7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0xf}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x48}}, 0x0) 14:15:54 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x7400}}}}}}}, 0x0) 14:15:54 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:15:54 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 932.886507] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 932.914617] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:15:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x7a00}}}}}}}, 0x0) 14:15:54 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x10}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) [ 933.073002] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:15:54 executing program 5: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x2c00}}], 0xc6, 0x0) 14:15:54 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x1100}], 0xc6, 0x0) 14:15:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0xffff}}}}}}}, 0x0) 14:15:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) 14:15:54 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x60}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) [ 933.384234] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:15:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:54 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0xf0}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 933.459689] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:15:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) 14:15:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00'], 0x0) 14:15:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:15:55 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x2000}], 0xc6, 0x0) 14:15:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) 14:15:55 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x118}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:15:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r4, 0xc0105303, &(0x7f00000000c0)={0x4, 0x4, 0x10}) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000000)=0x7ff) r5 = socket$nl_rdma(0x10, 0x3, 0x14) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000180)={0x80000000, 0x1, 0x1, 'queue0\x00', 0x6}) listen(r0, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000340)=ANY=[@ANYRES32=r7, @ANYRESDEC=r0, @ANYRES32=0x41424344, @ANYBLOB="5002c646385e0000"], 0x0) 14:15:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:15:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) [ 934.360545] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:15:55 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x300}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0xfffffffffffffffe, 0x0) [ 934.644514] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:15:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x500}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:15:56 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x2100}], 0xc6, 0x0) 14:15:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:15:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:15:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2, 0x0, 0x0, 0x4042880}], 0x1, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/145, 0x91}], 0x1}, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local, 0x800}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:15:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaa46cc00086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) 14:15:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:15:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x600}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:15:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x80, 0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:15:56 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x2b00}], 0xc6, 0x0) 14:15:56 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x900}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:15:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) 14:15:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0xff, @private2={0xfc, 0x2, [], 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:15:57 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x922}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$snddsp(r2, &(0x7f0000000180)=""/79, 0x4f) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:15:57 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:15:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) 14:15:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0xa00}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:57 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x2c00}], 0xc6, 0x0) 14:15:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 14:15:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) 14:15:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:15:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 14:15:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) 14:15:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0xb00}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:57 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x3300}], 0xc6, 0x0) 14:15:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$MON_IOCQ_URB_LEN(r2, 0x9201) 14:15:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 14:15:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) 14:15:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0xc00}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x44}}, 0x0) 14:15:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 14:15:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0xe00}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:15:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0x3f97}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x1, 0x100, 0x80, 0x9, 0x1000, 0x9}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:15:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) 14:15:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0xf00}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 14:15:58 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x3a00}], 0xc6, 0x0) 14:15:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 14:15:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) [ 937.534582] net_ratelimit: 7 callbacks suppressed [ 937.534593] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:15:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:15:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x1801}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:15:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={0x0}}, 0x0) 14:15:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x48}}, 0x0) [ 937.856552] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 937.960142] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:15:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:15:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={0x0}}, 0x0) 14:15:59 executing program 1: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x2c00}], 0xc6, 0x0) 14:15:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) timer_create(0x1, &(0x7f0000000000)={0x0, 0x3a, 0x2, @thr={&(0x7f0000000180)="1ff3d4cc79425545b0288dc28c428509063844023749b7b8d36b39e6c846eff5e843aba8bbd5d65c6c3a7df7faad962da31f5bb57f98981be5b8484bbe8a820c98627afe38091f37d02a65a3930a7e20dcd4e3ce1a95bedef1f759a78044e40e18b93e83c0d0053b86d3271accdf9c1376f6ff3c600aa24026b491883afc52a015dcea964b98650d882cc5f1ce94a450a228478f053df8fb0d3f1a0b7b87ffcd22f2e1f809f2d8ae1e70a7041933bbc0dde901cacc2b35ac3ef7ecffb005d0c5978a41c18f2161aaf4c7cf4bd503727808a27ff5e32a191b55a08918687175839659134d2f36f26508b8290a5119b87bfd6963c4100d75", &(0x7f0000000280)="c1d26290f95f358ae26b003e7ea2f06b151709d3fd67b54825f6e2075d44b46e0ce526339db2c7f7b3d8b17dec641d34039d6153c326d8487a1cfdbe1db84a49e30efd50c392f2fbba52"}}, &(0x7f00000000c0)=0x0) timer_getoverrun(r1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r3 = accept(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000300)='dctcp-reno\x00', 0xb) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:15:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x1f00}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:15:59 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x3b00}], 0xc6, 0x0) [ 938.468844] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:15:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={0x0}}, 0x0) 14:16:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x121802, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x4) syz_emit_ethernet(0x4a, &(0x7f00000002c0)=ANY=[@ANYBLOB="724e7244bbab114c0aaaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe800000570000f65d1de0d73c3af505970000000000000000bbfe80000000000000000000", @ANYRES32=0x41424344, @ANYRESDEC, @ANYBLOB="501200008f000000e1c2377ebdd5840957388d3b4086aff5fcafe0cf14cf5b198598558222ff69d3eaf7c8faf0765cdb41ef8069eebc23f1af36cca184d0e36e2a000260320f1d7e1b3ae7e483", @ANYRES64=r2, @ANYRESDEC, @ANYRES16=r0], 0x0) 14:16:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x2000}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x0, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x2209}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:00 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x3c00}], 0xc6, 0x0) 14:16:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x800000003, 0x0) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@broadcast, @dev={[], 0x1}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x80, 0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x0, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x5865}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x41}, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="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"], 0x0) 14:16:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x0, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 939.512327] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x44}}, 0x0) 14:16:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x80, 0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x6000}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x26, 0xa, 0x80000000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r3 = accept(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x8, 0xd4, 0xffff4ae8, 0x800, 0x3}, &(0x7f0000000400)=0x14) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e23, @broadcast}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r5, 0xff8f, 0x5}, &(0x7f0000000240)=0x8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 939.894732] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 939.964341] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x44}}, 0x0) 14:16:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x800000003, 0x0) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x6558}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x80, 0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:01 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x3f00}], 0xc6, 0x0) 14:16:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x44}}, 0x0) 14:16:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') r4 = socket(0x11, 0x3, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000ac0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000180)={0x8e0, r3, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x9}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x5e0, 0x8, 0x0, 0x1, [{0x394, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x5}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7}, @WGPEER_A_ALLOWEDIPS={0x370, 0x9, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x41}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @rand_addr=0x64010101}}, {0x5, 0x3, 0x1}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @broadcast}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x26}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x401}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}]}, {0x20, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @loopback}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}]}, {0x1a8, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x6}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x5, @loopback, 0x989}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @broadcast}}, @WGPEER_A_ALLOWEDIPS={0x148, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x17}}, {0x5, 0x3, 0x2}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, [], 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x43}}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x1, @ipv4={[], [], @empty}, 