098443][T19242] device veth67 entered promiscuous mode [ 1147.119791][T19252] device veth67 left promiscuous mode [ 1147.129713][T19252] bridge0: port 3(veth67) entered disabled state 08:00:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xa000000}]}}}}}}}, 0x0) 08:00:33 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035060511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xd0, 0xa, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x40, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x17}}}, @IPSET_ATTR_COMMENT={0x6, 0x1a, '+\x00'}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvtap0\x00'}, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x7}]}, @IPSET_ATTR_DATA={0x58, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR2={0x5, 0x15, 0x24}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x80000000}, @IPSET_ATTR_COMMENT={0x6, 0x1a, '@\x00'}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x1d}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz1\x00'}, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xe00000000000000}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0xd0}, 0x1, 0x0, 0x0, 0x800}, 0x4080010) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="2c000000170a0104000000f0000000000000010073797a310000ee0cf4db00000001000000000000"], 0x2c}}, 0x0) 08:00:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xb000000}]}}}}}}}, 0x0) 08:00:33 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035070511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1147.505188][T19280] net_ratelimit: 9 callbacks suppressed [ 1147.505202][T19280] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1147.600240][T19286] __nla_validate_parse: 12 callbacks suppressed [ 1147.600254][T19286] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 08:00:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x20000000}]}}}}}}}, 0x0) 08:00:33 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035080511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1147.686236][T19286] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 08:00:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:33 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000006ec0)={0x28, 0x0, 0x2711}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r1, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) [ 1147.835819][T19294] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:34 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035090511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x40000000}]}}}}}}}, 0x0) 08:00:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001040)='/dev/net/tun\x00', 0x101000, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000000)={0x67446698, 0x1, 0x4, 0x4, 0x2, "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"}, 0x1010) 08:00:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:34 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a840000350a0511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1148.122180][T19309] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x48000000}]}}}}}}}, 0x0) 08:00:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:34 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a840000350e0511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:34 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x7, 0x2, 0x3f}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r1, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) [ 1148.416331][T19324] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x4c000000}]}}}}}}}, 0x0) 08:00:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)={0x5, "9aca4a"}, 0x6) 08:00:34 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a840000350f0511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1148.720379][T19340] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x58000000}]}}}}}}}, 0x0) 08:00:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000040)=@buf={0x0, &(0x7f0000000000)}) 08:00:35 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a840000351e0511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1149.033740][T19354] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:35 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a840000352c0511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x60000000}]}}}}}}}, 0x0) 08:00:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1149.359951][T19372] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:35 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035340511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="2c000000170a01040000000000000000000000000900050073797a31000000000900020073797a3100000000"], 0x2c}}, 0x0) 08:00:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x68000000}]}}}}}}}, 0x0) 08:00:35 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035480511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1149.647786][T19384] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1149.678176][T19385] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='devices.list\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0xe, "23b36cd142aa820b626560ea28ec"}, &(0x7f0000000080)=0x16) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) splice(r1, &(0x7f00000000c0)=0x6, r0, &(0x7f0000000100)=0x5ef, 0x6, 0x3) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x6c000000}]}}}}}}}, 0x0) 08:00:36 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a840000354c0511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1150.001502][T19399] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:36 executing program 3: ioctl$SIOCPNADDRESOURCE(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)=0x6) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x74000000}]}}}}}}}, 0x0) 08:00:36 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a840000355c0511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000000)=ANY=[@ANYBLOB="2cc38e5f96e8483d8cd09245782a9264000000170a01040000000000000000000000000900010073797a31000000000900020073797a3100000000c01186355232aeb093a28d7f83842fa03c07b813f7771d2367f20c5fdaad20f8434e7ebefc98a1029407da1c1d4b392a8d56c88d5b9f328b75ebdf844a8c5d29e12a503d427169a15c5586e8d495046c1120b60399bb0b684d3aa9f8eaf8495bcb0f000000"], 0x2c}}, 0x0) [ 1150.269124][T19413] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:36 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035600511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x7a000000}]}}}}}}}, 0x0) 08:00:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[], 0x2c}}, 0x40880) 08:00:36 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035680511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x9b110000}]}}}}}}}, 0x0) 08:00:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:36 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a840000356c0511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xc0ffffff}]}}}}}}}, 0x0) 08:00:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:37 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035740511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, 0x140b, 0x2, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x220000c5}, 0x20000000) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c000000170a01040000000031faffffff0800020073797a3100000000000000000000000000000000000000da23d7b2bd3299d8bbe6d3b3dca12af157bc124fc94cafd34b5ce98ad12a38c475fba8d6656f5f631c449adec9135e231b1c1922a686084d1f29cbafc0f5ed4528db657a41949d3bbc5d1f8eb46a351b708fd6cd794a174f2e72fde39004aa280aa13f458775ac7cffbd8883efc3192260f5bebb1cac98eb7a50dedf9f7c423ca623e39b5dd41c4072d7c306463cb6cc26a69750d6cd4ac222c0a33c974c126735693b31845d8f6702bffb5a28c9315f64b49fdab01df7ea925960bd42f41981222876871ba377c301c6278dab2cfc96cc67483c13c31924c80eb0384f4b6f521406226d45876fb198df5a5dc405b7b2547cacd20ef3592155fe43232e8f11d685a128f6178d150ddf6c9f6b786edc1ed319a1682289fc581dc5ebac40012c585429898b9bd40b6d70bf245ce64e337b596908fcdee7a0733acc711b93393d8a98926828f9daefe8e98e2956149fba1b33f75b75688c71e36785ed5a3010df3743b298966280997994eb3cfec21b4aee0716e8"], 0x2c}}, 0x0) 08:00:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xfdffffff}]}}}}}}}, 0x0) 08:00:37 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035760511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1151.317974][T19467] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 08:00:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xfeffffff}]}}}}}}}, 0x0) [ 1151.391756][T19472] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 08:00:37 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a840000357a0511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0x7f}, 0x8) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002c00)=ANY=[@ANYBLOB="00000000170a01040000000000000000000000000900000000000000000000000900020073797a3100000000"], 0x2c}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000100)=0xbedffc6, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'macvtap0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="1a00000007f4ffffbed4a37b092e6914c2256ae2dce0ada2c48aabadb128060000bece573da0aa98dcc1788510"]}) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000140)=0x3, 0x4) 08:00:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:37 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035a50511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xffffe000}]}}}}}}}, 0x0) 08:00:37 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r0, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000300), 0xfffffe8c) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000140)=0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r4, &(0x7f0000000180)={0x80000005}) sendmsg$NFT_MSG_GETFLOWTABLE(r1, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000040)=ANY=[@ANYBLOB="dcf2153b1020fb2bfa6762a725d106c05d8977061d41a7b18b64dd4b78ef35be344968c9063b8aca2a777870e2007d70a210868d86a095efd0140bfe54aa20c422436be1764a64b0422d54ac4100e9a287e379797d370b9b8c976bcf57d9be007057f2020302408771bad69269249e2de3c813356309d71b52fe62b5faa499dbbfdc65535859b4afd42f77d4f250d3f0b0ac7202122a14e99774c67c3c0659d73f2109f14996132e3a", @ANYRES16=r0], 0x2c}, 0x1, 0x0, 0x0, 0x84}, 0x0) 08:00:37 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035b80511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xffffffc0}]}}}}}}}, 0x0) 08:00:38 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035ca0511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xfffffffd}]}}}}}}}, 0x0) 08:00:38 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035da0511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xfffffffe}]}}}}}}}, 0x0) 08:00:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0xc2bd}, &(0x7f0000000040)=0x8) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c000000170a01040000000000000000032300000900010073088fc94e80efa500737900"/57], 0x2c}}, 0x0) 08:00:38 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035e20511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1152.633414][T19528] net_ratelimit: 8 callbacks suppressed [ 1152.633435][T19528] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:38 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035f00511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1152.842227][T19540] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 08:00:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xe0ffff00000000}]}}}}}}}, 0x0) [ 1152.988837][T19547] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1153.051510][T19540] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 08:00:39 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035f40511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x100000000000000}]}}}}}}}, 0x0) 08:00:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$isdn(0x22, 0x3, 0x24) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x0, 0x5b}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x90}, 0x20000015) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="a0ac7bfebd280c28ba9e64aa467171da", 0x10) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYRESDEC], 0x2c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="840000007fcc9944897f9951b4d2c557c08809f1c224796d24e28acdab3f090d53b2f07fb6c3ba897dd7dc164d866b1675e12ac001ca37c862d998b7372b307402085e66d189d8ddc13fa9d7c87c494f9c40b26618f831835babdb8a5240f8de709562c3332bff56734fb82c3f0afca4b852f5865b8aede396425b96284dfe3d7989c881535ed9124247deb4e899b25816fd0a9e991c24459c3121f392e7700712a53185500a3d0876302f94f6bd8ba224a696ce7e37ea7ea2174daa9b9d0a248d114d97115d99654f0bf4a7f3dd38fc6d484f930630c4bf96df72940ba8432be4e2f72706026c813200000000", @ANYRES16=0x0, @ANYBLOB="000427bd7000fddbdf250500000014000200ff010000000000000000000000000001050001000100000008000400ffffffff08000500ac1414bb14000600766c616e30000000000000000000000008000400ac14140b14000200000000000000000000000000000000011400060077673200"/126], 0x84}}, 0x8840) 08:00:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1153.325308][T19560] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:39 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000611d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:39 executing program 3: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r0, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r1, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000100)=0xf6) 08:00:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x200000000000000}]}}}}}}}, 0x0) 08:00:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1153.559957][T19574] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:39 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000911d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x3}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000840}, 0xd2eb30529b747130) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000000)=ANY=[], 0x2c}}, 0x0) 08:00:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x300000000000000}]}}}}}}}, 0x0) 08:00:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1153.792413][T19583] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1153.811359][T19584] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1153.837549][T19583] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1153.900081][T19590] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x400000000000000}]}}}}}}}, 0x0) [ 1153.956255][T19590] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:40 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035001411d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1154.120427][T19596] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000009180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000091c0)=0x14, 0x80000) accept$packet(0xffffffffffffffff, &(0x7f0000009200)={0x11, 0x0, 0x0}, &(0x7f0000009240)=0x14) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000009300)={'syztnl2\x00', &(0x7f0000009280)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x22, 0x0, 0xb2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x2d}, 0x8000, 0x40, 0x3, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000093c0)={'ip6tnl0\x00', &(0x7f0000009340)={'ip6tnl0\x00', 0x0, 0x2f, 0x2, 0xf3, 0x1dac, 0x41, @loopback, @private2={0xfc, 0x2, [], 0x1}, 0x30, 0x80, 0x6, 0x2}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f000000b440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f000000b400)={&(0x7f0000009400)=@newchain={0x1fcc, 0x64, 0x4, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xfff3, 0x10}, {0x0, 0xf}, {0x2a54a3e0c066e33f, 0xfff1}}, [@TCA_CHAIN={0x8, 0xb, 0x6}, @filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x1af8, 0x2, [@TCA_RSVP_ACT={0x1634, 0x6, [@m_csum={0x1bc, 0x7, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x90, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x10000, 0x7, 0x20000000, 0x4, 0x4}, 0x17}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9673, 0x7fff, 0x3, 0x8, 0x1}, 0x6}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1, 0x7ec, 0x7, 0x2d, 0x7f}, 0x78}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x6, 0x4, 0x2, 0x5, 0x6}, 0xf}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x4, 0x6, 0x7, 0x2, 0xfffffffa}, 0x68}}]}, {0x103, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x5, 0x2}}}}, @m_nat={0x1f0, 0xb, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0xcc, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x8, 0xffffffff, 0x20000000, 0x5, 0x3ff}, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x0, 0x9, 0x20000000, 0x800, 0xd3}, @local, @remote, 0xff000000}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x7, 0xe3c, 0x20000000, 0x100, 0x9}, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xff, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x3ff, 0x1, 0x0, 0x4, 0x5}, @broadcast, @loopback, 0xff000000, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xff, 0xa9, 0x2, 0x8}, @empty, @local}}]}, {0xff, 0x6, "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"}, {0xc, 0x7, {0x0, 0x9ea62199a1cc42ec}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_tunnel_key={0xdc, 0x3, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_NO_CSUM={0x5, 0xa, 0x1}]}, {0x9c, 