0x20}}]}, {0x58, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "4ed16836ad86b2b3e8145f50b9a61f7197fa947b39a2eb2d557e8e58d1a3ae3b"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @rand_addr=0x64010100}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @loopback}}]}]}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b='\xb0\x80s\xe8\xd4N\x91\xe3\xda\x92,\"C\x82D\xbb\x88\\i\xe2i\xc8\xe9\xd85\xb1\x14):M\xdcn'}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r5}, @WGDEVICE_A_PEERS={0x27c, 0x8, 0x0, 0x1, [{0x84, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xfffe}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x38}, 0x1000}}]}, {0x3c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @multicast1}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "df4d162d98a8ca90ab42c2107ecac5a01391a498d5ae2e182ef7e2495305eb6c"}]}, {0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "791a691b70d71c6c87f7c7748a58ac1103da7cbcd23d07dbfbebc7c2560d35a6"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x1}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x1000}]}, {0x68, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x5, @private2, 0x80}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "a74775d27db1f5b499432249e9ed2b036bed387a5671c2b25c961e7994d63f6c"}]}, {0x90, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xf9}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "bcdd2d895bee897b07fb83f110c490f664929f7e2a9533dd08156c27f20f83bb"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x7, @mcast2, 0x10000}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @multicast2}}]}, {0x74, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "ba0776f2061323bc80618fc5f4c8ef45a978d7891b725433fe821f261beeccf7"}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x101, @remote, 0x7da}}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x8e0}, 0x1, 0x0, 0x0, 0x90}, 0x4000000) 14:16:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x48}}, 0x0) [ 940.321611] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 940.339318] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x80, 0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x8100}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x48}}, 0x0) 14:16:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x80, 0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x48}}, 0x0) 14:16:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x800000003, 0x0) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0xf000}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x80, 0x2, 0x0, 0x2}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:02 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x4000}], 0xc6, 0x0) 14:16:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x44}}, 0x0) 14:16:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x80, 0x2, 0x0, 0x2}) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x44}}, 0x0) 14:16:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x80, 0x2, 0x0, 0x2}) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x44}}, 0x0) 14:16:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x80, 0x2, 0x0, 0x2}) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x48}}, 0x0) 14:16:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:03 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x6000}], 0xc6, 0x0) 14:16:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x48}}, 0x0) [ 942.145106] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) dup(r1) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x48}}, 0x0) 14:16:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) dup(r1) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x3}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 942.545149] net_ratelimit: 1 callbacks suppressed [ 942.545162] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) dup(r1) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x4}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:04 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x6800}], 0xc6, 0x0) 14:16:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x48}}, 0x0) [ 943.041438] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) socket$nl_rdma(0x10, 0x3, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x5}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x48}}, 0x0) [ 943.228886] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x48}}, 0x0) 14:16:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) socket$nl_rdma(0x10, 0x3, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 943.549716] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x8}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:05 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x80fe}], 0xc6, 0x0) 14:16:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) socket$nl_rdma(0x10, 0x3, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x44}}, 0x0) [ 943.909107] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x44}}, 0x0) 14:16:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x44}}, 0x0) [ 944.103438] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x48}}, 0x0) 14:16:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xa}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 944.387686] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 944.641525] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:06 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xac05}], 0xc6, 0x0) 14:16:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x48}}, 0x0) 14:16:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xb}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x48, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x48}}, 0x0) 14:16:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xc}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2, 0x0, 0x0, 0x4042880}], 0x1, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/145, 0x91}], 0x1}, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local, 0x800}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:06 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xe}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:06 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xc0fe}], 0xc6, 0x0) 14:16:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0xfffffffffffffffe, 0x0) 14:16:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:06 