0x6, "526c523fe87c1143087862167b90a098d175589efa99f1c872aac66905fce1b7d56729c4043d4f52a2b38fc59a331c8dcaec998719d3398dffcde2748b3187123d2b760a639be8868cfcfdb25c843523b0ed417c9eaaebad584100d854ec0c5c65a4cd7844160db62b90734953bb6f1a63c249f03afd8c7feeb000487de2ecb8cd21b73094424dc147c6a1aafb24f647ece503a8809d9b68"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}, @m_nat={0x111c, 0x1c, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0xf4, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x7f, 0x800, 0xffffffffffffffff, 0x2, 0x61be}, @empty, @private=0xa010100}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x800, 0x9, 0x8, 0x1, 0x7}, @remote, @rand_addr=0x64010101, 0xff000000}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xfff, 0x6, 0x10000000, 0x6, 0x3ff}, @loopback, @remote, 0xffffff00}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x3, 0x2, 0x20000000, 0x1, 0x33617942}, @private=0xa010102, @rand_addr=0x64010100}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x0, 0x3}, @multicast2, @empty, 0xffffffff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x461987ec, 0x0, 0x0, 0x9, 0xda5}, @broadcast, @local, 0xffffffff, 0x1}}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}, @m_csum={0x8c, 0x1, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x58, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x1, 0x4, 0x20000000, 0x0, 0x800}, 0x6a}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x4bd, 0x3, 0xffffffffdffffffc, 0x5ab2, 0x75accd6b}, 0x47}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xb957, 0x80, 0x8, 0x80000000, 0x3}, 0x22}}]}, {0x9, 0x6, "9691d50724"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_RSVP_ACT={0x4c0, 0x6, [@m_mpls={0xcc, 0xd, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x8, 0x0, 0x5, 0x8d0, 0x78}, 0x1}}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}]}, {0x6b, 0x6, "21979c600ec7fb7df4e2a176587f81086e4620fe98866c9c42e6d4d679af5c1f2eb3b3311a20f2d645beb284d9e6014b06a9a404a8614c1c2996ae57b2107882fab256e5b205a0532f7902523d1e605accf413bf0a9ed1514a14e17a123771dd8da7a2b939e81a"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x4}}}}, @m_mirred={0x1e0, 0x13, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0x144, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0xd905, 0x5, 0x20000000, 0x2, 0xffffffff}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0xfffffffb, 0x0, 0x80000001, 0x2}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x2, 0x800, 0x5, 0x800, 0x1f}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x1, 0x2ab, 0xffffffffffffffff, 0x6, 0x7}, 0x4, r1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x4, 0x80000000, 0xffffffffffffffff, 0x2, 0x1}, 0x1, r2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x101, 0x3, 0x0, 0x7, 0x4}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0xebf, 0x8, 0x9d9a, 0x4}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x7ff, 0x1, 0x0, 0x81, 0x3}, 0x2, r3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x2, 0xfff, 0x3, 0x200, 0x100}, 0x3, r4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x7d2, 0x4, 0x0, 0xffff, 0x3fd4}, 0x2}}]}, {0x73, 0x6, "bcfe09983794e7dda978f023e5196b16c6ae4b20483116eac51e87782bf6d7f3ba6fe4313701780958b299d58bdcba4f750b9dfa2482c3fe48a6b8517cf3a1d0767703cf3cc5ec588ba6d36e1b8a0fb858826e1311ed989e00a1a667b4a676d7248e73285efa3617685c5d9ff9d1d0"}, {0xc}, {0xc, 0x8, {0x3}}}}, @m_csum={0x188, 0x2, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x90, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x2, 0xffffffc0, 0xffffffffffffffff, 0x7fff, 0x4d}, 0x2d}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x5, 0x6, 0x10000000, 0x8001, 0x9652}, 0x3a}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x18, 0xffff8000, 0xffffffffffffffff, 0x2, 0x3}, 0x7b}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x3f, 0x9, 0x6, 0x2, 0x5}, 0x15}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x7, 0x9, 0x4, 0x80, 0x3}, 0x36}}]}, {0xcf, 0x6, "8dddb1fdadc48a48a85f0b2d9f1e098971c62ccc37d1a6dd30915a4ae4fca71b28932a671350a21c97d8129b33c53c2055afd5614a446f5167ca1587248783073ecba35a57050d5ed7b0f7227cae73376104fc1bf0b29e4eb0fa806ec494c3064539725b7e5bf4dcb717e6b165334aaff3a0546dd7ffa4c91f650d122e404ab61632bd79b3aa8a7e4e5696a17e60f689ea56ad251dcf56b7b6b81548d7697e2459d18a611a1515e5306e9637b261d2e6997087f2bcf97f8e83fb8889e47b43c3b36adb2f14ae7c2d1b920d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_vlan={0x88, 0xf, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x590}]}, {0x51, 0x6, "3628f5bd6ebab6bdc2c93602e278a3cf8525ef801f9c197b12d0550a027a1edf650c5c83987f0765e8de202adf26dcd02064cc95be684e8a9e0302010cad3b7b35b85ff9611f2398f6389870a0"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x8, 0x5}}, @TCA_RATE={0x6, 0x5, {0xff, 0x3}}, @filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x480, 0x2, [@TCA_RSVP_POLICE={0x47c, 0x5, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x5}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x8}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x10000, 0xd067, 0xf22b, 0x452, 0x5, 0x6, 0x6, 0x100, 0x1000, 0x9, 0x6, 0x1, 0x1, 0x0, 0x3, 0xdd, 0x400, 0x3, 0x0, 0x8, 0x5, 0x4, 0x7, 0x7, 0x1ff, 0xaf2, 0xfffffffb, 0x76, 0x9, 0x1, 0x5, 0xffff, 0x9, 0x6, 0x8, 0x2, 0xfffffffc, 0x8001, 0xfffffffd, 0xc9, 0x8, 0x4, 0xa62, 0x46, 0xfffffffc, 0x8, 0xb87, 0x9, 0x101, 0x3, 0x4, 0x1, 0x401, 0xff, 0x1000, 0x2, 0x4, 0x1, 0x20, 0x7, 0x4, 0x3, 0x6, 0x4, 0x5, 0x81, 0x7, 0x0, 0xfff, 0x96, 0x80000000, 0x5, 0x1, 0x9be5, 0x3, 0xff, 0x7fff, 0x2, 0x7f, 0x9, 0x4, 0x8, 0x80000001, 0x8, 0x7, 0x5, 0x20, 0x1ff, 0xfffffffd, 0x3, 0x4, 0x1, 0xf01, 0x5, 0x9, 0x9, 0x4, 0xe474, 0x9, 0x3, 0x100, 0x7, 0x90000000, 0x2, 0x8, 0x7, 0xbc5, 0x7, 0x12496ba, 0x7, 0x9a2, 0x9, 0x6bdd, 0x6, 0x8, 0xfffffffd, 0x20, 0xb22d, 0xfa, 0x8, 0x3, 0x5, 0x9, 0x5, 0x0, 0x6, 0x80, 0xfff, 0xd63, 0x3, 0x1000, 0x8, 0x43, 0xff, 0x2, 0x10000, 0x0, 0xc1d, 0xc87, 0x3, 0x0, 0x5, 0x6, 0x80000000, 0x4, 0x200, 0xffffffff, 0xffffff2c, 0x80, 0x379, 0x2f, 0x1000, 0x4, 0x20, 0x5, 0x10000, 0x0, 0x2, 0x2, 0x0, 0x81, 0xbc, 0x0, 0xfff, 0x80000000, 0x8000, 0x3, 0x2, 0x5, 0x1, 0x4, 0x29, 0x1, 0x4, 0x1be8, 0x3, 0xd8c2, 0x1c, 0x8, 0x5, 0x6, 0x9, 0x80000001, 0x7, 0x5, 0xd28, 0x1, 0x4, 0x7, 0x4, 0x800, 0x0, 0x61c5, 0x16, 0x8, 0x1000, 0x7f, 0x7, 0x401, 0xffffffff, 0x4, 0x2, 0x9, 0x1ff, 0x3, 0x40, 0x2, 0x2, 0xfff, 0x0, 0x400, 0x7, 0x80, 0x1, 0x4, 0x6, 0x8, 0x0, 0x3ab86555, 0xff, 0x15, 0x3, 0x3, 0x4b, 0x0, 0x8, 0x401, 0x1f, 0x3f, 0x8dff, 0x40, 0x1f, 0x101, 0xa9fb, 0x200, 0xfffff801, 0x5, 0x1, 0x7, 0x0, 0x1, 0x7fff, 0x1f, 0x1800, 0x1b06ecc8, 0x62, 0x6, 0x8000, 0x8, 0x8000, 0x5, 0x1, 0x6, 0x7, 0x4, 0x7fff]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x1ff}, @TCA_POLICE_TBF={0x3c, 0x1, {0xfff, 0x10000000, 0x1, 0x0, 0x7f000000, {0x0, 0x0, 0xa3, 0x5, 0x0, 0x80000000}, {0x9, 0x1, 0xfc01, 0xd97, 0x9000, 0x2}, 0x9b8, 0x7fffffff, 0x1ff}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x1000}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x80000000}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3}]}]}}]}, 0x1fcc}, 0x1, 0x0, 0x0, 0x555e47e56bc0ddab}, 0x10) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x500000000000000}]}}}}}}}, 0x0) 08:00:40 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035003511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r1, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x50}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010101}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'macvtap0\x00'}]}, 0x44}}, 0x810) 08:00:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1154.461661][T19612] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1154.527278][T19614] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1154.556142][T19614] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x600000000000000}]}}}}}}}, 0x0) 08:00:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 08:00:40 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035005a11d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1154.764054][T19625] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000000)={0x1, 0x6, 0x200}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r1, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:41 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035006311d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x700000000000000}]}}}}}}}, 0x0) 08:00:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1155.051579][T19641] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1155.073813][T19642] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1155.103865][T19641] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xe8, 0x1, 0x3, 0x401, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFQA_CT={0xc, 0xb, 0x0, 0x1, [@CTA_MARK_MASK={0x8}]}, @NFQA_EXP={0xc8, 0xf, 0x0, 0x1, [@CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x2}, @CTA_EXPECT_MASTER={0xbc, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0x28}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0x17}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x9a}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4}, 0x20000804) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x800000000000000}]}}}}}}}, 0x0) 08:00:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:41 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035006b11d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1155.344790][T19655] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1155.388247][T19657] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1155.421926][T19657] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xa00000000000000}]}}}}}}}, 0x0) 08:00:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x26, 0x4, 0x80000000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x30, r3, 0xe01, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000002cc0)={0x359c, r3, 0x400, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_NAN_FUNC={0x1238, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SERVICE_INFO={0x8c, 0xb, "2a199500f4ad75a890c01f0efac4ae14a01d45049f33485d6e47421bdd2e1227a3a9c3fe9eec53c92836aea743fb2876ac7dce74787c903bd08ef1e8c4916e575af70c575054b3caa05f05c738255bb1715c1723dc075eac625bf6c71d9f7b2bc5af4a930af4f1feb819298304584af0673c6102e9c9b4d28a9addc3d797043dbdfafec7fda95c7d"}, @NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE={0x4}, @NL80211_NAN_FUNC_FOLLOW_UP_DEST={0xa, 0x8, @broadcast}, @NL80211_NAN_FUNC_RX_MATCH_FILTER={0x1190, 0xd, 0x0, 0x1, [{0xbc, 0x0, "e85068e6f2151622446c84341c3b5d27a3fed33d8738a25fe866447e7b06ffcfa25378d42a565ba09f2579abc9a4c76c0ce656677b931150dbbb63bd7bf6ff54f90b5f376aff82ffa7c24c729b40638eb48000174894952da45e9b57bd85433090de2ca68b65ca2c5bc1475e1497e38a6df4539f5a6e1c11473161c1c3892540a1d2de3fae4e1efccef04b4ca9e4c96157558cfb8984b2ca9017075631054fdccff6c893a43a3732c8df21aa16ffd65014147db9d50ae43c"}, {0xca, 0x0, "1cae6e5112b19ed0c4aef860f3b7b5a2e32ce1a47d3148195db8661e3289eb2044e16fe26e94f95caa4c89523896b287a64c3e531f3a1aa8ae455d5e2a72c4a33032a8f649088b364c41aa2987440508b374567a266239ed916d175ded3d0ff6110aabb803ad3bb2a289273d68de7903873dda3e066ead2e38f677cd940a0f69f2a1963a550052f2c41e7b5ed952fca6bf5c87e679e02383a864e5a7ad895e2c5678ad0da6467b31471118c82c64a8037bfedf6bf057f9865bec43b1ea8419e7170e859479c6"}, {0x1004, 0x0, "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"}]}, @NL80211_NAN_FUNC_TYPE={0x5, 0x1, 0x1}]}, @NL80211_ATTR_NAN_FUNC={0x28c, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SRF={0x164, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_MAC_ADDRS={0x4c, 0x4, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa}, {0xa, 0x6, @broadcast}]}, @NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_BF_IDX={0x5, 0x3, 0x2}]}, @NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5, 0x7, 0xbd}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0x110, 0xe, 0x0, 0x1, [{0x31, 0x0, "f78d1d5a959d93c5578ec6362fb6d9177aa81d2c5351afae0ced5f0007b0d09fb3c257821339da277bd23f6834"}, {0xac, 0x0, "52f7c0d88876a34f6dfb4b70f8453397ba44dfbdc6e5e8e498802cdcde8fcc9d2017b3d87c3df40aa8d9bef8e23d86815aef7a229c560b91c755a498da00187d4858d534646498d7a10553af44513c7438eb7f6614380fee31fbbeba94107b9370896a6696e686a8ccf47c4595ba318b34704c3b4488d417fc0af50f3f9c0da8136c731b47ea326f9b62de6691865798dc9f976e5420e9df57f059041b63eebb1bb9fcb1cf9fcd3b"}, {0x2c, 0x0, "7a55c272eb2c6aa9ab4b5a1696561e8454f18f6bcf15e7948fe1383a17c500d6ee1cd77f43f2b3f1"}]}, @NL80211_NAN_FUNC_TTL={0x8}, @NL80211_NAN_FUNC_PUBLISH_BCAST={0x4}]}, @NL80211_ATTR_NAN_FUNC={0x238, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_RX_MATCH_FILTER={0x190, 0xd, 0x0, 0x1, [{0xdc, 0x0, "cd17c9d149204723dde16c173ba9418ebc7f92cbaa2b65988d190954d25863328a24172f91144b43e6b060ae00d0f517934dcbf06382f0a046644bc0921b4dba5445cfa51c52219ca08161f4820bc3640a7a41eb9b9eff0ee3acb6ff59ec267ca4b38f92c33a6577b9f5e9ca52ea5eb042d8f884085d312685d6c5066126f8c08b47b3667e06b719b0ad2a1e047fe3b54721d94853771086c4f9905f14fc7d0fa8ae946ec859bc7520f442d2cca1b80715b99d98286c1226b774cd62fcc82d756c60cbd8e8997d48895f7ca5c232e565c953637c2614de33"}, {0x4}, {0xaa, 0x0, "edad6cbfd6798745ef46903ba571a6c59020e2813424aa1576750a5710035f5dbd3b32d481600976cfc3f78472f4a2d423901e27e85af44b2951f833f7034cca7daa011c66c0dc363d54073775d209220a670c9941783b73cdbb439e63bb6e2114021f1a5b071aef817713e3cafbc642a5cfadcd23c04f62d9e408bbe6eae0ddbaaa1f7846590e8cfeadc031759d20f4218bdd3432aaaa50b02daa0fb04498277079b0e53bc0"}]}, @NL80211_NAN_FUNC_SERVICE_INFO={0x9a, 0xb, "f08c2576e9f59f32071a99271c39c1d8e82fedeb52119f4242e9354961e1a8804f9ac1779d0db1952d2e5232b6f11603eb9956e30023a24ae457cc635f13fc142dbf542d2f38791494edf2fe766d39e1506d7136537b4068e3ca186a6d25a6bd42508bd3505cd11f218fddfe90c55a861d8079e79c971366302f71bc26b0d09bec36ab8afdfbb5cbe8baf0622d1d3ffdeab9e73cac3d"}, @NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5, 0x7, 0x80}]}, @NL80211_ATTR_NAN_FUNC={0x2d4, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_PUBLISH_TYPE={0x5, 0x3, 0x7f}, @NL80211_NAN_FUNC_PUBLISH_TYPE={0x5}, @NL80211_NAN_FUNC_SRF={0xc, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_INCLUDE={0x4}]}, @NL80211_NAN_FUNC_TYPE={0x5, 0x1, 0x1}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0x2a0, 0xe, 0x0, 0x1, [{0x91, 0x0, "494aa26a72a864d68511d37317e1d1062363ffc23723b2a02878185a0bfeb0fda02743926417d4fba18582243de289f706f4f77c843c0ddf46138a7701268a265c8c26b402c484cdecfa35be55419bd65bc60694381213d527ee57039b5f7f18b1e3f8c90e88f4f6870985f96850467dc523eb5baf7aabc60c46e0e6a432986dd5b3be8e1329a3e582bc1874d1"}, {0x7e, 0x0, "15d33b2b0aa94848715113f2ed309605a57ff81e45ec8c0e530ce0c82df79f3193119c73d4d029d2865a3271aaedd5c8f671a37911cec66f6c0da929061ea153152ed2327154467a799accfa45bdeb2bcf646a0b48ba7a052e0288b424cc8d5c9b17369860fec8828146b8bf297377405e6d36203216d84ee54c"}, {0x89, 0x0, "4c966de71da9813c45ed09b06be8087bf66d22cc9f304be1a1b38c28c6424e615c9564a66637ee57a8a071a6b5f66cc202bb3a2153e9da020663ed50e52e450c476c036eade4fd134608c2bc0302cd4cf9e6fab5c3ef4707d299a8b3c80a8fc8f67c1f3a8839d93247fca8f0440a8120fbd8814b3b9f22b001e612eebecbc0890e75967742"}, {0x60, 0x0, "5ab6bafd422877229522d5ed824756fa067e414420e6881ba96b917429edafb09ef138959056b32ea73e5cc80200624c9aee1f63a8634301d8c211eb472241b0d5f17442718cc7fad27023be44a5a34c99bc5bd8444db1865581eb85"}, {0x99, 0x0, "33b725e0f33d2c36036c43ebfbc3374d2f73af8ca0957f5c58f0086ec2169a6904c57453100c311b727c8dab739022a1bf31b2a2321ad0588705e510cfcfb3f2a69d439b8a1bd5f293d0ae596728919ca396ba42285a164b4f1143decc03a81f676572778fafb2dfacd383690ee6b920a38d0a25314bbb1e1e686317bf202da5a764c6abb60b88e0370f84da5fb46c3a8b793c1176"}]}, @NL80211_NAN_FUNC_PUBLISH_BCAST={0x4}, @NL80211_NAN_FUNC_TTL={0x8, 0xa, 0x40008000}]}, @NL80211_ATTR_NAN_FUNC={0x354, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5, 0x7, 0x1f}, @NL80211_NAN_FUNC_INSTANCE_ID={0x5}, @NL80211_NAN_FUNC_TERM_REASON={0x5, 0x10, 0x7f}, @NL80211_NAN_FUNC_FOLLOW_UP_ID={0x5, 0x6, 0x5}, @NL80211_NAN_FUNC_RX_MATCH_FILTER={0x328, 0xd, 0x0, 0x1, [{0x26, 0x0, "d548e048f1cd878c385c21d2140266f66e043ab6819de93bd8eba29a35fe7acd078c"}, {0xae, 0x0, "8c6e49f3317f73c7d7113eab1ff85e60afc512864ec9aad83d6dbe821e6abeda608554970723d569becede2f2344930be315a7253a044ee3d0d426ed2bef9b04ee9ece027e3a64d0c06016fed23ca6ca69d0f725330b8af3ce76dbe96f495bcd09328287c84c6c81271b2db250742ddbadf8c3261c9afc5654bfaefcf0698c8b96851c9e6e87be4eb445b873ad556ce9b328074c702f476efedc82002613f081e6fe1332539ab0a6331d"}, {0xd0, 0x0, "68bdf16fb9b432253ff9224a93300eb59e1fdc52ef28c21e977db2e70a470d5d718d22ec7fff8cb36b38bb432f1b9a5df9bad6558dc35919c20cd2d62ef336b098471647d1b84a5719f62e0261956d3c9a2b644f0e37bd0aecfc145d861e72a2d0ca72f6659c9c11e8f0c5c1ef491131f3f10578402e8c2573da3dcf0a1d0c892282c4c8566fc934c1b1e1108f0415b9d57c6fdca1f8aa270c2776777286e74b73493b505557ff25e90017722e9305f3ccaa5d0d245c3678cedfca3a13369ebd0b5aaac702e3203d74f0ea31"}, {0xa5, 0x0, "2fbd04f5418e168a01c850d19daf9b3f2ec99fecf7f58ca35f83146c6653f2af853e44dd3f03fff5c86504149ccaa9aac30f592a7da2abf485ff2196b98f2f3fdf4da021986005a8a8080903b3d39cc0c450280d0d472a81ae3cd314afee72241c432e7560369b37459870b069a613990b30efceea80b234a8430d50162dae95c094c60a491346661d809c541332bfcdf334935c69e0f3b5016db3b71b8470fcc6"}, {0xd3, 0x0, "fb99e323386a083949e64da647871d50764748231e18fcea93165adfe69a6b712f2b2fb61cc710a2fff5ad681177d6f725f413b48d6cd21192d7e2922f81d4cbc6fdfa3fc29227f166a392bce35bed070eb63c9d4c597df5781d91af41cf25b989fc43ce1a550caf601db6d6e33ff98f72e75f27b57bc039b489ddfccb1e265bc64c047582e6a80c1d5c7f7c6477e9c9f7cd6ca34e735df898b3dd46962177ea23d30fb2b1710ae66bdc37a373bcbb95b75a675704f96d3f5e3345e0ee9694cc95dfc667b0806a1cd8264c24909ea4"}]}, @NL80211_NAN_FUNC_PUBLISH_BCAST={0x4}, @NL80211_NAN_FUNC_CLOSE_RANGE={0x4}]}, @NL80211_ATTR_NAN_FUNC={0x20, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_PUBLISH_TYPE={0x5, 0x3, 0x40}, @NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5}, @NL80211_NAN_FUNC_FOLLOW_UP_DEST={0xa, 0x8, @broadcast}]}, @NL80211_ATTR_NAN_FUNC={0x183c, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_FOLLOW_UP_DEST={0xa, 0x8, @device_b}, @NL80211_NAN_FUNC_INSTANCE_ID={0x5, 0xf, 0x3}, @NL80211_NAN_FUNC_TTL={0x8, 0xa, 0x1}, @NL80211_NAN_FUNC_RX_MATCH_FILTER={0x122c, 0xd, 0x0, 0x1, [{0xe, 0x0, "e03612831a1f52114eac"}, {0xb5, 0x0, "9fe4c28b255a3217b1344d3c2a59fd764934e1e32209703babde74e15d4ad8f8cc1ee5b4b7c2bb2e0ca358e458a90afc11e8137ae9f30ca869650617fbe25906b1985a7a3bdd535e1f6ac584dd8d9377dcea219c9a5dd69a3b630cadfdc52e51231d4c45c66476a316ec9cd9c8b98da1c0ad6198d697a7b685111a03f35da5497a41b45f14be417acdc644889a9a3c99b54bd120b822b728a2a9087e8cfde5cde68c2170f463dbd316d45ccb5d649002cf"}, {0x1004, 0x0, "18dc34616d04ec08f249e0e41390ace5732b96c4492275b92651e6dc4217fb47926bc79f0089952fd2533102490925ad3bfd28e8389e13404c28ae876f7a80ccc5d7bcfb18ff3e34ac711e8b936abbc7286f683ffd41446ff3acfbb32b29a8a5f6862be3f31a305fec59df2a2897e590bc2857304e70a82b9c20889b1a7f97dafb263746ec3e31fef0911a625f5bc30c1124a453f91d71dac9f47123c785aaf1f91b6ec169bb32459f0a4ed30f16af4eeb436d4cf5e48f90f5b026efe44940052708ca07523f6b849de98fc7bc18d574e400337a8a3894a29f746f33cbb0a2e3d896867d27623e707d7c9245bdb97fe0d733e9db5d925c89c803f442526e746ae5c17b23f2b84bd9c807eb9999710a104e8b3a2cfa20e1329f14c0cb08e69f5e97e4367c2f2559192de30d7b939c7f524c8cd807fe33cf761e69e7fd9828cf8c5ebc6744c05eeb38d1ebcc562d098e48645c9b162311985d97eed9bab279bc51a35d894ad469c874bc6ee86a066bb210b9c3e9f4b4d2c47682a87767a199ffce08b6edd0274c8f5b7aedf5cbd54ed4bf2d4f2b9c79f0fcd432fb725175e376e35e237351d6d549138c68d934aeeddfdc09ab4fbbfe94142fbbe93f2fb7321f208a9721e12e532f6888c1ce0ba39c0cfc3433ab22ecabe87681afd1a242a60be11c4d663a91851beea9500cc9ae078df641f8014c0104efd2e85966b4e15717567b1397f6895a588adbec21408719d2eb0dfbae18fdba71d87b89b54c327008b1c7d39d5530ee7e867c1956742a1ca5e1d865ab7b04cac096b2e32edf9b4bbe367bee35e0858b30b54304f6096d8d8bab607490c40f1dc37b3aa08d70f49a09a62599bd091b101a8aa778d3ec4a5f5e2f7c3a22d26c4923eec6a24a2a8101b2457b8063ea7e4a0197c9b3abc070c7463acb309f256e3a8ddb8328756546561a9996e94b439cb725a845518605bb31aa9e53c76270921a443dc0871b045d5793d663348f43d62ff301889b1367c69cc2db48e1c87052d67ecb89115ce88b3b7608226b7998611ea9d9089b1131fe06b31d05c1a15f570360e4e31b74d44f59f88711b0b96b07334a8fdd362d75ca91a60299e85f8dda19ea4d3a01db068ac71ff9f4d8030157683f0ec20a50726507e4edb1fa4e278ec5901dfbeb4d2225cdff7d785fe2d3dd433a3d124528ec981b2c966a64ca9273e214f9b937464977e1f7706ddc98827c5bf78b83253927e1feab57315fc5b829fc43b99f6743dbd3eabef514b3b652f8c66351d2d31eddc70054ffd25388611d4ec11f01b1b144e94054a5f73375608459725ec6507fa26fd49e7ff532006e553415bc971f0c397e78824efcdc1137da5b8e01aba9f1226f10684c9a4d2944159aa575aa0003b401c66acb9236b1efbde131f8b97edd32375ffaa4584e08f3895df3dcd57aec871474e9114079127734a117ec4dbc4f23c12f350133616bb8ff1c6306791c66e4a8e9b2309abbc98ee00981730e090d7fa296c3532da0fbf0ac40dfc0be93ad931870e8013a1835e0aca9b33a6e07b4fb29b3c4417579abe4d8cd16229778f90a43af71a7a9015a53edcb6df0e5da78cd624acd056c1bf4953cee34731439726c97eaaf722bcfb5f6a6a883bfd2f5dc6ef878cb975bc02ebb1cb85d153400b2ba298637cfed07340ded4e030423f7ba1ed174ecb41987f7857e47d5acfe53c1733d787ac418b33b1b7f6fbfbc356a0c5799dda8ff881eaf7e81fe4955a4f6d473232256e3cdfd37a78e17316f2955c0747b480136fc325c202a4abdb5212fe4238852f9908da392a4abae06392e5c80a8b8bf133cd9a3e9a59279ded77369c1ad7b55069835c2a441e8f31deba18c842d816ac4fb11622c1c645fd50a856bf298ba199fe6bfa7385d0e561ae75bcfc5ab99cb8deec2db778ce30c8e9755e2dc0454213ad6f12fe4b318225cf359c4eec39beab20a8f098f356cd819a8f1c1e102948244c1de6f1c4cfe7bfdf67d65acd7737cd7616d79f643bb37c57faa2017013cf8f643f63d930bff56f66f5a5dec4bd5561da234b79aa8f00248bc3c6a413200c9e55990b10973e076d359d1387ba271e9d0ac24de6c6518c2295e247845e04157d3bcb23f71a745e4501b28c3d49b7478212837555f55f550363220da99aab4cfedf8697192e07a9ca88306a1d253f827d1eec38e12e7d9c06b9d583a96ff213a0e0f18eadbc400217a8981648b31bee3a2a0e55f06badc8e68c7eba54185f3eb355731c351e9fd96578f89629d29f8b4bdf734c79ac2bb0133ef624856da1f83ddce67d453ac2dfbf9db54a4059e338a236d375de8e4cf7b28d510bfa996ac4d1a4cc659976f3eee4b28b1ff40849958d57161d95fc98cdd3bbb892bf9c4475c7e1279a359a3ed6f7133865f1b40b400396cbda2226bd915798de8536830fb47fdc6a48f0b88735df22e97b437a47ccdce52748447456214e9e89343a4128d215cfb7bd9d5120d9c81fc5400e73e590def2e7de1fb8d60a2f9841cda7dfe22ab470f306b634ca3f8555a2adbf96b1ea084067f60f611285049a7d7c71410cb72ebeaa2fea99157997da00764912fddc939962ec8695cc34a761f8055d8af5414c66f9d1d0695d10dfd921dac19bdcdf42232898ee47b33ba4b79be6d86257bf1454b9ac66c4570c13b614be2f00f9932bfb6725179e5260bd36c45155280f339235930db9ed0d7ed67ca6295ec2a0171482caff276fcce14f8d193a498fb9d383e951899366e1fa7c4978b4fd79390d54a40edf12f3db07b06c61563637062efd62a9ba1553a8e3509d352d716031aad528dd033c478608d05e4f078b7cc26c18facc291d045c15f0a674d3f1b188f6582c974711d904ad21b2c1c6b0123364f51e56c11edfae4561254e2092553543f4e7bc7ca13544eecb591c46c0dfa3404fa14b888d4d787fbaa1ae0526986f99b1f0fc90e63c15480f8a1194d45d387b086ecd69f6faf4113659ee254f14c27763cfdc5fc72fce508401e6db756cd8dbbec8ba31c6e5f18dc3e511b91c07e4c4de008d9adae4606dc5f939be1e21149a842d8a14d167a06a09554d1d047106395d909b837967b5e40b5536fa41be01637c87aef01dc749226a3823330cd90b05b30735cb35cf170529627dfe229f7166ea4b215409e5d38a9575b6b1b0196fa865d0e87838625b5b70b1993fb6dc35135fa18e768a20266acb5b7e331fd5025fc32f086215a5d22fd1b9493470462740d77fc6cce150a00bb05a18b38acb62470bb0e888e7dc6105ee3fba74a3a209a5205f20ad25387b1401a4c46fc108ac803566e9900ce36eb71e33d5e8465f7a755969ae99e20705dd57d4ca1008b9ee076de03cdd12ccf523b9882795f5213f86f856d69294916f53a636bf96622756e11c16cec9a2d97b06183161830a18cf138388207833e05df837c66f82d11bfdb833f70a00baad9c47dc016aaa97f9b242a057726bfcd67885bd2d2ff8861e8d438695208d47d0f2fdda061efba564982f6a7cb3ac9f8ccb3abb3e20ad0f1c32ad52516038f26c4690c159c70be9cf4cf1ddf8dea26545d121d816eae7f256e349a61aa0b5d6471175f7d495b7c2c9b8963914b8abc907a04e795a6e36ada9438be4e65ee9c0bc58607821b05eea80fa5fb9a57b0ddc80bfc193135d2be4e55ceecdfd625cf4ab315b7240bc5fdc9364b57b018ff6a459096f5d8317d799df45d2a1f0b0c062f6b42780299b8a324c2ee325b4b15bbcc1025658f7a8b9fb3a75246ea4c387d7d9702aacc27d70660567a69267af5c071b5925a7c636882b69a27104802916a449286d82595b43d0098706170150f10baebec2a1ba26a9bf5a7126128cb7498bbb270c97a3f8a5656efa3c1c30d6e773395eb6d2fbbf3b039a39763ff8178e80ffea8123e4fc4ece23a6b6caec66419092d65fe60e76db8ce0089a92698c580a1b29dc770f012c95f3ba5fc1451abe7d1f697bae1b17a290cdcf6b9d7eefee6ae00cc9b0f74880c61f002dc7163a68cf9446fde62ee370684a395030922db36037ec20732c4314081a08ac904c73ec8d2b05fca6f083cc24eee327e47363a5ac7688db28a6b7881dc1102d4278cd922113026481a8dd2655a4832a941e4d99281dc6f096037c5c6c04df95838f51e8b052fd81df71324e7902859d0d7c07ac3f75d267698dbe8ce7a5ef0beab31a0b2daa2680425c7963fdce10e4f653de73be00c2684ac9502bdaeee1697ce92f4bdaeb1edd33473a6acccc501652db0a79c0ee3f76f8448eb943c2adbd0e50604b6eeef822578377dd5acbdbeaadc4ed20ef3ceaa25150a90ed54f32a8f214c5792e82a0e6f9a6f7974b234740f4f1d2528f700d4381cd16bd0738fd39e8411b7f7b361ab807d194579d08bc628f374f2cc506350857bd3acd3fb54c17591f3492f93159b4475e14456afb53aec731024a339e90fdd14ca84685dd752c3c9d1f3cad4cc5022586dd5531515d0503a1528e5e79737a9641f7b7b740043cc01f1c2a19d7df5a03f33f5141b8f39d92e5dc4693e1ae7fd28bc11ed1edc8009e9d72ac0548e53ffa7155585c3d7890fcab738d01d1d1a6a9ede6aba01ca146a9a7af9b34c0671b5ff3834b565003401e3070f7255b05bbafb0b7a0703462e28e022701951a13e74d2edcaa22f643b23d27770494975c8a7ba2d757e6e1c1f2ec0ec5f8cfadff8c6c87fa586946655525a95e5134558f488af24c6d06456f5371cbe9558bde36e03f30f81a4740bf2d21ffcfac7f55c73ead0420628b43bf774ef588efcf9b562b06ce88b7bd385fee80d5674ebe231dd0b3588aaa49255b24f3d1ef7f69ad1a3f18e8ef49145549129b1c8b8a1cba1675f97e17a374418f141b4e0a2222957769a979b26001e09034defdd28c52060852865707477b4a5583ea06d26971a9ee55606647e60db505ac7402432f128e240dd6b20963296c6acb19ba4d94a00436635f77043c5023474554e730c7a90bb0fd2edc5fef4035e586cf7029215a22dce52ce1ff30a305d1706e85be668767817d64fbabb45012023e65573294bebb27aed6e506d51607c6c856ca7283f992064a45bca3d5374aafd24e54f5393c4332b28fc56d0929565bc22e7c45aa43cb552f24cdfa4becf4fdcd8d823b3e9b77781ec224d17b2e573e6d4c3c16781caa3db77bbfdd5e06efd141f3565e85c16f1a1777baefc5dd80664026d6247eef76e09bfc2fa5e682118f2163b69c06b027722e478dd5b4ac20a40e5b6a7adf28579dcf16d446e2155e07e9541390cbcdabba4fa09a9c7232def92cc4ec51060802a7bf9218acddc372d14249933ef06bd7805994a4174ac476616e6c6c489c1e238edcb5573ebb7c5450175471015aaf8865c4e06e2d919833d3886cabc6cd030892af60fdf0d11e6b06701dd121b3af7c977bfeba53f7f1c8a2fee9e8e444668061c18cbd80a6f1b74e70600655b75450bd664dd9080a253a9ace12bf4c2a84420ed2734765dd3d9c48d9c4558ddac457a2924df1681d4230a73af4f496cfd5f7f1f3c1997cc86cf05a1a6c0224e6161c26aa3f761846946c3506fb51a782eb50a7a509b417e60b3cd3e81c002bb05d16572fdcf449fd37314eb12123631b6c77661f2277e051086ba7f303e44a3a6a8e72a49d9f9bf42a653c88cebb524efedb7c7d983b44e5979df3ecfeb46bcaa31231b0a88151c1230c957c6ec51d5baa825d89c7bc578b8c539a8cbc768e6b31958d285667b730ac1c992f0526fd5360a7daec2bf7a5a8ebfdc7cd9f4f0"}, {0xe3, 0x0, "315b8e3fe9624178a7251004441c38a6e3e082d7d645c93bcb9278d8448acf3b14890e9e0da390c9367a0de0eb3055dec329db848401ac15a3e4bd0a64d61273bc4627818e31f0ca76f82bc154245d5079df9a5b82f446f1c922789458afd96d8d8d86e92c033b8b0e4ee862e881c667c56e34b4f91444e835be09ae3d61e13276a76cd414c670f026451aa6f7ba2458bedc73036e2250ecc435c620e82e496284403f31eb836c8e42f1a5c66e4a835ee546afd92e40ba73fdf1d4123ae08e2e42877f122660dee2ac323234b3193be3de04e77e3e2b23df9330acbcd731ca"}, {0x13, 0x0, "3ac3061f5e72745b6c2cf54940c9d5"}, {0x62, 0x0, "d32a5f2bb0f1ae78b86c869e877d51a8ca9f0450d3b0ea0f00bb286a7717776511da1416c2bd21d2f124542e1e3d5baf028f1c3aba7d779a908874c66353a405104690b7d8718da4e4a603f508c13933e05f508e3aee0109829b5438683e"}]}, @NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5, 0x7, 0x3f}, @NL80211_NAN_FUNC_TTL={0x8, 0xa, 0xbac}, @NL80211_NAN_FUNC_PUBLISH_BCAST={0x4}, @NL80211_NAN_FUNC_SRF={0x3ac, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_BF={0x103, 0x2, "572a4455eed708a2c125132a81b2f25d4f0866ec0440add8540c367f23c7ec71e34937d55e48267996ff3c0da2c37f684d857c1c0cc501f125134f653f062831b4275646cb1920f2902928186903c7455adfca8306e0c6f49e5fa2aeed3706198b39b222a4baf1521635f2c96162844e93bc31cf7fe796f442365da3161b0454563e23398918421cb3cc4a894e4e1968b888fb6dbadf1767bb2193105baf82f6cbf49816d83b9b416e3d5162b0cebee795be4db69c0cf358e526776b76cf53134ffc010cfb7f882ce69558801cc6c255204f635f0091b5e53d1227d0b2d7fc50ce326510db3d9ba9b63f17b88d5882f1c47ffdbef6f55f4149f0c70830ac49"}, @NL80211_NAN_SRF_MAC_ADDRS={0x70, 0x4, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa}, {0xa}]}, @NL80211_NAN_SRF_MAC_ADDRS={0x28, 0x4, 0x0, 0x1, [{0xa}, {0xa}, {0xa}]}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_INCLUDE={0x4}]}, @NL80211_NAN_FUNC_SRF={0x224, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_BF_IDX={0x5, 0x3, 0x9}, @NL80211_NAN_SRF_BF={0x103, 0x2, "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"}, @NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_BF_IDX={0x5, 0x3, 0x77}]}, @NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "01a8d0ad15bd"}]}]}, 0x359c}, 0x1, 0x0, 0x0, 0x40000}, 0x40) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="2c000000170a0104000000000000000000000000e08818826e589c3a000000000900020073797a3100000000"], 0x2c}}, 0x0) socket$kcm(0x29, 0x7, 0x0) 08:00:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1155.481271][T19662] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1155.505040][T19662] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:41 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000411d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1155.605599][T19666] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1155.677519][T19670] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 08:00:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xb00000000000000}]}}}}}}}, 0x0) 08:00:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7, 0x2, 0xfe, 0x8, 0xfff, 0x3}, &(0x7f0000000100)=0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r1, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c000000170a010400000000000900010073797a31000000000900020073797a3100000000fad48e6a2f0057d41f21b3e57e5cc4f675226498554dd5ee3d61bde76184fa7e6423c5909a690a2c10bf313b9c5cb62fc5c83b07a9f9c09242b6f681bbc607526b029b3996f687bf0ed8cbf8345d6c55cc7638e256882ae71990c7f558c9ed2c354f6f64", @ANYBLOB="6399b8a0afbd30dfc17e3514ff5c62c134de65116984f8d2d506d2c4a9b2ac164bebab89dabb73385f4569c0bc0a0cc89fb0ba2a5d7e1a3fac0e7ea592bac2022d113d4a80e36d73d58b53eaaa8c2422bf836d8acb06a04024d1409eea7fdc5373a54c5aed33d5d15f64c742a6e8b69de06996ead7932caea46c27081ed75327e959fbf7d866f1ed813b115fad78b337336fcc57fbde0068830f7e12f061caa78098e46e1fd810d4319bd59f76a548bb721df76262960d2452eab6fc5f50d2124898dc66748325671aeda7b3f9bd6555592370764b509ceea2d46ebf8ea7c3a55bc702"], 0x2c}, 0x1, 0x0, 0x0, 0x8d1}, 0x41) 08:00:42 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000611d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="2c000000170a01040000000000000000000000000900010073797a31000000000900020073797a3100008000"], 0x2c}}, 0x0) 08:00:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x2000000000000000}]}}}}}}}, 0x0) 08:00:42 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000811d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="2c000000170a010400000000080000000000000009000900020073797a3100000000"], 0x2c}}, 0x0) 08:00:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x4000000000000000}]}}}}}}}, 0x0) 08:00:42 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000911d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@GTPA_VERSION={0x8}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}, @GTPA_TID={0xc}]}, 0x40}, 0x1, 0x0, 0x0, 0x4040808}, 0x8095) 08:00:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1156.552053][T19713] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x4800000000000000}]}}}}}}}, 0x0) [ 1156.604142][T19716] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:42 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035001011d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x4c00000000000000}]}}}}}}}, 0x0) 08:00:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:43 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035001411d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000000)={0x170, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HOOK={0x150, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xcc, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'netdevsim0\x00'}, {0x14, 0x1, 'hsr0\x00'}, {0x14, 0x1, 'batadv_slave_1\x00'}, {0x14, 0x1, 'geneve0\x00'}, {0x14, 0x1, 'veth0_macvtap\x00'}, {0x14, 0x1, 'bond_slave_0\x00'}, {0x14, 0x1, 'ip6_vti0\x00'}, {0x14, 0x1, 'erspan0\x00'}, {0x14, 0x1, 'tunl0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ipvlan1\x00'}, {0x14, 0x1, 'veth1_to_bridge\x00'}, {0x14, 0x1, 'gre0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x170}}, 0x20000000) 08:00:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x5800000000000000}]}}}}}}}, 0x0) 08:00:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:43 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035003511d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x1, 0x84) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000000000), 0x10, &(0x7f0000000080)={&(0x7f0000001100)={0x6, 0x3a4, 0x8, {0x77359400}, {r2, r3/1000+10000}, {0x0, 0x1, 0x1}, 0x1, @canfd={{0x2, 0x1, 0x1, 0x1}, 0x1e, 0x3, 0x0, 0x0, "b31c9fc5d5a3ff35945222b750fdcf5f9c0302663ea69658845bb696de3d7393ee02037dbbd1e26e8b6aaa4b2cadab9878555160096ade483e4d2a69182845b3"}}, 0x80}, 0x1, 0x0, 0x0, 0x48090}, 0x810) getsockopt$bt_hci(r1, 0x84, 0x84, &(0x7f00000000c0)=""/4097, &(0x7f00000012c0)=0x1001) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x6000000000000000}]}}}}}}}, 0x0) [ 1157.334839][T19751] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c000000170a7e4221af9fa69fda0000000011000900010073797aa07eea2010ca310000000009006295ff42f6ca75090000009a0b021b894148fb4cfaa01929ba21b28f49e4ef7a0e76834fdbfa8841072a445c28e1ae35510000000500"/104], 0x2c}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) sendmsg$AUDIT_SIGNAL_INFO(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x8, 0x70bd29, 0x25dfdbff}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x80d0) r2 = socket(0x24, 0x5, 0xc35) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000005f40)={&(0x7f0000005e80)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000005f00)={&(0x7f0000005ec0)={0x28, 0x2, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x80000}, 0x8000) r3 = accept$unix(r2, &(0x7f0000000100), &(0x7f00000002c0)=0x6e) ioctl$sock_proto_private(r3, 