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 945.550814] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:06 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xf}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local={0xfe, 0x80, [0x0, 0x0, 0x7a]}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0xc0}}, 0x0) 14:16:07 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x10}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:07 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x8000000, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:07 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xc500}], 0xc6, 0x0) 14:16:07 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x60}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:07 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xf0}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x118}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x9, 0x0, 0x2, 0x1f}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000000c0)={0x101, r3, 0x2, 0x4}) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x7fff, 0x141000) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x300}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 947.103095] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:08 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xe803}], 0xc6, 0x0) 14:16:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:08 executing program 4: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x9}}], 0xc6, 0x0) 14:16:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000000)={0xe4, 0x2b, {r3}, {r5}, 0xffffffffffffffe0, 0x7}) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r6) 14:16:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x500}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x600}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) [ 947.874691] net_ratelimit: 1 callbacks suppressed [ 947.874703] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:09 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xf401}], 0xc6, 0x0) 14:16:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x900}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:09 executing program 4: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setfsgid(0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsgid(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsgid(r5) getgroups(0x4, &(0x7f0000000300)=[0x0, 0x0, r3, r5]) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r6 = accept(r1, 0x0, 0x0) sendmmsg$alg(r6, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000000)={0x2}, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) [ 948.111334] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 948.200612] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x922}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 948.292821] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x400) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 948.497310] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x94881, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0xb, 0x5, 0x0, 0x0, {0xa}, [@NFTA_COMPAT_NAME={0x9, 0x1, '+(!+\x00'}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x20008040) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 948.721889] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:10 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xfc00}], 0xc6, 0x0) 14:16:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xa00}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe80000000000000001e00f5ffffff9700004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) 14:16:10 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0xb, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 948.984751] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:10 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x6, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x8, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x400c00) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0007000000060000140600fe8000000000000000000000000000bbfe800000000000e99638cfdd33217eea0000000000000000aa00004e22596bd631cf80b311c4cdd610da42f07030df9ab3a23c8920b8fd6b3f7ae5b4e687900c773a56b1ee51ec24d3e42f8bd629d9ae47d0b3516ed8e494aac3924c734f3b8e54d1fadfc31d", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYRESHEX=r1], 0x0) 14:16:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) [ 949.082081] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xb00}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 949.374018] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:10 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xfe80}], 0xc6, 0x0) 14:16:10 executing program 4 (fault-call:4 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="40000000100001041100000000deffff79c9ff00", @ANYRES16, @ANYBLOB="0000000000000000200012800b0001006272696467650000100002800a0014", @ANYRES64], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50020000907800002e0600bdcbe2ca67a9216ed9fbf49cf3791cabb601fb2a69f545214d80b5fadd4f022ae8e1dc970b92ebb21563c260c894f1371df3a27e8ab8b55483c1aa985d055a41648dbdb685c6e2292e8d3840f69d6a7d43b97861de0514ee47547faf467e0e3f63a777bfde0db44f0a11a172a3adc9509fc3cf1648577fff0ec4946707f0de4971b0ad65104595f7ef12623574fd4b859bc36ad2a3e5b6c3c8c5ff586b0d77d067d227fa4387231d9405f63b6ff0554a17c41ca94cb4120eeffb2631ce0843b0b52fd18051b8689b8c3f618820a399e96f3969ca389f401a2dae0080ed1dbd02892b4ad3a6eadd531984a47378e0989b289dc61691f41406b4745fd8277eb0da08f3bd965eb2aac5454448e08746008ccbcae4453be4e793b71e"], 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r3 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x3e) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=ANY=[@ANYBLOB="04000000", @ANYRES16=r5, @ANYRES64, @ANYRES32=r7, @ANYBLOB="d00d6c8dcc321a4d997e1c63e050fa1c7fd6882dc7a76caa65876c9c39859bc9ba79e5f391403e77852fe572544e6fa78c96bd8711558c83f22eac3765b36795486356573ee3f3a4dcfed4a3a5dd848937dc9d76ef41ff7c58ba0506cd3c3ef0ec15ad0f45424ad0d0aa1b901b4cb3cfbb"], 0x1c}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r3, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="0004", @ANYRES16=r5, @ANYBLOB="000126bd7000fbdbdf251000000005002a000000000008003b0005000000060028000100000008003a000500000008003a001c000000"], 0x3c}, 0x1, 0x0, 0x0, 0x8014}, 0x4000000) 