0x89ec, &(0x7f0000000400)="660eaef8dd5a9a124dbd00cd30edccca8a99725dcc9370c436e22ff355607c60cd576fd46d8b8faed02dc7d13dab57189b6ff8b3ceef749edc5cb480c502") 08:00:43 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035005a11d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x6800000000000000}]}}}}}}}, 0x0) 08:00:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1157.664191][T19767] net_ratelimit: 8 callbacks suppressed [ 1157.664206][T19767] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:43 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035006311d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x6c00000000000000}]}}}}}}}, 0x0) 08:00:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1157.912898][T19777] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1157.933979][T19777] __nla_validate_parse: 4 callbacks suppressed [ 1157.933992][T19777] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1158.022721][T19782] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1158.025552][T19784] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$NFNL_MSG_CTHELPER_DEL(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="340000000209010800000000000000000a00000308000340fffffffa0c00048008000140000080000c00048008000140000000006e9baf580c39413ae93dc23ebefa7ea10bae0a1decea15622a19080d3ed259768690462e8758fce204b7248c6c1a51955af50d0027e12eff24490b9f57dcee87a0"], 0x34}, 0x1, 0x0, 0x0, 0x4000884}, 0x0) 08:00:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1158.107688][T19784] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x7400000000000000}]}}}}}}}, 0x0) 08:00:44 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035006b11d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="2c000000170a01040000000000000800000000000900010073797a31000000000900020873797a3100000000"], 0x2c}}, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) getpeername$tipc(r1, &(0x7f0000000040), &(0x7f0000000080)=0x10) 08:00:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1158.343450][T19795] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1158.417156][T19798] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1158.457252][T19798] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x428, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2004c800}, 0x34040000) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x7a00000000000000}]}}}}}}}, 0x0) [ 1158.564621][T19804] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1158.602773][T19804] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1158.662654][T19812] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:44 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000535d25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={r0}) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x3c, 0xf, 0x6, 0x201, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x2}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20001}, 0x4000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="2c000000170a01040f59000000000000000000000900010073797a31000000000900020073797a3100000000"], 0x2c}}, 0x0) 08:00:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x9b11000000000000}]}}}}}}}, 0x0) [ 1158.887186][T19819] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1158.948669][T19824] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1158.982987][T19825] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000040), 0x800) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)={0x2, 0x1, 0x2, 0x0, 0x0, [{{r0}, 0x7096}, {{r2}, 0x200}]}) 08:00:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xc0ffffff00000000}]}}}}}}}, 0x0) 08:00:45 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400003500055ad25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1159.266100][T19838] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1159.283544][T19839] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1159.361358][T19844] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xfdffffff00000000}]}}}}}}}, 0x0) 08:00:45 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a8400003500056bd25a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1159.603332][T19851] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xfeffffff00000000}]}}}}}}}, 0x0) 08:00:45 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d202802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1159.849078][T19861] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1159.908863][T19863] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1159.930468][T19864] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:46 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d203802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xffffffff00000000}]}}}}}}}, 0x0) [ 1160.188436][T19874] validate_nla: 6 callbacks suppressed [ 1160.188449][T19874] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1160.210598][T19875] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1160.279599][T19878] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0xffffffffffffffff}]}}}}}}}, 0x0) 08:00:46 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d204802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1160.544217][T19885] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1160.545115][T19886] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) [ 1160.642507][T19891] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:46 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d205802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x2}]}}}}}}}, 0x0) 08:00:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1160.866148][T19901] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1160.911937][T19902] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:47 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d206802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x3}]}}}}}}}, 0x0) [ 1161.167319][T19914] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1161.208953][T19914] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:47 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d207802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x4}]}}}}}}}, 0x0) 08:00:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1161.447411][T19925] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1161.474926][T19927] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x5}]}}}}}}}, 0x0) 08:00:47 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d208802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:47 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d209802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x6}]}}}}}}}, 0x0) 08:00:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:48 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d20a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x7}]}}}}}}}, 0x0) 08:00:48 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d20b802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x8}]}}}}}}}, 0x0) 08:00:48 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d20c802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xa}]}}}}}}}, 0x0) 08:00:48 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d20d802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:48 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d20e802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1162.953276][T19990] net_ratelimit: 8 callbacks suppressed [ 1162.953290][T19990] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1162.966221][T19992] __nla_validate_parse: 22 callbacks suppressed [ 1162.966234][T19992] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1163.093185][T19996] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xb}]}}}}}}}, 0x0) 08:00:49 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d20f802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1163.226665][T20001] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x48}]}}}}}}}, 0x0) [ 1163.331019][T20006] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1163.394946][T20009] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:49 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d210802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1163.495736][T20011] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1163.643160][T20019] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x4c}]}}}}}}}, 0x0) [ 1163.718845][T20020] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1163.765038][T20023] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:49 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d211802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x58}]}}}}}}}, 0x0) [ 1163.937444][T20029] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1163.984140][T20033] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1164.038585][T20035] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:50 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d212802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1164.208153][T20041] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x60}]}}}}}}}, 0x0) [ 1164.257709][T20043] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1164.354867][T20047] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:50 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d213802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x68}]}}}}}}}, 0x0) 08:00:50 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d214802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1164.635262][T20059] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x6c}]}}}}}}}, 0x0) 08:00:51 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d215802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1164.885395][T20069] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:51 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d216802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x74}]}}}}}}}, 0x0) 08:00:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1165.169325][T20082] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:51 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d217802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x7a}]}}}}}}}, 0x0) [ 1165.403994][T20090] validate_nla: 30 callbacks suppressed [ 1165.404008][T20090] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1165.482549][T20096] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1165.507991][T20097] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:51 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d218802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x300}]}}}}}}}, 0x0) [ 1165.784007][T20105] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:52 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d219802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x500}]}}}}}}}, 0x0) 08:00:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1166.037320][T20115] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1166.069799][T20117] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:52 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d21a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x600}]}}}}}}}, 0x0) 08:00:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1166.272179][T20124] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1166.321140][T20127] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:52 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d21b802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x700}]}}}}}}}, 0x0) 08:00:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1166.563530][T20137] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1166.615685][T20140] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xa00}]}}}}}}}, 0x0) 08:00:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:52 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d21c802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xb00}]}}}}}}}, 0x0) [ 1166.883415][T20151] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:53 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d21d802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x119b}]}}}}}}}, 0x0) 08:00:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x2000}]}}}}}}}, 0x0) 08:00:53 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d21e802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:53 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d221802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x4000}]}}}}}}}, 0x0) 08:00:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:53 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d222802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x4800}]}}}}}}}, 0x0) 08:00:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:54 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d223802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x4c00}]}}}}}}}, 0x0) [ 1168.075714][T20201] __nla_validate_parse: 27 callbacks suppressed [ 1168.075740][T20201] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1168.155543][T20206] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1168.166529][T20207] net_ratelimit: 10 callbacks suppressed [ 1168.166542][T20207] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:54 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d224802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x5800}]}}}}}}}, 0x0) 08:00:54 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000001500)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0xa418a242}, 0xc, &(0x7f00000014c0)={&(0x7f0000001480)={0x20, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x40c50}, 0x40) [ 1168.411382][T20214] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1168.467972][T20218] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1168.521862][T20220] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x6000}]}}}}}}}, 0x0) 08:00:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000000)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, 0x2c}}, 0x0) 08:00:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:54 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d225802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1168.783505][T20229] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1168.898544][T20237] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x8000000061bd, 0x1c2dc0100}) pwritev(r2, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000300), 0xfffffe8c) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) pwritev(r2, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2, 0x3, 0x2) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000000)) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="2c000000210a01040000000000000000000000000900010073797a08000000000000000073797a3100000000"], 0x2c}}, 0x0) 08:00:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x6800}]}}}}}}}, 0x0) 08:00:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1168.990799][T20238] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:55 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d226802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1169.117007][T20246] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1169.215112][T20249] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x6c00}]}}}}}}}, 0x0) [ 1169.287096][T20253] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:55 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d227802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1169.472940][T20258] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="2c000000170a01040077a56941a7af839e39d18f80d3aa3d00000000000000000000000900010073797a3100"], 0x2c}}, 0x0) 08:00:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x7400}]}}}}}}}, 0x0) 08:00:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1169.617996][T20265] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1169.654566][T20267] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1169.730445][T20270] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000040)=ANY=[@ANYBLOB="d4000000170a0104000000000000000000000000c0000380080002400000d0f9a400038014000100626f6e64300000000000000000000000140001006d6147d174617030000000000000000014000100626f6e64300000000000000000000000140001006e72300000000000000000000000000014000100766c616e3100000000000000100000001400010076657468315f746f5f62726964676500140001006d6163736563300000000000000000001400010076657468305f746f5f7465616d00000008000140000000000800024000000006"], 0xd4}}, 0x0) 08:00:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:55 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d228802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x7a00}]}}}}}}}, 0x0) 08:00:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"/335, @ANYRES64], 0x2c}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r0, 0x7, 0x3, 0x80}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f00000000c0)={@fixed={[], 0x12}, 0x80000000, 0x9b3e, 0x9}) ioctl$SIOCPNDELRESOURCE(r1, 0x89ef, &(0x7f0000000040)=0xffffffff) clock_gettime(0x0, &(0x7f0000002980)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000002840)=[{{&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000300)=""/214, 0xd6}, {&(0x7f0000000400)=""/134, 0x86}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/146, 0x92}, {&(0x7f00000015c0)=""/227, 0xe3}], 0x6, &(0x7f0000001740)=""/111, 0x6f}, 0x400}, {{0x0, 0x0, &(0x7f0000001880)=[{&(0x7f00000017c0)=""/53, 0x35}, {&(0x7f0000001800)=""/71, 0x47}], 0x2, &(0x7f00000018c0)=""/250, 0xfa}}, {{&(0x7f00000019c0)=@ipx, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001a40)=""/158, 0x9e}, {&(0x7f0000001b00)=""/10, 0xa}, {&(0x7f0000001b40)=""/125, 0x7d}, {&(0x7f0000001bc0)=""/97, 0x61}, {&(0x7f0000001c40)=""/93, 0x5d}, {&(0x7f0000001cc0)=""/144, 0x90}], 0x6, &(0x7f0000001e00)=""/32, 0x20}, 0x7}, {{&(0x7f0000001e40)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000002380)=[{&(0x7f0000001ec0)=""/129, 0x81}, {&(0x7f0000002cc0)=""/4096, 0x1000}, {&(0x7f0000001f80)=""/12, 0xc}, {&(0x7f0000001fc0)=""/215, 0xd7}, {&(0x7f00000020c0)=""/87, 0x57}, {&(0x7f0000002140)=""/48, 0x30}, {&(0x7f0000002180)=""/84, 0x54}, {&(0x7f0000002200)=""/104, 0x68}, {&(0x7f0000002280)=""/197, 0xc5}], 0x9, &(0x7f0000002440)=""/15, 0xf}, 0xff}, {{&(0x7f0000002480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002500)=""/95, 0x5f}, {&(0x7f0000002580)=""/175, 0xaf}, {&(0x7f0000002640)=""/172, 0xac}, {&(0x7f0000002700)=""/37, 0x25}, {&(0x7f0000003cc0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/27, 0x1b}, {&(0x7f0000002780)}], 0x7}, 0x1ff}], 0x5, 0x10000, &(0x7f00000029c0)={r3, r4+60000000}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000002a40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_P2P_DEVICE(r5, &(0x7f0000002b00)={&(0x7f0000002a00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002ac0)={&(0x7f0000002a80)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8, 0x3, r6}, @void}}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4010) 08:00:56 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d229802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1170.031868][T20284] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x9b11}]}}}}}}}, 0x0) 08:00:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, &(0x7f0000000000)) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:00:56 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d22a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1170.320630][T20298] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1170.432944][T20306] validate_nla: 21 callbacks suppressed [ 1170.432957][T20306] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xe0ffff}]}}}}}}}, 0x0) 08:00:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040)=0x81, 0x8) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000000)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x20}) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000100)=ANY=[@ANYBLOB="010073d57f25f7797a3100796e3100000000000000000000000000000000000000000000000010fefcd8ee5292be7851962d61c20bac2647080d3ee24bf18b399fb52763e684a002f14537ff57138a31dbc04f8aca54a56ad1cfff0fd98691d4bca7c9db81af9c7e0aa70f80fa29fc5fac01faccd7a79f66caed419bea03af6d4235c9f1f1d2238c5335937d1dab8e4eba94"], 0x2c}}, 0x0) [ 1170.517788][T20308] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:56 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d22b802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1170.632512][T20312] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x1000000}]}}}}}}}, 0x0) [ 1170.799536][T20322] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1170.850255][T20324] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x8) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {0x2}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x12) sendmsg$NFT_MSG_GETFLOWTABLE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) [ 1170.943234][T20327] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:57 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d22c802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x2000000}]}}}}}}}, 0x0) [ 1171.098568][T20335] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0x17}}, @NLBL_MGMT_A_DOMAIN={0x7, 0x1, ')^\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, 'syz1\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x84004}, 0x4000000) 08:00:57 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d22d802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x3000000}]}}}}}}}, 0x0) 08:00:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x2, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1171.351704][T20348] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x1b, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401}, 0x2c}}, 0x0) r1 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000)='net_prio.ifpriomap\x00', 0x2, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r1, 0x4040942c, &(0x7f0000000040)={0x0, 0xfff, [0xa05, 0xa8, 0x4, 0x0, 0x9, 0xa03]}) [ 1171.418831][T20352] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x4000000}]}}}}}}}, 0x0) 08:00:57 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d22e802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x24000040) [ 1171.724424][T20368] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x5000000}]}}}}}}}, 0x0) [ 1171.778394][T20373] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x4, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r0, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000300), 0xfffffe8c) sendto$inet6(r0, &(0x7f0000000080)="7bafc1c4e2868c2e3a3770359c9b2b", 0xf, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e21, 0x7fff, @private2={0xfc, 0x2, [], 0x1}, 0xffffffff}, 0x1c) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000170a01040000000000000000000000000900010073797a31000000000900020073797a3100000000cb84ca379f2617826aea5de93b05efec25bbe34dce7f51f2d54058f11c5e7ed70136a2dde31257c184b98a00cf181bb29b889e33d8373ddd"], 0x2c}}, 0x0) 08:00:58 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d22f802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x6000000}]}}}}}}}, 0x0) [ 1172.033561][T20383] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:00:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x5, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:58 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d230802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x7000000}]}}}}}}}, 0x0) 08:00:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x6, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000140)=ANY=[@ANYBLOB="54000000170a01040000000000000000000000060c000540000000000000000434000380080002400000a6bd080002400000001f080002400012e8dbed2ec31c89570a077d5201000108000240000000030800013bcea34b774040433a0119b5d9f1000000fc6003a4035326be20557456e33d520a93573e22c761a8065ae9111ae5969faa3e60afa7b8f7cc3b0c3ce83f39de56d1bf9cd68c8625096d143f03b902a3efc2284a63b990d5497422cfa3a669a98056004d9ce9c24d3ffcc9d1c3e7cbfa385061e05634e04f32d203d48aa774afa8eb99bdb227681f7b9f13fb25d0c7c3faabe0450bd24915843f5680e90c16855e2df30bf476bbb38a760956722d7a5b97885307a592949b"], 0x54}}, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000080)=0x8, 0x4) 08:00:58 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d231802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x7, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x8000000}]}}}}}}}, 0x0) 08:00:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000000)={{0x2f, @multicast1, 0x4e23, 0x4, 'fo\x00', 0x4, 0x3, 0x77}, {@loopback, 0x4e21, 0x4, 0xcc0, 0x5}}, 0x44) 08:00:58 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d232802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xa000000}]}}}}}}}, 0x0) 08:00:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x11, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x7, 0x401, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x100000000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x25137b4fdb2a6d0d}, 0x80) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0xd4, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb0e}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x33}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9ed4}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3a}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x87}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x32}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x800}, 0x1) 08:00:59 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d233802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xb000000}]}}}}}}}, 0x0) 08:00:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x3c, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x2, 0x101, 0x0, 0x0, {0x7, 0x0, 0x7}, [@CTA_EXPECT_ZONE={0x6}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xe5c8}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x59}]}, 0x34}}, 0x8e) [ 1173.137736][T20436] __nla_validate_parse: 24 callbacks suppressed [ 1173.137749][T20436] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x20000000}]}}}}}}}, 0x0) [ 1173.217943][T20442] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0xf0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0xe) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x98, 0x2, 0x7, 0x101, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0xa0fe}, @NFACCT_FILTER={0x2c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4c}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1000}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x401}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xfffffffffffffffd}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}]}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xfffffffffffffffd}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000000}, 0x40801) 08:00:59 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d234802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1173.420684][T20450] net_ratelimit: 9 callbacks suppressed [ 1173.420699][T20450] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1173.512016][T20458] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x300, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:00:59 executing program 3: sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000004b00)={0xffffffffffffffff, 0x5c, 0x3, 0x1}) bind$nfc_llcp(r0, &(0x7f0000004b40)={0x27, 0x0, 0x1, 0x1, 0x9, 0x1, "f4586a0b26084ecd948f25e52cadfb1cdcc33671be501123ca8c0d69b8e1fe5c37116aae051e4345ce3f4e8723fff40d3edb9345897d1247b5458b684d3322", 0x39}, 0x60) 08:00:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x40000000}]}}}}}}}, 0x0) [ 1173.621409][T20461] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:00:59 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d235802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:00:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x500, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1173.769308][T20468] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:00:59 executing program 3: openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) ioctl$BTRFS_IOC_SNAP_CREATE(0xffffffffffffffff, 0x50009401, &(0x7f0000001100)={{r0}, "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"}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r1, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) [ 1173.831698][T20472] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:01:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x48000000}]}}}}}}}, 0x0) [ 1173.921869][T20478] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:01:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x600, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:01:00 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d236802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1174.077408][T20482] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:01:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)="d9ddf919d7e9257d7cb64be3865439a8a041a6a2dec09feccb7b29fe0dc76ae180a8e149c2c05aeb97b45836c1aa235fe0ea92e99011f90e4a29987e6e8f4f163a4e893c4b6c5710100de635625d86cf6e9e48130153f988e20acd8934e0fc38aba8abe6f2bb3c457b8acb96bd467762d85335a5906c9ebfa5a6641906fa492e18a96ff40fabf87b61fc5eacaf7f6231081fdb84f83b0ee147e8c8080ce365a1dd11befa", 0xa4) 08:01:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x4c000000}]}}}}}}}, 0x0) [ 1174.234325][T20488] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:01:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x700, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1174.285471][T20493] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1174.349153][T20496] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:01:00 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d237802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={r0}) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, 0x1, 0x2, 0x201, 0x0, 0x0, {0x3, 0x0, 0x1}, [@CTA_EXPECT_MASK={0x6c, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @private2={0xfc, 0x2, [], 0x1}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_TUPLE={0x50, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x25}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x6}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x1}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4050}, 0x20000040) 08:01:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x1100, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:01:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x58000000}]}}}}}}}, 0x0) [ 1174.566561][T20505] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:01:00 executing program 3: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x3}], 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = accept4(r0, &(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f00000000c0)=0x80, 0x80000) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000240)=[{{0x3, 0x1, 0x1, 0x1}, {0x1, 0x1, 0x0, 0x1}}, {{0x1, 0x0, 0x1, 0x1}, {0x4, 0x1}}, {{0x2, 0x0, 0x0, 0x1}, {0x2, 0x1, 0x1}}], 0x18) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, 0x0, 0x300, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_DURATION={0x8, 0x57, 0x7}, @NL80211_ATTR_DURATION={0x8}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xfff}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xed}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3d1}]]}, 0x44}, 0x1, 0x0, 0x0, 0x44044}, 0x4008000) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) [ 1174.624327][T20508] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1174.666880][T20512] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:01:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x3c00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:01:00 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d238802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x60000000}]}}}}}}}, 0x0) 08:01:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_LEAVE_MESH(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="020027bd7022799de3c2e0db0bdc"], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) ioctl$F2FS_IOC_GET_FEATURES(r4, 0x8004f50c, &(0x7f00000001c0)) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) [ 1174.948395][T20526] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:01:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x3f00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:01:01 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d239802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x68000000}]}}}}}}}, 0x0) 08:01:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NFT_MSG_GETFLOWTABLE(r1, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000040)=ANY=[@ANYRESDEC=r0], 0x2c}}, 0x800) 08:01:01 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d23a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1175.266637][T20541] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:01:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x4000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:01:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x6c000000}]}}}}}}}, 0x0) 08:01:01 executing program 3: ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={0x0, @l2={0x1f, 0x9, @none, 0x176d}, @nfc={0x27, 0x0, 0x2, 0x7}, @l2tp={0x2, 0x0, @local, 0x2}, 0xf801, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)='bond_slave_0\x00', 0x4, 0xea, 0xffff}) select(0x40, &(0x7f0000000000)={0x4, 0x7, 0x1, 0x0, 0x69e6, 0x8, 0x8001, 0x3}, &(0x7f0000000040)={0x101, 0x1, 0x1, 0x8, 0xc000, 0x0, 0x9, 0x10001}, &(0x7f0000000080)={0xff, 0x6, 0x401, 0x7, 0x8, 0x1dbb6905, 0xffffffffffff8001, 0xffffffff}, &(0x7f00000000c0)={0x77359400}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f00000001c0)={0x87, 0x1, [], [@pad1, @ra={0x5, 0x2, 0xfffa}, @pad1]}, 0x18) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="2c000000170a01efff00000000000000000000454837eb0073797a31000000000900020073797a3100001200"], 0x2c}}, 0x0) 08:01:01 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d23b802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0xf000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1175.538809][T20553] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:01:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x74000000}]}}}}}}}, 0x0) [ 1175.647142][T20560] validate_nla: 21 callbacks suppressed [ 