14:16:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xc00}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 949.706782] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 949.719785] FAULT_INJECTION: forcing a failure. [ 949.719785] name failslab, interval 1, probability 0, space 0, times 0 [ 949.736433] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. [ 949.800271] CPU: 1 PID: 11577 Comm: syz-executor.4 Not tainted 4.19.134-syzkaller #0 [ 949.808200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.817566] Call Trace: [ 949.820170] dump_stack+0x1fc/0x2fe [ 949.823824] should_fail.cold+0xa/0x14 [ 949.827732] ? setup_fault_attr+0x200/0x200 [ 949.832073] ? lock_acquire+0x170/0x3c0 [ 949.836063] __should_failslab+0x115/0x180 [ 949.840313] should_failslab+0x5/0xf [ 949.844042] kmem_cache_alloc_node+0x245/0x3b0 [ 949.848643] __alloc_skb+0x71/0x560 [ 949.852287] netlink_sendmsg+0x9ee/0xc40 [ 949.856368] ? nlmsg_notify+0x1a0/0x1a0 [ 949.860355] ? kernel_recvmsg+0x220/0x220 [ 949.864533] ? nlmsg_notify+0x1a0/0x1a0 [ 949.868522] sock_sendmsg+0xc3/0x120 [ 949.872255] ___sys_sendmsg+0x7bb/0x8e0 [ 949.876243] ? check_preemption_disabled+0x41/0x280 [ 949.881292] ? copy_msghdr_from_user+0x440/0x440 [ 949.886068] ? __fget+0x32f/0x510 [ 949.889534] ? lock_downgrade+0x720/0x720 [ 949.893689] ? check_preemption_disabled+0x41/0x280 [ 949.898714] ? check_preemption_disabled+0x41/0x280 [ 949.903747] ? __fget+0x356/0x510 [ 949.907214] ? do_dup2+0x450/0x450 [ 949.910764] ? lock_downgrade+0x720/0x720 [ 949.914927] ? vfs_write+0x3d7/0x540 [ 949.918657] ? __fdget+0x1d0/0x230 [ 949.922213] __x64_sys_sendmsg+0x132/0x220 [ 949.926456] ? __sys_sendmsg+0x1b0/0x1b0 [ 949.930528] ? vfs_write+0x393/0x540 [ 949.934263] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 949.939026] ? trace_hardirqs_off_caller+0x69/0x210 [ 949.944055] ? do_syscall_64+0x21/0x620 [ 949.948042] do_syscall_64+0xf9/0x620 [ 949.951854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.957048] RIP: 0033:0x45c369 [ 949.960244] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 949.979153] RSP: 002b:00007f9961216c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 949.986871] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045c369 14:16:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 949.994148] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 950.001421] RBP: 00007f9961216ca0 R08: 0000000000000000 R09: 0000000000000000 [ 950.008695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 950.015748] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. [ 950.015970] R13: 00007ffeedafc8bf R14: 00007f99612179c0 R15: 000000000078bf0c 14:16:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="80000000000700000000000000000000030000090c00024000000000000000000c00034000000000000000040c00024000000000000001000c0006400000000000000fff0c00078008000140000000092400078008000140000000d5080002400d9f3bd2080001405ecefe5f08000140fffffff70900010073797a3000000000a6b8a470e32bac7083b811e8e6e72262470155fad9aecea435c32d9b4c7d0a90e6ba84d613b37a9ae005ffd878"], 0x80}, 0x1, 0x0, 0x0, 0x4000080}, 0x8001) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) r2 = socket$nl_rdma(0x10, 0x3, 0x14) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000000b0108000000004e010563aa2b04069bad4865f31a0f65bc7ed4c2813a190a6453ce7eeb0fb7e9c6e403bd20ba75c90ceb34dfdb9060c20ffffdcd0224d9fb5ff5a980a58bc18b4080812186d8d5de63138c56981a000000fb029b3446af6c84375e02000000631784f932c3dc401ac43c1c30ef98b60c4bd6cbac57963655654103884b052fc0fb0b64652dd3989bf0b94c7d2ad43dab744e909a125f"], 0x14}}, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xe00}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:11 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xfec0}], 0xc6, 0x0) 14:16:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="fcffffff", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={r3, 0x8, 0xd4, 0xffff4ae8, 0x800, 0x3}, &(0x7f0000000400)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000000)={r3, 0x1, 0x20, 0x43, 0x800}, &(0x7f00000000c0)=0x18) r4 = socket$nl_rdma(0x10, 0x3, 0x14) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r5, 0x80247009, &(0x7f0000000280)) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002007b985975417d5e34092ec614df4e00"], 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x8000, 0x0) ioctl$PPPIOCGMRU(r6, 0x80047453, &(0x7f0000000200)) 14:16:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xf00}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = gettid() r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r3 = accept(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180)='NLBL_CIPSOv4\x00') getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x5f, "8bbb3979c03b2fa34ed30596aee3817e82cbe300bcbdcd00a4feda51752c4c982cdff81364f715cee8135744ab6960e272e56779693d0e3454c8bb22adaf67b34eae82cd23e215c56ef54813bab8e94a7b09a6a24cd36687553fecb1665b60"}, &(0x7f0000000280)=0x67) sendmsg$NLBL_CIPSOV4_C_LISTALL(r3, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r4, @ANYBLOB="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"], 0x19c}, 0x1, 0x0, 0x0, 0x40c8090}, 0x100) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x1, r1}) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x1801}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e2200"/58, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) 14:16:12 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xff00}], 0xc6, 0x0) 14:16:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x2, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r5, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x5c}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x3f}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000000)) 14:16:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x1f00}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x3, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x2000}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r1, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x2, 0x840) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x4, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:13 executing program 5: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:13 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x20480}], 0xc6, 0x0) 