1175.647156][T20560] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:01:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="2c000000170a01044000000000000000000000000900010073797a31000000000900020073797a3100000000"], 0x2c}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e22, @private=0xa010102}, {0x2, 0x4e20, @remote}, 0x90, 0x0, 0x0, 0x0, 0x3ff, &(0x7f0000000000)='ip6tnl0\x00', 0x5, 0x7, 0x864a}) [ 1175.735090][T20563] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:01:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0xff00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1175.807894][T20567] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:01:01 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d23c802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f0000000000)=@isdn={0x22, 0x7, 0x3, 0x20, 0x40}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000080)="d203c672a345c1cfb8439349a369bb8f32d1f189643c611dc2669811bc39035f2909c1caf17db5e2d9ceeb2f0f897ab78a98d23dbef194a88c97fa002aeb546b9ed4fac071c4c9d64f6138eaf01a0e836cff207921ed1f1e8d393f0f7b012c9f8acce87601057237e8e163584fb8dd522157b974fe809f89b9308b0749270b7db91f75ab3d828d40b44e9b81efab45442462e32a1cd77e4245fa90769c3cd84bf3e87cced9c9afd26775727a6eb69e87bff605bdce7f871167570da39efe0e0f6684e6186bddbb05d7", 0xc9}, {&(0x7f0000000180)="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", 0xfc}, {&(0x7f0000000280)="0e22e9d5445484c9685948bfeab6e53ee4798424d851bdb4d9127c97b7a72de4ca9023f2a2b9374db0756a40127a3d863c91e761d8afcb0390cb40bfd892d84eefe8a0cd1488757838b2470bc9f1c6a2895080078c9086bfd5c94f58a126ce7a5a55556a15b5e6ba14ed439217b7f7e84348fb19120f06293005f41116c833250b4530cc3ffc6a4ea61de1bc6034972418825cebaca714d8", 0x98}, {&(0x7f0000000340)="4060e6b36bc6161ecd33d3120a80a94c2bbf39f858c3e5b7b4145c7941856ff8aa42e918b1a0f75d0f24eb636c823e46a847a88de331f811be69d1e9a130ba41525b480cfd134320212cec56c3fb8db6c99d110e6b50f9d9b3c7feacb41c38", 0x5f}, {&(0x7f00000003c0)="308de0fa4ec5f6fb3a2bbe8ab7f7e05a9aaf93e2352e678f64c92f07eae789743851672e8fbec9493a35e8d1b190bfdcb237a48006686ee68a3605277a253ca787ecb8f4f3306f21ceb488d10f5351262fa07bedeef7", 0x56}], 0x5, &(0x7f00000004c0)=[{0xd8, 0x110, 0x2049, "cb5549e214975b7233a09402c156efa15f3fb2be96b79aeaac4f5275153c0a5d77b4623c56081326e851a62039ca629e1ddd10e23201cb2de3b8755c70bd434d65e064758ee17c3f7a855d68a03d10ab7389c3141ff0a0cfe9f28cf77a4350240bb3a39099ffb90deeb717aa8719dcd752b7af4ae7e5f9b531bad3f80853d2b50ccfabbe3fa062e4727d6cba6151452242ad07c2ae098b892ae318b91ea5e42c6a3e929ef7e4a195c1d8c1fcc353e818862afe77708a7108733da0bc5034012b557023"}, {0xc0, 0x0, 0xb63, "fe9314d57f7cc0688d3787305095439b3224a4690d84e773662f3282a098cc12e16b5bebe128b1bc76b2c8af9ed6c43c04b762d7e72cd55802c89f183bd20edd15880a22f4912e121a61855e92e449915b968d633300f7ad64e9d68e07fd9ee30c43b8f20797c7ebb9c1a09509d997762693554895790d941fa95affacf1c5cfdeeba0393fde3a1e654800b7bdf6a726615a43d7016382b786e1dbd03f765c633412ddd3968e10cfd521"}, {0xe0, 0x119, 0x80, "a15ae9c9dfec7a653f7e5c21a829d99fe1c2cb25e833d07f1f78f655b7876cfa344bc3223bdb9fd659f989e380170eef8fe37eda8962f320620c04ea9780b5b632b8b10121d2b461f36afd3e115379e8d6511769856ebf99ed7d9754570f6236465e799ba2d7292a480b9adfd8c1a188183da4f30f2dd0668ec74c0c2ae5a3d9080c572545aae4cd3d53a0cee769c1ceb54991542fcea8fa9b57174a71dbd385500ac552050665fb532f1b919cb4dd593c9f3551a2ca81386dbfb2c1cc89025ae9ee1a593d8d840089"}], 0x278}}, {{&(0x7f0000000740)=@rc={0x1f, @fixed={[], 0x11}, 0x4}, 0x80, &(0x7f0000001a40)=[{&(0x7f00000007c0)="b5d09a506ebef94ac10ead9706661418da8e9b4d2e07d957f10d4ad4d417964e33dba9b4f9217c4216ed525603f8e39e385833f685125f2550aabeb3a45fc196360b55de5b47298e8970e12b9201b969d7780cc91d3e501ab61eeffb65ac2c741a16c8fc7d9b9685117bd0f8b4c3b4347e66af6c647384f929268716003aa8fd51f4dbcc48ce8423e6c004bc2f2a9f170519eec070419155c17d0e56b2492c7ecfa5431eda1566efd281b97f15f24b849a7014e27c4af8e295dfe5f893c4c48d8eedb79d13d0eccfa89af8a59a", 0xcd}, {&(0x7f00000008c0)="f15894edde424c82569ba9968653c0faaa38c5cda2ce67d343624e4b4e2b0d", 0x1f}, {&(0x7f0000000900)="b4175fa1e308dc64483c8e81726c0765335cc9b9956ca87cf78ec919304ac246ffad6acf4358dda6573ef29df3774bda8649b218dd675eeeab2de117d08955cba3946ebbc1124bf084c97d974d2c34b265c8162e6d5fd1416f8d9190fffad614457344a348e04c7f17078cec45916b3afac350ff1921592d7b522f7789ff0ba82798d29f78ba75c961ebcb71c90a9d480809562e5271748e65067321e3d2d6f0d59d976eb7b7f466df7cb285e22783004d39", 0xb2}, {&(0x7f00000009c0)="6df497d607df96c9438dbf35279cb49fc8e3f3e3c683ff89cb3951a3cd937d6bca96f7d250f6d2d5180676c308b57c555b8e4287763cee423c82279ff26779e524ab80e3b430652c819c3251027196dd95a3a9f115985a55f35087bbc06e85e68deda9a19bdd5c69db2dd61a7dee1de86314a2184ea6148a0c1e47970a73bcd549bdd8f987598339a855a517257e03baa8e9975b6bdfa3e3598cb0b492afc7f84f964b7a4fd913b7868a387855bd699b164782f5ffb3b85db4cb7065b4323eee09eff9161e6da0041f20068829ca29560a2fa4014f6ac6c5bcdbb45d20b94ee28fa8c82065e4af0f0162d13f8d1bb653a21c32410a6534b81add2bcf30e5c0fd4027d591717d6ceeba9f8fc96b78d5ad338ce3923bb30c0ae35a55bbb3c23339b043b3eb988937340832e9be0840187794f01e0dd38b9ecf270ce2430cd739a03c1b92feb7a1dc05485571e71034f9cfa6a1bad796fe5ce4fb27df502b18d786b0165d290608e3def0636569370a66677c6dd3a2345fa1eaf7c9e5742d4edaed91fd0d47b23ad2347b64b335754cbf3f2be4676e7fda197ee3e01a72b9f4e6d6fd0a37e2aa96ed50910b40c7133392d0d4b3de8808d04b7fbfebbe94410e53d644933e11bf18e3031ffbca1ed0847596ccaf463708bb611850faa74f3b41a891b5f9dbd2e2663a501b887e49cbdc7b612d7f2d919efc31db43b3c89955bc891525e38bc0d39a642e8e2f239f13d42da149bf3fdd1e5ec2fe5af599531a6a91f607600736c2b33c0b168c81ed8d533bedaf7aa59fb7095342d2503af214369289ec23562481f46f70a517e27fdb7a8ef095a2fb0fb13c84038949a3aa6ca4b166c33e78c1b62cc8a071ba5c06ede0b79f69a4fa23ad0691af18420732fdb57530fe743f24980735b9f16d8cee29aaa4367cd4858384a17d0eb6a204a69cef31e3ebabc81b9fe4069b1a16321de350d27b7aa7fc4d7b04ece0a118c70035991a20bd7e557a65643a27ad96063b825ff7b6ebe6ab8db7d4a3ef226792d4918d59bf54a4a8ce918cf5096df511cdce3ffc507b4c5546b1864a94ddcb3c10f993d4caf779f97c6bb1b4b8667b2c1e57bf589f5ca8d98b748cf819faff95d7d151c3369143d55e4bbf63e21e607ec21e43c09c25ac6257a08978f9e6cbe9a2a7dc35ca95789a0b83671955a5a38fc80eca8a35a51f656089b5ac894ed1e713649c78ce186b336c8c1d2b3ea318120e224151e5f2a7d1b375c337acfbc77610c9211a68e31d9093ade53b99e101000f73152d0a211c8113b037d65dc6d3b198c5624be0510fd23d2560a7c664288a15da95bfd885a5825e1afbc902c2f9675d35bbd68292d7d103555ee3dd440781ff0b9b00978d91208ada074f31f0930a34895d4c89b4f92e5ec789081e54d59d082051cc85a4bb1328a8ab0ad9ea8868cbc1b416fa5bb22fffdd9fd7dba01d9250448c63a97ed602014db63174a424106d2daa959c329bb999a4578f1814c41d655b47e88fe6d87bde1aacd7b4dcc5b0b904c6d57596007e45bedbd993816514b47e223d634ac2093808b5435d086d3ce48597dfaf1831df38faeee43bb87170fbe7923dc18d584851cb4f1b85343d6c2d79b4385945fadd9467b2ce4d387cb40463050ecae289bd489d00270de91cf41545059f192d774003071fa87c75a8538c135353e1824c1e837aa964300f07d2f7b98cfc8217fd66398ae29c3abd1f00543eed5b40278cfa7e0ae70dfc1f4c3a7fb480ccfe0bcdb5b99110c1409f7c8133df2d93c85d3a7db3ff4598bfc1597c3af85235b7316cd7b20caf4624f01ca64b1b932f90a15700aa04ca8078f3671ec8e95eac2127d351686687ddde0aaa6093cd25618183de29706d4747b27fa698aff3b5063c348fa60c6a0fb645aaed937ef8001750c2eb4730cb086fb65fbe760e4753ed35dd433f75eabc6daad9348c94a3dd373c57f2bd53c5f207de3a4d48414dabc9cf0563b694102f323ae6b2008a7039515d05a8517e1ddfabb518211f5ce199d0a4427d9440afb655cdb179e402dfd03b453993d7cab8b4a8f64d5cbcb8288b226b4cb5b9aba1a6e807482215f5380b71ef2ae8b1dbfcc28e97013430ca7559563f5db71fa7634681effe205bad94e28aed1a8de065f0686d8713501547962a0de5d83077a214a60bfce74c6e57d0b72bba5cb4caf1aed6b2091e577adc07f216c268725b5608e8a7c48075662964e9f53ab2485d2b6fb6b8ce7114deeaf119af157ab23cf1fa75669c881dafb901bf3aaaf847b74fb775e9a0ce12b954330ffa7203f1eb25cfa2e40fd4f10eba9aabfd6b0bdf458c2b1b3012cfeaa2b93e397a6ad8108b62ab550a1ba358b3a488353aafa78041d040e8e30e00976c045046afe75e83ed1059f7732d1a2dd69e7e1efc1a674cb69df6f3145e3bed5e6a9abf7f537718ccd2b89def6167be57a44a664cb0c4950785fbbd2c1c44b54f8eaa7064b7e9087c188dcb10c614b63893cf842339c81affbda88b536b0bf235a1b334fbb8655a90e88498e4e23066dd289be90c9032f6b4f24b78d61a03ba4327e3cc3a42b8c3ed55d44b1070291facb9c962323d4e63f1653e16e4c710baf51aaa30e800076701ee3c31f6584af348be1784e20c50f7653b36923527f50457a70c36776b17cffac4fffe9ad9bc745ed4e7629f9cca039cefef4f1bd876f3b9f81847cc253e5d47ac1309f93bbc2f7d6fde9fbafd480180f8a9f3078ac23b07a6598f726e3f4d8cace0f62e8dfc93166505689672d3a6b3b918c9add2ec913c1df26b54d95ea6c1a059649ded92c7810247d1fbd746346c91c5bf7c2aafb0ffa54f133552147a2918b42df712cf443fc0c8fcce6a5f3b879af8398029e83413192da02865b65d5baf73fd5805e4f0f51471ee79344b3c25489d2d8f313fec1e05b3bd555846eba1559833801f3c19b07b3255bb642b699eea1862e212a459e9221220a28ff46e0b54abbf05e3e76c6789fd341e028de7cdf256a9b90aa85f3adee8256aba3dc7997ae2418f1c73635b275e38f1d41fe2c1a99ab108b830375065c6fe24080f255aa4d897149b4edd1c1de20d817e6d9c89b762cbd76b509b196f898db534b084f27b6e108f8fa771f50966943a6ab6f69c4422c996fca0b5e74974ffda9a63becb835cfcd882c3fb4bd6c9efd660b9a332ecbb8a766cd73581c03bc23bd3e7d29618e6d0db1f82635488da89c3dcd2564a6901973bf7aa3c49900678e42dee4d4be1916b679b56bed2913829ba90b16cfa51a2875b93f3425a90d4f142f04d170edde68c8ff6f09790696c006e19ed4d719c12c450c5d48ba85aec970ca56da8822cb62829f6c9dcedb9a635596baaf42bb3dfff2a10d61c0d1bbdf8ed835d1dd0518b3b8ce9708587d5c7f5b69cb1f1bae5f3b85b92d6b78b3ff3987ba9970d3895f4ab2232d7dcf01ac8f93b736b008a98bbbd5f245643f8c74eca0e88e66f8bc5e95824225f985931f46b9a052c16c0280da3378593ff18023fddff513ab1bb9b43bca35370fe8acfac149ca49dffaebbd277d54f757df4641e951415bd015045f5b4c6329b55a45f60f6bf84d568ca400ced5a9d5b8a09ae184df8022a5f022a602f25388bc1a14ef89deab7d4a10764aa3e3e542d92dcc4fd8c031836730c54b63f75ee5a7445a261cfc88825baa8d49d62b73fa6f03cdf7ca1528293166625ca09d71f0a144b7157bb016ce1f4427a663751112adcf61a59cf9b10c906a39fb037040f01cb317f09372d38c082666d7f1a6dcbd68f8b3b931c4dfc885246521973d897ac8633be94affda61336f850f8d6bec68bc1fe023a6a8830e276543557c0a04691beccf5fb6dcd9c70b361e26fa262cc81997742575e26d8cdc690a2699cc0abe8ef26773a30b21f34fc5a564d4c75d38ac06451ced11cabcaf8a48753e613232c929ad6729f1481b146b9b311cd2016ceb5c42ded162b6f08c7e439509b7c020e5093704252b8aff9c6a425f4f72bc5ed730a164ed2374e769f24636182c1024f7869a5b3d4ecbdbc685fc7df2cab4c23db3580649da3b05abcd38fa4788239a2fb7816693f7e24d8de8067bd0601825c53a451e93be8efba2cd5d3e6ced3a8d0fd6e2e44145f4d7cc45845270ccbf7525b5b05704b287b50cf604dfa0f105d6267f9f73b01363a4af9ef59166939ad2354e11f55a0556a4f9563ae7922cd87a3797aa53893d533250d29343582d176639fd98aeee8f02bba4105ec1dfb8bd352096f3e370dfad7c988ab835bc52f9763742f1a10b5da492d6c914f016f7e4db07adb2c4a094488ab54905f44b20b69662459e9a18028faf13d0ba20b35ef7faf27e7b899881c5786c9eff1dd882010012753d24e42a4f260b462e7e2974a9cc47843b72bea77d44e255bf7da36d2377f43dc883bc7e9aabe0dae557ca55f46a2c83b96772421781925fcdf7cfe15ddc3acaa91636242a883db09e097e23e8d43fda29ceed4f3bd91c1917f122422003bacc26bbb482d95c089180e849cfa256c97febdd539d44e36f9a3fdafb14eb74d9f4775998d83c951b01eba63ee8943c16fc538db560d365e9110c9e6cb34f8649994d474d4a39e39c8adda6c3991d242941ee3c21b21b1ad20ae85068ac76263de44025b8409832a10dac5f7345ddb1e9632c3ca0d5cee7f25bc8a26bf360a0eaf7d1597d33a26fe008ae820e4f89c28331955566e1c99ae531f7b446e027019266a3e17c061ea1e166c598e9e340900289e8d030062d8efbb0ab034576bd55d28c91188479641cdf2acaeddee59fec91a1a4e284f499bf077c0bf239dbc2dfc66f629aca2942a40fd5f4d7bf901242e571cece41c113b6f2800fed8c2a82c004e14f06f26226a5cb624f202d4277179a552763fa805eafe2051f73a30e91e01a217625a78ea2e0a0988477532eaf0b3c6b5b0b517b15ca8d118dbc06470e59766c0af74c346c7633365f797b97304f6d2c8d9e8d4212063910ed4e63731e32e9e9a8f2eea9771800d6da99417e82ac95cd6800391bf537c1a6af12e30e18030ffb587641f77ab84e3d436acf347d9838954b5a96d065f342835c06af15b5c3b01bd073e4799d6dab33f3d77d042557a8865a24c11972b72ca99c71ebe35977e3042ae43de498f44800a0c1fb2a51b503855141bcdd042965d52f161e958bf232304bbcf504a3bd8fc1accf5121d6b55e31f90b2c8fa1af32fef3cd69b0a034b81296a2f880e72efd210e295225e6ca443053fdbe7fa718fb8adff28d40ba6b5552d8d3e2952c4f7ac76ce9d99778be63d388f867cf1035407e904468b0fae9c5d571913f7c03537b1b2afbdfef2b3e33a03af836780d888f4b3781bb9b9afb1b83e8421156ae2aa7ba09371e15d9d7a2c5b6fc90238ce6a240b1d5ae3cf35c910d26f0d875b11049ad4cddfb873a3eff53890de7155d53d94acba01e0ecac73185dc98a4d0c4028e202a1f9fbc39df05ae47f235ff847f7893946c83e33a633bf8ac1275595c23b4c8f90fc7b9a532db0f30dbb9fccc9b4010b30cb56bdb4cbcd4dede755f4ce43214572d55a8680f23c785a2aeceaf98ef8775e3bf7833691bf21365013b318305f897eda0aa50b2be90e2d6a9161fe2efa82443a01f8bb946d548d877129c7633c678bee82d2d4c1cfa456dc87c4433bb76c996b59c773f1dd67e4311aa63101b35464fe47af3e05b94a3b3525322f5d38af8a72662af201f82b72d5a6d1dd8eade6b54c422b3255032e7d2c27ff6903fb73dac35a005e3f928eb6e8b33143", 0x1000}, {&(0x7f00000019c0)="804f45d383fc7fc18787bfe303e31d7694324f9d0b09b0a5ac542538b809a38b447374e5e27e3bf1469eab6d6fd236b7e9d82adff23b8aea136abbd179556532cd5eb069fc03093f8e52e6a911dca53ebec1ddfcca53e338582c334b50ac8837b724132f413d1f83f75aee", 0x6b}], 0x5, &(0x7f0000001ac0)=[{0x58, 0x102, 0x4, "b6a1c4c3c5acce35ee2f7e4dfdbff7616d48e83e25e2ca27a83c10a2233b6e98520cb421a67f3906a1f7df1c48f3ea826f5b57b3c025b62dc8744641f6f7c58a74a627c3"}, {0x1010, 0x113, 0x8, "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"}, {0xd0, 0x11, 0x2bdb, "712392cb4f16db027e8fecfcb0624bd897dcaebad786f085cb5b1c5ea322235dd98f247af72df65c9717a9410d12f2bda51b1daf1bfc80fa3595283a6dd49d89239d7b011912183f246190824ada5ecac6303d7a6707392085f1a772af1bf050f237997a23d738619ed822718459911ec37348055c6a98e9db3075e2017d2c48f4a97eb0e597f3b192763084c99d69d8798fef7942a5cd26688467d44c2fcf779296f6d3c14749c9b416f90022cf2a8015168c44c2be74c132b7"}], 0x1138}}, {{&(0x7f0000002cc0)=@in={0x2, 0x4e22, @loopback}, 0x80, &(0x7f0000006000)=[{&(0x7f0000002d40)="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", 0x1000}, {&(0x7f0000003d40)}, {&(0x7f0000003d80)="9ec882ffa4f6121ac9b13042202a5d64e7baee8bd9303dc54ae9ce680b3cde66a694126a3a46ca217ced40bb644f33364e8409", 0x33}, {&(0x7f0000003dc0)="14808627a63d5a5ad2baa2a74ef1e72ef7e2cf087e544116f869d298a1f8", 0x1e}, {&(0x7f0000003e00)="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", 0x1000}, {&(0x7f0000004e00)="a21f6ff22e2d9182d1563f96734610e6518bad53c898a313f66122823640bc8888eeccc4303291c97f2ea595698868c18cb304ca00b743db5014149f49fd337d84f09d7ca4e10e3bbfc099a2e03d539a3019a7d1d0965a05b173202eb09a2dd62eeb91a1d5c4b3916243f1d71b6a9bb2e2b1f951e64f889125a90b505fa65ac1b0910978886afbf3039d3709fcf8556a86348ede69354efab5c6ce93a7ba4484dce06d590fa263d647f8a2f8", 0xac}, {&(0x7f0000004ec0)="9e28eaf959ab65d53730abf2e88a45756d3a07cc4940d7ce8059fff92ceae4b7655280e8955a", 0x26}, {&(0x7f0000004f00)="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", 0x1000}, {&(0x7f0000005f00)="13120266947c1819a6ac0c3279d156281434860ecdb7ae082fc7c58e71acaaa9eba007fd633cd198853f96efd34a9cdeaafab0da3c009531001c383fd6e9b229b3cbb3a9c607667b15e1d13626c60af4be6dc226c5857e9eac9eb24d27f19c07d9fa0578a1afb9a578f4900e97b4ba0d596a15e3b03b252528191a83a1e3ed60b4f3fafc89de837ed5ffc2f651d64d83a2f134d4a397ce7eed9a2330217a5c2fdcd725584ab73e18a63a5f1aa4f170c9a584d5760e7f5844bdf0f1e7f07ebceee0bf42d24d4c7a1da392a23188338ac336cdf3de886d59c640c3ddd0c0e3e31e8acbb870de21393ce7dd3893cf7ec2c9c2", 0xf1}], 0x9, &(0x7f00000060c0)=[{0x28, 0x109, 0x73, "94e6510bc930146cda98e38937828ddd010e82993e032fc3"}, {0xb0, 0x113, 0x8, "dbf5e90c50c35023a79db829112d37c41d80860deee9f1bcbf6d24b935302e80eb7768f54b31623be9c40ebe133ee53a264a169046e26afe7d54022dfcfe11d8222a8936f844a300addb94884a2535bf3ff1f964ce74c653c7936493360cfd1a5c06b91348b8c00f0237b8edc9da9a0bec8557f57f5398fbaa90f2d22b24cb5a95b0e44c96f3b230fde3f02e4914d2b7d89a0ebfa141f0afc814"}, {0x1010, 0x113, 