14:16:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x2209}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x8, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="8a0bab9910c2d36c"], 0x0) 14:16:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x20000000, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xa, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x5865}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x100, 0x0) sendmsg$AUDIT_USER(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) semget(0x3, 0x4, 0x222) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:13 executing program 5: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:13 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x34000}], 0xc6, 0x0) 14:16:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xe, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x6000}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd00000000000000000000000000feffffff00000000000000000000004285b93c7d998100aa00004e2281d62470ab4088c6c1a53400abf3ffbbd4bd55872d586526351e986b0c10e116e0dca998e202539a5aac6b14c5b9060958dbcf67961d2a1bb633c3f73252eeddbf0dfe420d94e14442c561d4a63c52db4bb4f17cb9ed039cccbc463253847dc4cfbceb86363d2e5b31938af2507a673137b8f5241e880f304c84beaa0b2696e817d85ece6bfe89abea35f764cb1e2abb69d1349869c7e37856906486ac1e7a20e967e81e18418a7f81531b81456edc3f155687413df4ce732c9360da0000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50635e87620200b3f95fe31994fcb49078000016bd99aaddcbbae1d38ea48f9d8c0ef474e26a3a394f54b39b73aeda942b1b8197eaf471091bcb677fe30554c80312dbdced621a67bc28ce93302bcffc3732a117f2895066ec766f5535d7169cd4d5fdd1ad7c645128b959c40128dbb253ef3f7ff95a0fa0846d2263650ac40b5ee349097651d3620376b89449058a9ecd4a35ca147447b0777d40bba09483"], 0x0) 14:16:13 executing program 5: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r2}, 0x8) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000000)={0x1ff, 0x80, 0x8, 0x3}) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000100)={0x3f97}) ioctl$TIOCMGET(r3, 0x5415, &(0x7f00000000c0)) 14:16:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 14:16:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x60, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x6558}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:14 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x40000}], 0xc6, 0x0) 14:16:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 14:16:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xc2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x300, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x8100}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:14 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) [ 953.186212] net_ratelimit: 8 callbacks suppressed [ 953.186225] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 14:16:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xa00, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 953.233634] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xf000}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0xc0000) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000180)={&(0x7f00000000c0)=[0x7ff, 0x4, 0xfffffffe, 0x4, 0x4], 0x5, 0x5, 0x9, 0x5, 0x1, 0x537, 0x2, {0x401, 0x0, 0x8, 0x5, 0x5, 0x5, 0x6, 0xb187, 0x7f, 0xa000, 0xa8, 0x81, 0x10001, 0x3ff, "53425d6fbae30f628b2cb3c08e647f4e8108ddc9a772493930b3ed7e02485293"}}) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 953.497519] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 953.571087] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:15 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x100000}], 0xc6, 0x0) 14:16:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xc34, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:15 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000fe8000000000000019000000100000aa00004e2200", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) 14:16:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xe00, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f00000000c0)={0x0, 0x200, 0x1, [], &(0x7f0000000000)=0x4}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000180)={@local, @dev, @val={@val={0x9100, 0x4, 0x1, 0x1}, {0x8100, 0x5}}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:15 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:16:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:15 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x200000}], 0xc6, 0x0) 14:16:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf00, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:16:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup(r3) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f00000001c0)={'filter\x00', 0x5a, "c143fb97de82143934319a70bb35fb1272140f08179410d8a571db31745b49e7d890db6db37e1c993a1b345b343257e7f2dbeacf873578df3452919299d01ee1e3ac3c637d3d279ff0179ecec5232c213cfc706cb60b9974444b"}, &(0x7f0000000240)=0x7e) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f0000000000)={0x8d9, {0x0, 0x2, 0x0, 0x46c, 0x3, 0x3}}) 14:16:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x340c, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:16:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaac3aaaaaaaaaaaa0000000000000000000000bbfe808b6973da406997d40000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) 14:16:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x6000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:15 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10000}, 0x1c) listen(r0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000019c0)={&(0x7f0000001700)={0x284, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_FEATURES_WANTED={0x264, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xc0, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\'\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '#-#\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x81}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ')&-+\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffc}, @ETHTOOL_A_BITSET_BIT_NAME={0x19, 0x2, 'cpuacct.usage_percpu\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x7d, 0x4, "40cda962e002d0f00cb8dd4ad71bb5542c47a17d827cd306743a16ee7d7a04a32aeee1b11965ffde4cf4a47c5bfbf72008910ed6b478011edc42f40955b28afde3eda406ed2a78a4ec0b2454f0273436c016c5a46851c643e73259743548399a9b46235f637cb0b680ac9fb781566c47fa7049b9b349b7dc05"}, @ETHTOOL_A_BITSET_VALUE={0x6b, 