0x400, "f77e29feab76bc82748ece115f9cedafe3a2d6161dbf581967b51bff386fbfd3531201f7f1337d806d6a8bcfc6081bfa1a797587d6d0d1e64c24d07a64972ed9186a8ed1fdde57679fd33ab2de6e9744b8ecc1a9ee1040b26f3cf75f18dbb4a80e8e059c3a514e2f3db7dfd427f773514d8f8369670038e4f4c6fb84cd0a3df8abec8bf45ada4a40f2b7b724263824d55fd71a825a00b02750e8a0bac62faaed8f7630f6265856113298e6efe2373f270c698f1e873e3235c53dbda32dcbfd53b35d429bde0072e007adf598074f4549d4f94fd8216a177ca64eb5b38dbe7195356931d057fcc7ea918e815b3562ea4292657d25d48c36230fd7307949c7641a3580be60c9db47f646e822ebe29bc5ea5a1101cbe298d770756f8b58efe21ac3afa69928ed6b42fb0b9c89be9706edad6e764222724e625a5893c2d5860420c235799419794799766a229bdff9bddcecca09527e4fb9cd3826e1a588ff588c3bd65b1e4adc79d3777f621a7fcc72a1f46cec5ec67f1d70d9fbf628bdf660335a2f852352e829cafb778de3187cd06cff1cfb12cdf9c0f2de2644c380543aa5fe6e42615104e7ddb136d382debef6f216e6261b5b8d164af0ab0e8ed0fb33fb8f4ab4074748996b6af9e2bd43b01bb4ef1072cb67541430a161f2245e8d5280a885bdbd5e9735a9fcb6cd98cc43d4a0db93b3be34fe53fad9c3b4b80a922da78e423f4012ae1fb16ce24fc82ade183b2b6dfd1422f3ffe84411a3efdcff2b5386fa5d48bab8ab73727c62f5e34d6f36b3be5a368bfb19900d55a14d6d0a2efa9fde6c5a3251bb633412302ed19528451172fd8eb45317236cb5a6c9117fbbfed46af308fdf50b3b42c7f5f30524ec0870ddac713b0935923b2c9b6253ee8c46f4066ee350f9fd9dde4386c5eec6125b4dd4a40df923b90f161f480848b0abaa846aaacc0fac512892b261f7a1efec7e5deb30eb5062459a4ded2d329aba729e01a4ecc255acdb4687a88ae2b5c76f84481ece1d6e47817e6030f4668b4eee1460db9c6725419f54235919164a96b128df809f40185f475cf9e557875ffcedc12f51c4a9e58c55642c71aaa49b42d155b4f7d15ec850e15577aaa0f2f5f5db6bef88b098f22266e0eff1063bf62b4574277f4a356a25cf2819c0321582a1bf046c1cf02b8d87c204219bd7fc82d0f5708c045c922fbf88de730b42aa7798fa427b91305d578f9a0d6955d892abac45a659e56cbfea95cd7cb1b1524ee3e83eafb81676d45fa74c309dd7b659fa5adc3ab46b4991569f5b57f571065c4cf3e7d490c768be8741bc307a39ba2801058d97758dbc291cc87a894e7457e9f6fa7c2755b9097bc8c936bd19b008acff0c5b670bed02b242731db5417dd048d915facab4ce42210598127cf6ee140de35cbaee305bee6a60e6347d7a671c9a6b853cb09722e1f144ff3cf993cd67364655ef03a8566d1f37fbd6450f3aff7aa0ce3d61a068fe18a761bc4b4e5968e3a211aaca7c625318ec06530841e11665c949acedfae53da8cd9fceccdee659ff5957429a9720db2429e1819bc7d654e18fb07883b2cc456e414e71f4c1c2d36c898fd426b078a652515777df1f0c44b591d600cba0b62e2777950840f914a6359b521ef16e134d01d078375a863e24236428547b1921c67be312028f69269fd8f17438f8468e551d129e6429e62003cba7bd0361026995b91f2704bc5044675c0de302ec05022a4585fd5c71e9b4125c9b8c52506d79d153ab3f11fbf9c743bf0feb71489f59dc3c44bfa8299b3ef65cbe8f073e59db27fd16b10ec62fdb5fbe895804999cc80e32548a998ae7c0ff01f0b8f3f0a89519c3cc12415eed9a1db5410f5386806e866d6028e01d7c43c0f33290250aa618c9795a8b5b77615bf861fb7b728c6d9925550715fcc8b1366eb8fb461871ec5cc9c1b07f46ae0d717af02461062c7a842a0dbf22a4e89e61b4c96265fbc4ae60109875b83767d026483be1d74b274aebec984c47bd22012c2a29d65b568b0e5e3edb89927c59f65d3ba7f45998e08075b3f53b6bf0769aabd11770ecb6b48a77ebacacacacce7ebfb2ae78ec635d466f28804feca4b56da3924a444c92bb037cd68aecd12ef949a00e0db677c607bcb70a27f20696066cff238fb2f6bf010f0717637d00ef22625566f8624b267ccc160443c5903b5d3b87c455b8067f5a53a543d6fc8a47b33af06dff0e4c20fedeaa475b36e9c882dcbee3f7ca3cda0754c28f8b0572a4d60b9151a450ec7e56659582295f8e09d5df7ef563e6372b09af4f8b6a55440f8f95196db40dea4ac1c8597b01bc87c455e90ceb1abf61c2a695799dd16f7b6ef241074557db0c3077260278fd9fc9c07948e78b11848dc4450d8893ba371b149c095a2b838018f5eeabea8268bc0b2e432f4b3fca586cdc4bacc5e3f544ac60b2386e185ba74512662c30ca3d03248ccbdbc374448578b8041375969f15582d9dc914d82e9d633d01ce507ea702242bb4386dc373350af3df288232ed39f596002d0cd81503ebee068f64242901e12ad64365210eb566ac28e562cf236bc94d8ba1a2e3d238bbf2855c7eebc8d458fb31684d4c098b609c8e78affef39b47e4c14a1f7df2e23b85796130fed44aad9c401402ed0f33572bd8318d9299db6e5538b03e3d7fbbebd1c7d2bd81dff5eecff650951a5d6d01dbf256e11c4714fde6b2f007c12d2a13e742151be7fdfa4f98eb3602fa77e80116d790f07cd288fb4022d44048878cf71a32df33dd9bcf33e3c6d3771327ca998ae14b75ab33e702b93bb4a93c632b5e9957cfd7d3a217e895ff14ed377ac0a20ac1c73cc93ff63b8b5df223fe551bd19f03ef000de3e7d37b2ec9f33daf89f3ef4c5f0d2c07397f7d22117315b7ccceea7354dc786e592a6b31acff244801ba9f797e7b11d1d6aeafa995f61499fb18c3f3980de21f100f7fba2f34ed281ecb76f5013308d89a025144d1765a02805268584582d7f1fa324e51c16eaf30e8a23d948078947bd53ad0fe967bfa505b5ad4f8ee36d1582a16cb90c07593f6853b45256d15947e693ca209e7bd9429aa8dffb99d9e3c5330dc80c270d3fe8c6a041b3c05a5a7ec709e25a47c88a64b6467577c6c131adb6192d020a1c9a42fbfb801ca816a9e32e0dec279df402c2011155a523ac67667bbac58a348a0c4fbc4ee052ed16ca9431e86dbd70659451386f11a30c3403a6909b7b4d4447d3583e3e017ad8b83ba45fffb708489f577bec87fe29b37e275e81268c3ac6d503e6d24a91a973938d2bc1bb9dca49fc45acb8e1320cba948b915f6627a8a6c0a3b9a11b31cd7682eadf8783dad48cf08638a8c5ccc45467fda0bfcc6b68ab295e9900d743291db777011e690327c5d9983b31cd7a9cdf9a5a2965dff111464b789b0b60783b95abe593d2277a26d33a347cbb177c0a1a358de68d6656e0a5633c71f8a471b78699b91d89a159ecbe2eec5e1c8ef7d7c6d0379f29a0cdf3aa66a98d9a38f3f890afeacf549b6cb815edf48601b9180d38703499321afd5130efa9e9921ed08b133570e8a65a25e48aa0acdef0eac311b4ab86aa392b77112d901d12d149dc8ab214013c2644ad988158c05c27afe12f7e1681f8978e3c143fb9c1c415753602d11e2165debcca47856a9b36accbd01e96e0cdae9a5b0b8f192d73e1b6e98d4e7087388af5081bf6cae6a5f576cb1b60cd8751294ccf36c773c0cb8ed7e7ba92c527286148a79e8c8fec74db65ef7e7866e53e6c93c52c1de7c82e2856dbb5027490b7778440da8a60a785084c87afa1bc63ddd6a4da132d1a220cc6697286dc1d4ab30786b28aa3f81b1364871f29f60fa418c8c0ae9666039921ead830684fef4027f4e2d6b0b75b6a1baf33377872dbfdb56d70b15478bf7f2d5ce9b60b6eee91b81b3d0c4b9bcd0a323482721a6a54f70aa3f67e665ce1ba99738f329e936c0f2a5db42b85bed9b7f4c35946b1934be3b1c7455346a7b52b9bcc47a7bc894617f9bff683b5ca08427bd2e56b2a69bf4884ad1094470ed181ba57858d2ecd3561750f96f8187be4ad7eac50c88c9982842dc9166045603eae3ed4337835f418f92bb11903c77f66cb3ca806c6117e00ec85b997c4e2656193c357160788e21bf4010018219f761a3d64d71988e87fa6f02206ddbbe9714b045136238e552624a743555a7faea01d905ab58c2636eb340afb62d3e21b25cd46b4143bca3837ad86b53731d3c65c4f9bd453b852cd37ea49798dc4e3e7f6f2c3f5171fab631e2eb1819794fad827a2f3ebe86465b025947c78457183fce10f098c2ad8f43991041e149455405b148bce18a602771a557393ae540e821f302573358f0c5d4f524336b30662b20b6c95a9b19d755fb4e5098ab13bdaf3e4e6b9b22c1de1b5e63daf20213b073688d1bf8e60ab32589ed368bc1bbe2b0e19460bf1b05fe62d433ead83b0541db408c6b90efa567414a7b40aaae1c33f4527f729389f422d4cc8f28c32425466620c67d00cca7012e6162fd2e9a29b5b13b0a8938e1f2bb0a6d76906df7b270ef9a2b467f109c7f13eef12ad85c0802491471260e91f229d46b8fc025c7c341a627eab1242222a03ba42af1cebf358fc6df1be146dc42b3f6d5541c891b0fdde9f6e48ae87dc41aecf5d2f820c883661a817f249bfba455afb31dd7047840ef80c37e50c127e034a02fa49451ce6d532ebb65ebdadb8f0e66ac709a59b98812abf396a9a312268c684d01b4008a433c7b72abadbb2f69b5370ce9376c1a5fe48168fb1f0ebe6be900c204b24a9d427a97d936a9c48f1efedd0fbfad29319dfd9b0bce2fe00c51996a7c09f226f4af5a7646bcde254cb320e20adfddc045ae856f50f3039a50b74bd47a6883b00ef62f8bd60edf98a545ffd41a34b9147e93993739f9556123a7fe44d3069ed24a891974459e152a6c53d403732f81bc936d993ec00bdedad9125e8aeb4b9d8880613f8fcd7d03ee59938219cac5ea31dec0b8a8bd40beb8944ddb417ed0c41fa989eb9b810b95d0fbdffcff3e581c6c561e2b600582592a465467b81d665e86bba57f11321f53bc036b9cd823aa7d00a4428b90947f5fa82017143b392a1431f195d6502b63c3e9f5832143992feccd190392eafeeddaec79b6af113a6530fff07178235079ecb8d16cfb2d9ad2469394e296804821f38a4fef466f8266f9e70e71851f8e0e266239fd166d60a03c5d575adb7b2c0f17793f23091b315a7788d3035dc3bebc8e265c2fd2aa37545a86c3be6a9718f106c6a3596b89c151c07bd061437bcb9ab971662209d378beded9d88b645a01b12f04cfd4951f7eb3da2fd9c762ebbe339e67cffbe62b19140fc2aec7c760564a7ed0955bc1e47bc7f3845b9472f3b34679a0aa4f5848b70e3dbbd2197886c6c88aa56d7bf3eaf16831787558683fd22b91ea1c6f28d247de8c2649fc4ca7fbe44475dea3a6400315783c3534086aab75c63cead30dea8f56b33041ce7fcd35b64c40ad0f701615924fb5507f1e13692389d691ce65622f1269a840e0f23ba1a13a1398060c2ad12f231401e71151e533fbcf195d56f2df1dbfb370211d79b538b23888c565636f14a0c7a093d64e27daca47e3f45b150469c691e8b784c6bedecb4c91452f94afea9ff8c83e5543cdc1b595e4a1367a496f7bf118cdfc4f49fa7ac6c2008d86dd6ae5d3893301ab16e0d67bb8efb79ffe5b741fde5e37b3dec2ceee1e1acf60939dc41db9dd529d6e35e32316952fdc1935dc72"}, {0x10, 0x1, 0x7}, {0xf0, 0x10e, 0x1000, "f2f7f9427e671a7225c5e60e96284ab0066afd7bfa131ee5660c87898c1925ffd29e0961bc7105ed4657fceddcc5aa6a2e5a8ac6148cba53755cb92c6a01d8cb874720aa0fae6f31ffa6d47bdf2396c24dd02af88683c98d98254ebff2255bf55d3e7e34df2fd54e2fc7578c77a5d145dc1be62e998f1cf34eb148477149dd7921a7bcaa09ff935be2b9ca337ed43c02c643fd9206967a3568b70360dad53fab969cb88c72ca66f57e33db5fbe9e64c14b05852b10b9e1435789639eec8b5e6f5db3c3d86ded261ac83c2e64ae2eba2e5a159fc10be9fa75e447223b"}], 0x11e8}}, {{0x0, 0x0, &(0x7f0000007540)=[{&(0x7f00000072c0)="1df1c507b4ee2488dc23746b8e74fb867d811ef12edab0acd35b709746a7790ebf517d0bea2d2eba13a9", 0x2a}, {&(0x7f0000007300)="53e0c1cc8f61fc1af4a2fe8c48fa545ce817d565e3a614272da815d44ee9e264a3cf67facb463839f971a2eb6fe1900c230ad9aae20ecb9af80f477632b231c96371f4c214950017a0a974fe3cbbb24f27ad6a3f52cbce6155b4e2219a67ee099f6b3be22575e2454e8b64fb5ff623", 0x6f}, {&(0x7f0000007380)="c7eff41829e5d0248f7fc814a7ff29baceb62cc01e91e3113239e946e7f7c5d8571263f535a8e4dda997f59c7c767abe2ea3c5b744f98a0a7f1aecb0a3d260916563db1ef0d6a1f6c7aa8018a2c410a8e679283cdd02c7e169cf04b3d60884753d0afbd70f52c107ccffa702e0d43ab97a704d8674f154e6ecc63166422d440ae0", 0x81}, {&(0x7f0000007440)="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", 0xfc}], 0x4, &(0x7f0000007580)=[{0x10, 0x104, 0x7fffffff}, {0xc8, 0x0, 0x1, "332f67675c0929ef7430147c3afe753f0c301d9c440f8ac95b6f5abd6d29d53cd637bc7eba6a45ff55f428b53cf927d574278567927acd13ce44671b1bd63a1fc23fe4084d627512c37fa30149f88b503694fe7993602aee7c28fa983d96a4163bf2d87deac2ee7a2af78e8b4e8e185ddd378a558f182fbd42383fe3d7cf74412e90f7336932c597229bed9ccf1bcb8ca3a3106e1b9251e47b33ef0ec7f2d0fa05872269cb5c0458afd5551c67481477232bc6d0782398"}, {0xa0, 0x103, 0x5, "4ec003b5ad196a766b6cac25510b08b4d20723c4c91ed6b46e9151a1bab24a17ba95e336d1b4b027dad6c5463a3623641000ca56f2bc4a997a37be27117873efa1aefc28a32b95deac6c2a29437fa17edeb07f092019d2d5ee5951593cc557a8db34d0724c940006666a32ccbfeadc08d6debf5f8ea5fe7ac642af292e4d0ec23b59eba9bfbfd8f4f6f864837b"}, {0xf8, 0x1, 0x6, "4fd1cc7a5cc0c88d0824aa53d602a6fa872eac29f79525b99798b6d35601edc6b11a2dd3c4ff7b63bed05e76aea760f6a33f62e74346e5e1cbc647130202e786e9a6d9fbfaf0984ce1d7a70145294dac4fb2746bbe3b2f358a891d886f2eb19703940fbb061c1077b38fd97a5c65ffd652ac39f95334c67fa6e026e6a542f70b75036eed7fa2ac38e670bdd11038508fb12d346c81f14b3c30c5d3a2c0e1164ab37873bd84097b404fcd9a1ac2c9c57487fdfc2c4aba3acad4fc34417e1152a70d72a9d8650d68d2e18dfb7a752505d0366570812092204704452a0ebf4a1c5c72d676"}], 0x270}}, {{&(0x7f0000007800)=@isdn={0x22, 0xce, 0x6, 0x9c, 0x7f}, 0x80, &(0x7f0000007940)=[{&(0x7f0000007880)="422e32b43650a46c98ecce9814644d0678d2ffd4bd25c0ee6261cb0269e2eb1952ccd1fcf05417703e9b0142bad9cf6accecd5f08a4338f1f17bbb2e3b0b5b7dbe7d65a820afcf95757815aa068ca723f48640cee1df513a617017cad5494ab20262516a27", 0x65}, {&(0x7f0000007900)="4a5ea8dc8f9220", 0x7}], 0x2, &(0x7f0000007980)=[{0x58, 0x10a, 0x6, "0e928f11c9c876f40f9e1390186ada1aa6629f3e094b2f50dcf6dfd863621ccbc3a03bfc5e51eb51c4532e9ffec539c5200894db0599809f6c159d123e5aa7d50fea"}, {0x100, 0x0, 0x4, "ef977bc8137a1ece2971161da4e9b1c04394fbba3fc7b6113bd3dc37019a2860df74fb4337499cbc36bb35de73e600074dbd3593f7a83fd16a14068e767f0be8cde24317b5d52a59a9c2d0b193e6d0ae8db1bea4866db5a6423e2aa8b0f2f5333af662d268d314b8d93da8d9d2cf1376ffe39a7b08fc88f8991afa972be32fe2b1b053af25346fdef83f834ee5313f9174985b647bd20703e4bc1348f28b33283d086a9ff981724247271ce803de365d08372459f6bc65e55ec58238bf0db49410f383c681707ad257aea941bb57b11692fff0c4c0805e992ea198102783f72402b10f6c7d380bf937"}], 0x158}}, {{0x0, 0x0, &(0x7f0000007c00)=[{&(0x7f0000007b00)="9ecdb05c3d5a30c39bf71610342f4590fa773d30f98149e429962ca580a83f7ca52ce6a2f0cb81679e71d6aafc8d61bac2f89323ace77333380287100cfcd53ce841f5beaebbaa0620c6b2fb84ac0d01c3d01332bd90f4d58a8ca5dfdb8babc08af91f8a51895fad90661294b23f8f6045d49382f509f6efd63863862eedda00b47e5753d4a9dfcf99ca53a08f10832b1561f95f0bfcb256258b37efcba6eb0de790eab9bcaf559ab20d2bf4b99e8a9ed87e43316fc8c8d980d6e391d16eb379958a080ad381e59bc50e18240d3d1a4f74f8097adf33c52632d133", 0xdb}], 0x1, &(0x7f0000007c40)=[{0x100, 0x10e, 0x6, "3850bd57caf18aec278ea7a9f75067a452206e7079f079be5895197ce4b5c8eb0e5c88f8afd8e1e826fc768cebd07a8e0eba7105bf7215ae23869a7f3f8b115aadf10d21b51ebccf940f060049536bc071eaa02686f26d3a1e24155fe74d23709289eed8d4602b753bad7abbdeb64f860cba47516899491f401d77e842a866553caf656df7718b94af2274e79dcba82dd6017d2f399bf050a4d9d04dc1bcc0082baa159b88c8153adf29799a8a1e459b0654ff321376118a78d2978d57b43b83c13a92c6664ab1d3dacad3016f92daae4374dedd889f6f382b8a3ce8b7dd7d6f1cbf008b41c363e6b48cecdb73a7"}, {0xa0, 0x0, 0x2, "4f57928583dcbbbec04dcccbe0f1acd9af56637b48f240bbe678d30b3cfb311c60c0ea0c24ca586b880e33b7630523a1fb6100b97565280a32357971fb8d0e3ef15e21cf82a7365fecd33da9c4cc26a9bf17096101b006e4b25b9b4edd0ccfd2619300cbc1cab105ee1283b14e09e9923cd03381dd20591ca7201164b2b63cc942eb09b8150e7aea7d23ca7b81ad2a44"}], 0x1a0}}], 0x6, 0x24000044) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="2c000000170a01040000000000000000000000000900010073797a3100000000090002007b797a3100000000"], 0x2c}}, 0x0) 08:01:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x7a000000}]}}}}}}}, 0x0) [ 1175.989217][T20574] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1176.066238][T20578] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:01:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0xffff, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1176.112689][T20581] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:01:02 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d23d802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:02 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYBLOB="ff000000170a010400"/20], 0x14}}, 0x0) 08:01:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0x9b110000}]}}}}}}}, 0x0) 08:01:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1176.322605][T20590] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:01:02 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x49, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc004000}, 0x0) [ 1176.379315][T20593] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:01:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xc0ffffff}]}}}}}}}, 0x0) 08:01:02 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d23e802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x200, 0x70bd25, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x14000004) 08:01:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x1, 0x0, 0x5}}}}}}}, 0x0) [ 1176.651706][T20603] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1176.692108][T20608] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:01:03 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d241802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:01:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x90}, 0x1, 0x0, 0x0, 0x1}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) 08:01:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xfdffffff}]}}}}}}}, 0x0) [ 1176.999768][T20620] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1177.048761][T20623] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:01:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x2, 0x5}}}}}}}, 0x0) 08:01:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xfeffffff}]}}}}}}}, 0x0) 08:01:03 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d242802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x3, 0x5}}}}}}}, 0x0) 08:01:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xffffe000}]}}}}}}}, 0x0) 08:01:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000004c0)={0x0, 0x0, 0x61bd, 0x1c2dc0000}) pwritev(r1, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0xfffffe8c) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x1, 0x4) 08:01:03 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d243802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x4, 0x5}}}}}}}, 0x0) 08:01:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xffffffc0}]}}}}}}}, 0x0) 08:01:03 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d244802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x5, 0x5}}}}}}}, 0x0) 08:01:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xfffffffd}]}}}}}}}, 0x0) 08:01:04 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d245802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}}, 0x0) 08:01:04 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e20, 0x1, @private2={0xfc, 0x2, [], 0x1}, 0xffff254f}, @in6={0xa, 0x4e21, 0x5, @empty, 0xde3}, @in6={0xa, 0x4e20, 0x6, @private0, 0x200}], 0x64) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xfffffffffffffffe}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x28}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xb}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @local}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, 'syz1\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 08:01:04 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d246802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xfffffffe}]}}}}}}}, 0x0) 08:01:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x7, 0x5}}}}}}}, 0x0) [ 1178.237776][T20680] __nla_validate_parse: 24 callbacks suppressed [ 1178.237798][T20680] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:01:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)=ANY=[@ANYRESDEC], 0x2c}}, 0x0) 08:01:04 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d247802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10, 0x0, 0x2, 0x0, 0x0, 0xffffffff}]}}}}}}}, 0x0) 08:01:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x4}}}}}}}, 0x0) 08:01:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$RDMA_NLDEV_CMD_RES_GET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x18, 0x1409, 0x10, 0x70bd29, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x18}, 0x1, 0x0, 0x0, 0x40084}, 0x20000080) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f0000000040), &(0x7f0000000080)=0x8) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f00000001c0)=ANY=[@ANYBLOB="44000000170a98697d6bd6d40104000080000000000000000000090001007379797a320c00054000c0040000000000000073797a3000000000020000000000"], 0x6}}, 0x84) [ 1178.530681][T20692] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1178.597030][T20697] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1178.608336][T20695] net_ratelimit: 8 callbacks suppressed [ 1178.608349][T20695] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:01:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6}}}}}}}, 0x0) 08:01:04 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d248802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0xb2}) [ 1178.873881][T20707] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1178.923779][T20711] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:01:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={r1, 0x1c0}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f00000003c0)=0x8) sendto$isdn(0xffffffffffffffff, &(0x7f00000000c0)={0x8e7, 0x101, "4a652eeaa2ffc1da1cb1d2faefc938b82e05bcc3117cbbee4ab00faa2aeea5afb88bd8c4e9c182d230fe3c210765"}, 0x36, 0x404c081, &(0x7f0000000100)={0x22, 0xff, 0xe8, 0x0, 0x5}, 0x6) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r2, 0xfff}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={r2, 0x1c0}, &(0x7f0000000240)=0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f00000002c0)=@in6={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0x42}, 0x5}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000300)="6aa4329104b680ac13dc70d94c1ab77ff5569002b76867a41f380f4aea5e672aa74dbafd50df7da98d6280bad9f77c730a700230b614b7b3f53cf2dcab2058e2a69aaff5251d1ce493a2ca2f0d569020bde1abbfed21ab0e5590a014052322d1fb673d6dc3cf0f19d3bfbb93218ee7d9edecf33565732af608ece2", 0x7b}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="6c7407a64e149a4c244c81496081e6edc2176be5705fb128a8654aee28a24132e96604fa8dfd3fd67a80bb94c872158fdd459dbbe64415bce3dcbd413d62221efba4bb0bc5862fa51f7ee2ce95c4194ecc10184be20bac66187046f7bd1d29cdd56503f368cc75f50ee59b11b9831bdec52d2fe15ed095", 0x77}, {0x0}], 0x4, &(0x7f0000000680)=[@dstaddrv4={0x18}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x20, 0x2, 0x7, 0x1, 0x5, 0x8, 0x4, r1}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x43}}, @sndrcv={0x30, 0x84, 0x1, {0x7108, 0x400, 0x8000, 0x2, 0xe5, 0x3, 0x10000, 0x401, r2}}, @init={0x18, 0x84, 0x0, {0x0, 0x6, 0xffff, 0x6}}], 0xb0}], 0x1, 0x4) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={r2, 0x2}, 0x8) listen(r0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0xb305}, @window={0x3, 0x3}, @mptcp=@ack={0x1e, 0x14, 0x0, 0x4, "d66c326d0fe1bab4d1708634738b8355"}, @generic={0x0, 0xc, "b57446d5385ac739138a"}, @timestamp={0x8, 0xa}, @mptcp=@synack={0x1e, 0x10}]}}}}}}}, 0x0) 08:01:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x2004) 08:01:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7}}}}}}}, 0x0) 08:01:05 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d249802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvfrom(r1, &(0x7f0000000000)=""/189, 0xbd, 0x1, &(0x7f00000000c0)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x80) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002c00)={0x2c, 0x17, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) [ 1179.175711][T20721] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1179.194372][T20723] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:01:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x9}}}}}}}, 0x0) [ 1179.241171][T20724] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:01:05 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d24a802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:01:05 executing program 0: sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)={0x18c, 0x0, 0x500, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void}}, [@fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x40, 0xfa, "f9e0f43c2cf0dc2f086115a8f38eaf007199fba3e82db71b804b339ac46507b81b588cf7f7c4603157183c3a36ea15ad8aea0154f970b9ef4d178eb2"}, @NL80211_ATTR_FILS_ERP_RRK={0x8a, 0xfc, "96c773ca7931a83e3ad1564c6cd32b3d7cd280da55faf72b72b9b603397f932ca72fc01fc04565aeba0ac066046b01cf06bab52e94b85c588c36b4b5dfda622f029d77e26f606ee8a75e995745086ce1663857c992d874c29da99e4b7315f3ca9e0bfbe47e9f22a8a5e8a8d17dd49e63042acf556c39f7d84e91179f6fe1a4dec4158c5ed543"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x7, 0xf9, "a7cee5"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x7}, @NL80211_ATTR_FILS_ERP_REALM={0x67, 0xfa, "7effb7c680f283cea3ea5968a085d41e5ec7f326c817bed87172bce84eb4bc8de9f26982f4e4297c182cd6f8fd9f2245f7bd910f4c6bcbeeee74d46511dfd6d29f1ce94688fffe8c38f5e4ac5697fec8d87ac0d589916e6815b7c242236158dd12e207"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x5}, @NL80211_ATTR_FILS_ERP_USERNAME={0xb, 0xf9, "2603f6d627aaef"}, @NL80211_ATTR_FILS_ERP_USERNAME={0xe, 0xf9, "f47addfa45fe7cd895c4"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x8001}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x2}]]}, 0x18c}, 0x1, 0x0, 0x0, 0x1}, 0x811) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) r1 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=0x60) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000140)={'bridge_slave_1\x00', {0x2, 0x0, @loopback}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x2c, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x4, 'lc\x00', 0x25, 0xc9, 0x33}, 0x2c) listen(r0, 0x0) [ 1179.360625][T20729] divide error: 0000 [#1] PREEMPT SMP KASAN [ 1179.366589][T20729] CPU: 1 PID: 20729 Comm: syz-executor.3 Not tainted 5.10.0-rc4-syzkaller #0 [ 1179.375441][T20729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.385553][T20729] RIP: 0010:__tcp_select_window+0x509/0xa60 [ 1179.391454][T20729] Code: 44 89 ff e8 39 33 fb f9 45 39 e7 0f 8d 20 ff ff ff e8 5b 3b fb f9 44 89 e3 e9 13 ff ff ff e8 4e 3b fb f9 44 89 e0 44 89 e3 99 7c 24 04 29 d3 e9 fc fe ff ff e8 37 3b fb f9 44 89 f1 48 89 ea [ 1179.417400][T20729] RSP: 0018:ffffc90016b679c8 EFLAGS: 00010212 [ 1179.423506][T20729] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc9000f84b000 [ 1179.431488][T20729] RDX: 0000000000000000 RSI: ffffffff8774f4a2 RDI: 0000000000000004 [ 1179.439469][T20729] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff88806421188b [ 1179.447448][T20729] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1179.450214][T20734] IPVS: set_ctl: invalid protocol: 44 172.30.1.1:20003 [ 1179.455419][T20729] R13: 1ffff92002d6cf3d R14: 0000000000000000 R15: 0000000000000000 [ 1179.455435][T20729] FS: 00007f640e7bb700(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000 [ 1179.455452][T20729] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1179.455473][T20729] CR2: 0000000000505150 CR3: 0000000024705000 CR4: 00000000001506e0 [ 1179.493778][T20729] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1179.501747][T20729] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1179.504427][T20734] IPVS: set_ctl: invalid protocol: 44 172.30.1.1:20003 [ 1179.509726][T20729] Call Trace: [ 1179.509751][T20729] ? tcp_schedule_loss_probe+0x70/0x70 [ 1179.509766][T20729] ? do_raw_spin_lock+0x120/0x2b0 [ 1179.509790][T20729] ? mark_held_locks+0x9f/0xe0 [ 1179.535147][T20729] tcp_cleanup_rbuf+0x486/0x5b0 [ 1179.540050][T20729] mptcp_send_ack+0x165/0x1b0 [ 1179.544747][T20729] mptcp_recvmsg+0x1081/0x1ab0 [ 1179.549604][T20729] ? mptcp_timeout_timer+0x1d0/0x1d0 [ 1179.554942][T20729] ? aa_sk_perm+0x316/0xaa0 [ 1179.559555][T20729] inet6_recvmsg+0x11b/0x5d0 [ 1179.564155][T20729] ? inet6_sk_rebuild_header+0xc80/0xc80 [ 1179.569791][T20729] ? bpf_lsm_socket_recvmsg+0x5/0x10 [ 1179.575271][T20729] ? security_socket_recvmsg+0x8f/0xc0 [ 1179.580734][T20729] __sys_recvfrom+0x248/0x3a0 [ 1179.585414][T20729] ? __ia32_sys_send+0x100/0x100 [ 1179.590360][T20729] ? _copy_to_user+0xdc/0x150 [ 1179.595099][T20729] ? put_timespec64+0xcb/0x120 [ 1179.599868][T20729] ? ns_to_timespec64+0xc0/0xc0 [ 1179.604797][T20729] ? __do_sys_futex+0x2a2/0x470 [ 1179.609650][T20729] ? __do_sys_futex+0x2ab/0x470 [ 1179.614513][T20729] __x64_sys_recvfrom+0xdd/0x1b0 [ 1179.619458][T20729] ? lockdep_hardirqs_on+0x79/0x100 [ 1179.624661][T20729] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1179.630583][T20729] do_syscall_64+0x2d/0x70 [ 1179.635010][T20729] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1179.640909][T20729] RIP: 0033:0x45deb9 [ 1179.644839][T20729] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:01:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={r1, 0x1c0}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f00000003c0)=0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8032804}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x10, 0x3fb, 0x100, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x24000815}, 0x40) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r2, 0xfff}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={r2, 0x1c0}, &(0x7f0000000240)=0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f00000002c0)=@in6={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0x42}, 0x5}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000300)="6aa4329104b680ac13dc70d94c1ab77ff5569002b76867a41f380f4aea5e672aa74dbafd50df7da98d6280bad9f77c730a700230b614b7b3f53cf2dcab2058e2a69aaff5251d1ce493a2ca2f0d569020bde1abbfed21ab0e5590a014052322d1fb673d6dc3cf0f19d3bfbb93218ee7d9edecf33565732af608ece2", 0x7b}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="6c7407a64e149a4c244c81496081e6edc2176be5705fb128a8654aee28a24132e96604fa8dfd3fd67a80bb94c872158fdd459dbbe64415bce3dcbd413d62221efba4bb0bc5862fa51f7ee2ce95c4194ecc10184be20bac66187046f7bd1d29cdd56503f368cc75f50ee59b11b9831bdec52d2fe15ed095", 0x77}, {0x0}], 0x4, &(0x7f0000000680)=[@dstaddrv4={0x18}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x20, 0x2, 0x7, 0x1, 0x5, 0x8, 0x4, r1}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @sndrcv={0x30, 0x84, 0x1, {0x7108, 0x400, 0x8000, 0x2, 0xe5, 0x3, 0x10000, 0x401, r2}}, @init={0x18, 0x84, 0x0, {0x0, 0x6, 0xffff, 0x6}}], 0xb0}], 0x1, 0x4) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e22, @remote}}}, 0x84) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0xc, 0x6, 0x5, 0x0, 0x0, {0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0xc0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400008}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x8040000) listen(r0, 0xffffffff) unshare(0x40040080) syz_emit_ethernet(0x7a, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaa0900aaaa00040000bbbb08004500006c0000000000069078ac1408000000000000004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="6c02000090780000020405b30303001e140040d66c326d0fe1bab4d1708634738b8355000cb57446d5385ac739138a080a00000000000000001e102000"/76], 0x0) [ 1179.664975][T20729] RSP: 002b:00007f640e7bac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 1179.673429][T20729] RAX: ffffffffffffffda RBX: 0000000000026cc0 RCX: 000000000045deb9 [ 1179.681405][T20729] RDX: 00000000000000bd RSI: 0000000020000000 RDI: 0000000000000004 [ 1179.689401][T20729] RBP: 000000000118bf78 R08: 00000000200000c0 R09: 0000000000000080 [ 1179.697374][T20729] R10: 0000000000000001 R11: 0000000000000246 R12: 000000000118bf2c [ 1179.705352][T20729] R13: 00007ffefddc91cf R14: 00007f640e7bb9c0 R15: 000000000118bf2c [ 1179.713322][T20729] Modules linked in: 08:01:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xb}}}}}}}, 0x0) [ 1179.761944][T20738] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1179.799873][T20740] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:01:05 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d24b802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1179.864992][T20739] IPVS: ftp: loaded support on port[0] = 21 08:01:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1179.966783][T20748] netlink: 33754 bytes leftover after parsing attributes in process `syz-executor.4'. 08:01:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 08:01:06 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d24c802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1180.088815][T20746] IPVS: ftp: loaded support on port[0] = 21 [ 1180.142119][T20737] divide error: 0000 [#2] PREEMPT SMP KASAN [ 1180.148057][T20737] CPU: 1 PID: 20737 Comm: syz-executor.3 Tainted: G D 5.10.0-rc4-syzkaller #0 [ 1180.158209][T20737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1180.168304][T20737] RIP: 0010:__tcp_select_window+0x509/0xa60 08:01:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x3}}}}}}}, 0x0) [ 1180.174211][T20737] Code: 44 89 ff e8 39 33 fb f9 45 39 e7 0f 8d 20 ff ff ff e8 5b 3b fb f9 44 89 e3 e9 13 ff ff ff e8 4e 3b fb f9 44 89 e0 44 89 e3 99 7c 24 04 29 d3 e9 fc fe ff ff e8 37 3b fb f9 44 89 f1 48 89 ea [ 1180.193998][T20737] RSP: 0018:ffffc90016ccf9c8 EFLAGS: 00010216 [ 1180.200097][T20737] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc9000fa4c000 [ 1180.208084][T20737] RDX: 0000000000000000 RSI: ffffffff8774f4a2 RDI: 0000000000000004 [ 1180.216066][T20737] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff8880642123cb [ 1180.224045][T20737] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1180.232027][T20737] R13: 1ffff92002d99f3d R14: 0000000000000000 R15: 0000000000000000 [ 1180.240013][T20737] FS: 00007f640e79a700(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000 [ 1180.248952][T20737] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1180.255559][T20737] CR2: 0000001b2f122000 CR3: 0000000024705000 CR4: 00000000001506e0 [ 1180.263533][T20737] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1180.271529][T20737] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1180.279678][T20737] Call Trace: [ 1180.282977][T20737] ? tcp_schedule_loss_probe+0x70/0x70 [ 1180.288441][T20737] ? do_raw_spin_lock+0x120/0x2b0 [ 1180.293468][T20737] ? rwlock_bug.part.0+0x90/0x90 [ 1180.298417][T20737] ? lock_downgrade+0x6d0/0x6d0 [ 1180.303285][T20737] tcp_cleanup_rbuf+0x486/0x5b0 [ 1180.308150][T20737] mptcp_send_ack+0x165/0x1b0 [ 1180.312832][T20737] mptcp_recvmsg+0x1081/0x1ab0 [ 1180.317596][T20737] ? lock_acquire+0x2e5/0x8c0 [ 1180.322276][T20737] ? mptcp_timeout_timer+0x1d0/0x1d0 [ 1180.327564][T20737] ? aa_sk_perm+0x316/0xaa0 [ 1180.332097][T20737] inet6_recvmsg+0x11b/0x5d0 [ 1180.336692][T20737] ? inet6_sk_rebuild_header+0xc80/0xc80 [ 1180.342328][T20737] ? bpf_lsm_socket_recvmsg+0x5/0x10 [ 1180.347614][T20737] ? security_socket_recvmsg+0x8f/0xc0 [ 1180.353084][T20737] __sys_recvfrom+0x248/0x3a0 [ 1180.357766][T20737] ? __ia32_sys_send+0x100/0x100 [ 1180.362779][T20737] ? ktime_get_ts64+0x296/0x2e0 [ 1180.367776][T20737] ? trace_hardirqs_on+0x5b/0x1c0 [ 1180.372812][T20737] ? _copy_to_user+0xdc/0x150 [ 1180.377493][T20737] ? put_timespec64+0xcb/0x120 [ 1180.382256][T20737] ? ns_to_timespec64+0xc0/0xc0 [ 1180.387108][T20737] ? __do_sys_futex+0x2a2/0x470 [ 1180.391962][T20737] ? __do_sys_futex+0x2ab/0x470 [ 1180.396914][T20737] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1180.402211][T20737] ? __x64_sys_clock_gettime+0x16f/0x260 [ 1180.407862][T20737] __x64_sys_recvfrom+0xdd/0x1b0 [ 1180.412806][T20737] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1180.418726][T20737] do_syscall_64+0x2d/0x70 [ 1180.423151][T20737] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1180.429153][T20737] RIP: 0033:0x45deb9 [ 1180.433050][T20737] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1180.452661][T20737] RSP: 002b:00007f640e799c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 1180.461084][T20737] RAX: ffffffffffffffda RBX: 0000000000026cc0 RCX: 000000000045deb9 [ 1180.469156][T20737] RDX: 00000000000000bd RSI: 0000000020000000 RDI: 0000000000000004 [ 1180.477141][T20737] RBP: 000000000118c020 R08: 00000000200000c0 R09: 0000000000000080 [ 1180.485523][T20737] R10: 0000000000000001 R11: 0000000000000246 R12: 000000000118bfd4 [ 1180.493534][T20737] R13: 00007ffefddc91cf R14: 00007f640e79a9c0 R15: 000000000118bfd4 [ 1180.501514][T20737] Modules linked in: 08:01:06 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000004c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0a84000035000511d24d802a8c63940d0124fc601003d0400c0002000200000037153e370a00018004000000d1bd", 0x33fe0}], 0x1}, 0x0) [ 1180.578995][T20737] ---[ end trace 350cb2b891f3e7c9 ]--- [ 1180.585275][T20737] RIP: 0010:__tcp_select_window+0x509/0xa60 [ 1180.592382][T20737] Code: 44 89 ff e8 39 33 fb f9 45 39 e7 0f 8d 20 ff ff ff e8 5b 3b fb f9 44 89 e3 e9 13 ff ff ff e8 4e 3b fb f9 44 89 e0 44 89 e3 99 7c 24 04 29 d3 e9 fc fe ff ff e8 37 3b fb f9 44 89 f1 48 89 ea [ 1180.647452][T20737] RSP: 0018:ffffc90016b679c8 EFLAGS: 00010212 [ 1180.653929][T20737] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc9000f84b000 [ 1180.686634][T20737] RDX: 0000000000000000 RSI: ffffffff8774f4a2 RDI: 0000000000000004 [ 1180.696793][T20803] validate_nla: 21 callbacks suppressed [ 1180.696804][T20803] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1180.710937][T20737] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff88806421188b [ 1180.719472][T20737] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1180.730795][T20806] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1180.739015][T20737] R13: 1ffff92002d6cf3d R14: 0000000000000000 R15: 0000000000000000 [ 1180.747613][T20737] FS: 00007f640e79a700(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000 [ 1180.776192][T20737] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1180.791155][T20737] CR2: 000000000118c000 CR3: 0000000024705000 CR4: 00000000001506e0 [ 1180.809341][T20737] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1180.824862][T20737] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1180.842518][T20737] Kernel panic - not syncing: Fatal exception [ 1180.849282][T20737] Kernel Offset: disabled [ 1180.853654][T20737] Rebooting in 86400 seconds..