0x4, "4f5c034b62944f645ab3c6bf24331951ac30f5ba09b63864b43136abe55b1102a0792b7059cc02ca59d6ef397cca2ecc20f2776c3ac8cc2ed774e8156f7e91514b8a96a1fb42de8e9175a3599b8293937eef134adc3380ca8d812fb3faf3731bd7dbebc4054823"}, @ETHTOOL_A_BITSET_BITS={0x84, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '#/@\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x19, 0x2, 'cpuacct.usage_percpu\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x19, 0x2, 'cpuacct.usage_percpu\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x16}, @ETHTOOL_A_BITSET_BIT_NAME={0x19, 0x2, 'cpuacct.usage_percpu\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8171}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}]}]}, 0x284}, 0x1, 0x0, 0x0, 0x440c4}, 0x4044800) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r6 = socket(0x11, 0x3, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb0, 0x0, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x80}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0xee}, @ETHTOOL_A_LINKINFO_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x2}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x20}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:16 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x400300}], 0xc6, 0x0) 14:16:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x3}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:16 executing program 1 (fault-call:7 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 954.920637] FAULT_INJECTION: forcing a failure. [ 954.920637] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:16:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf0ffff, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 954.989179] CPU: 0 PID: 11946 Comm: syz-executor.1 Not tainted 4.19.134-syzkaller #0 [ 954.997109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.006480] Call Trace: [ 955.009091] dump_stack+0x1fc/0x2fe [ 955.012832] should_fail.cold+0xa/0x14 [ 955.016751] ? setup_fault_attr+0x200/0x200 [ 955.021096] ? lock_downgrade+0x720/0x720 [ 955.025264] ? mark_held_locks+0xf0/0xf0 [ 955.029341] ? check_preemption_disabled+0x41/0x280 [ 955.034383] __alloc_pages_nodemask+0x239/0x2890 [ 955.039159] ? ima_match_policy+0xa00/0x12e0 [ 955.043588] ? __lock_acquire+0x6de/0x3ff0 [ 955.047844] ? lock_downgrade+0x720/0x720 [ 955.052000] ? lock_acquire+0x170/0x3c0 [ 955.055987] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 955.060852] ? mark_held_locks+0xf0/0xf0 [ 955.064935] ? __lock_acquire+0x6de/0x3ff0 [ 955.069186] ? __lock_acquire+0x6de/0x3ff0 [ 955.073507] ? tun_build_skb+0x1e0/0x1960 [ 955.077676] alloc_pages_current+0x193/0x2a0 [ 955.082099] skb_page_frag_refill+0x258/0x550 [ 955.086612] tun_build_skb+0x25e/0x1960 [ 955.090609] ? tun_xdp_xmit+0x7c0/0x7c0 [ 955.094604] ? __lock_acquire+0x6de/0x3ff0 [ 955.098860] tun_get_user+0x839/0x4be0 [ 955.102780] ? tun_chr_read_iter+0x1d0/0x1d0 [ 955.107208] ? lock_downgrade+0x720/0x720 [ 955.111378] ? lock_downgrade+0x720/0x720 [ 955.115538] ? check_preemption_disabled+0x41/0x280 [ 955.120571] ? check_preemption_disabled+0x41/0x280 [ 955.125614] tun_chr_write_iter+0xb0/0x150 [ 955.129875] __vfs_write+0x51b/0x770 [ 955.133606] ? kernel_read+0x110/0x110 [ 955.137516] ? selinux_file_permission+0x87/0x5f0 [ 955.142374] ? security_file_permission+0x1c0/0x220 [ 955.147415] vfs_write+0x1f3/0x540 [ 955.150971] ksys_write+0x12b/0x2a0 [ 955.154610] ? __ia32_sys_read+0xb0/0xb0 [ 955.158681] ? posix_timer_fn+0x3d0/0x3d0 [ 955.162839] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 955.167601] ? trace_hardirqs_off_caller+0x69/0x210 [ 955.172631] ? do_syscall_64+0x21/0x620 [ 955.176626] do_syscall_64+0xf9/0x620 [ 955.180453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 955.185654] RIP: 0033:0x415e21 [ 955.188856] Code: 75 14 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 c4 1b 00 00 c3 48 83 ec 08 e8 ca fc ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 13 fd ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 955.207769] RSP: 002b:00007f82de469c60 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 955.215490] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 0000000000415e21 [ 955.222769] RDX: 000000000000004a RSI: 0000000020000100 RDI: 00000000000000f0 [ 955.230049] RBP: 00007f82de469ca0 R08: 0000000000000000 R09: 0000000000000000 [ 955.237330] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000000 [ 955.244621] R13: 00007fff262aab5f R14: 00007f82de46a9c0 R15: 000000000078bf0c 14:16:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x1000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 955.320845] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:16 executing program 1 (fault-call:7 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60409262a5f9ee0db58f2e99f90f0600001406b714488224ff1fc00000000000000000bbfe8417800000000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) sendto$inet6(r2, &(0x7f0000000180)="85828e587e8a51c5902ead6a013b490f84851f277d40c9f54e9a5b3cd2a9fbf486308a1080fa2692a00f9f5398a390f64dc25d9b7df4b40513e2a2fd6515c447ef738772d7e660fa7c9120b7ee44ee4ec2d3197ffe4af03cf8c7dd83289f06c2e8fadc620cb366c898424b3ba530da9387ea6982bf989e1717639a546ad3839ed89c7b5b7417e9c87074aa39e61a53dfb69c4810d1fd5d25fb6ce95914ec0301b011ffb4e7c1", 0xa6, 0x64010, 0x0, 0x0) 14:16:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x2000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 955.476120] FAULT_INJECTION: forcing a failure. [ 955.476120] name failslab, interval 1, probability 0, space 0, times 0 [ 955.487440] CPU: 1 PID: 11974 Comm: syz-executor.1 Not tainted 4.19.134-syzkaller #0 [ 955.495335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.504703] Call Trace: [ 955.507310] dump_stack+0x1fc/0x2fe [ 955.510964] should_fail.cold+0xa/0x14 [ 955.514871] ? __might_fault+0x11f/0x1d0 [ 955.518953] ? setup_fault_attr+0x200/0x200 [ 955.523297] ? lock_downgrade+0x720/0x720 [ 955.527460] ? lock_acquire+0x170/0x3c0 [ 955.531456] __should_failslab+0x115/0x180 [ 955.535708] should_failslab+0x5/0xf [ 955.539442] kmem_cache_alloc+0x3f/0x370 [ 955.543532] __build_skb+0x39/0x300 [ 955.547273] build_skb+0x1c/0x190 [ 955.550753] tun_build_skb+0x51b/0x1960 [ 955.554751] ? tun_xdp_xmit+0x7c0/0x7c0 [ 955.558749] ? __lock_acquire+0x6de/0x3ff0 [ 955.563014] tun_get_user+0x839/0x4be0 [ 955.566938] ? tun_chr_read_iter+0x1d0/0x1d0 [ 955.571366] ? lock_downgrade+0x720/0x720 [ 955.575540] ? lock_downgrade+0x720/0x720 [ 955.579708] ? check_preemption_disabled+0x41/0x280 [ 955.584747] ? check_preemption_disabled+0x41/0x280 [ 955.589788] tun_chr_write_iter+0xb0/0x150 [ 955.594047] __vfs_write+0x51b/0x770 [ 955.597786] ? kernel_read+0x110/0x110 [ 955.601709] ? selinux_file_permission+0x87/0x5f0 [ 955.606581] ? security_file_permission+0x1c0/0x220 [ 955.611634] vfs_write+0x1f3/0x540 [ 955.615196] ksys_write+0x12b/0x2a0 [ 955.618852] ? __ia32_sys_read+0xb0/0xb0 [ 955.622933] ? posix_timer_fn+0x3d0/0x3d0 [ 955.627103] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 955.631879] ? trace_hardirqs_off_caller+0x69/0x210 [ 955.636921] ? do_syscall_64+0x21/0x620 [ 955.640923] do_syscall_64+0xf9/0x620 [ 955.644753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 955.649955] RIP: 0033:0x415e21 [ 955.653159] Code: 75 14 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 c4 1b 00 00 c3 48 83 ec 08 e8 ca fc ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 13 fd ff ff 48 89 d0 48 83 c4 08 48 3d 01 14:16:16 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x1000000}], 0xc6, 0x0) 14:16:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x5}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x3000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 955.672184] RSP: 002b:00007f82de469c60 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 955.679905] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 0000000000415e21 [ 955.687186] RDX: 000000000000004a RSI: 0000000020000100 RDI: 00000000000000f0 [ 955.694477] RBP: 00007f82de469ca0 R08: 0000000000000000 R09: 0000000000000000 [ 955.701773] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000001 [ 955.709054] R13: 00007fff262aab5f R14: 00007f82de46a9c0 R15: 000000000078bf0c 14:16:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) listen(r0, 0x0) prctl$PR_SET_TSC(0x1a, 0x3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x20) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'erspan0\x00', 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}, 0x1, 0x0, 0x0, 0x4004802}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000005c0)=ANY=[], 0x0) 14:16:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x4000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000180)=""/132) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x6}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:17 executing program 1 (fault-call:7 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 955.937223] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 955.978714] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 955.989164] FAULT_INJECTION: forcing a failure. [ 955.989164] name failslab, interval 1, probability 0, space 0, times 0 [ 956.000457] CPU: 1 PID: 12012 Comm: syz-executor.1 Not tainted 4.19.134-syzkaller #0 [ 956.008347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.017730] Call Trace: [ 956.020351] dump_stack+0x1fc/0x2fe [ 956.024001] should_fail.cold+0xa/0x14 [ 956.027906] ? setup_fault_attr+0x200/0x200 [ 956.032241] ? irq_work_queue+0x29/0x80 [ 956.036227] ? wake_up_klogd.part.0+0x8c/0xc0 [ 956.040748] __should_failslab+0x115/0x180 [ 956.045001] should_failslab+0x5/0xf [ 956.048726] kmem_cache_alloc+0x3f/0x370 [ 956.052813] inet_reqsk_alloc+0x93/0x620 [ 956.056894] ? tcp_mark_head_lost+0xa10/0xa10 [ 956.061405] ? lockdep_hardirqs_on+0x288/0x5c0 [ 956.066000] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 956.071183] ? ___ratelimit+0x319/0x584 [ 956.075181] tcp_conn_request+0x643/0x3540 [ 956.079443] ? tcp_parse_options+0xd90/0xd90 [ 956.083874] ? check_preemption_disabled+0x41/0x280 [ 956.088917] ? mark_held_locks+0xf0/0xf0 [ 956.093004] ? __lock_acquire+0x6de/0x3ff0 [ 956.097267] ? find_match.part.0+0x33f/0x1530 [ 956.101787] ? lock_acquire+0x170/0x3c0 [ 956.105849] tcp_v6_conn_request+0x100/0x290 [ 956.110331] tcp_rcv_state_process+0xacd/0x4c50 [ 956.115066] ? sk_filter_trim_cap+0x497/0x7d0 [ 956.119583] ? tcp_finish_connect+0x500/0x500 [ 956.124093] ? check_preemption_disabled+0x41/0x280 [ 956.129127] ? check_preemption_disabled+0x41/0x280 [ 956.134168] ? sk_filter_trim_cap+0x4c3/0x7d0 [ 956.138681] ? bpf_skb_trim_rcsum+0x210/0x210 [ 956.143200] tcp_v6_do_rcv+0x47c/0x1370 [ 956.147197] ? tcp_v6_fill_cb+0x399/0x4a0 [ 956.151368] tcp_v6_rcv+0x366b/0x3990 [ 956.155209] ? tcp_v6_syn_recv_sock+0x2310/0x2310 [ 956.160071] ? check_preemption_disabled+0x41/0x280 [ 956.165116] ? do_csum+0x32a/0x400 [ 956.168688] ip6_input_finish+0x46a/0x17a0 [ 956.172965] ip6_input+0xcf/0x3c0 [ 956.176442] ? ip6_input_finish+0x17a0/0x17a0 [ 956.180972] ? ip6_sublist_rcv_finish+0x2c0/0x2c0 [ 956.185846] ip6_rcv_finish+0x1d9/0x2f0 [ 956.189851] ipv6_rcv+0xf2/0x3f0 [ 956.193241] ? ip6_sublist_rcv+0xc30/0xc30 [ 956.197508] ? ip6_rcv_finish_core.constprop.0.isra.0+0x550/0x550 [ 956.203830] ? netif_receive_skb_internal+0x1da/0x3f0 [ 956.209051] ? ip6_sublist_rcv+0xc30/0xc30 [ 956.213356] __netif_receive_skb_one_core+0x114/0x180 [ 956.218563] ? __netif_receive_skb_core+0x3270/0x3270 [ 956.223783] ? lock_acquire+0x170/0x3c0 [ 956.227774] ? netif_receive_skb_internal+0x6e/0x3f0 [ 956.232902] __netif_receive_skb+0x27/0x1c0 [ 956.237254] netif_receive_skb_internal+0xf0/0x3f0 [ 956.242241] ? __netif_receive_skb+0x1c0/0x1c0 [ 956.246864] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 956.251908] tun_rx_batched.isra.0+0x468/0x730 [ 956.256516] ? tun_xdp+0x310/0x310 [ 956.260077] ? tun_get_user+0x26de/0x4be0 [ 956.264251] ? lock_acquire+0x170/0x3c0 [ 956.268245] ? tun_get_user+0x1d11/0x4be0 [ 956.272410] ? check_preemption_disabled+0x41/0x280 [ 956.277459] tun_get_user+0x2911/0x4be0 [ 956.281458] ? tun_chr_read_iter+0x1d0/0x1d0 [ 956.285888] ? lock_downgrade+0x720/0x720 [ 956.290058] ? lock_downgrade+0x720/0x720 [ 956.294216] ? check_preemption_disabled+0x41/0x280 [ 956.299252] ? check_preemption_disabled+0x41/0x280 [ 956.304287] tun_chr_write_iter+0xb0/0x150 [ 956.308537] __vfs_write+0x51b/0x770 [ 956.312266] ? kernel_read+0x110/0x110 [ 956.316182] ? selinux_file_permission+0x87/0x5f0 [ 956.321051] ? security_file_permission+0x1c0/0x220 [ 956.326096] vfs_write+0x1f3/0x540 [ 956.329656] ksys_write+0x12b/0x2a0 [ 956.333301] ? __ia32_sys_read+0xb0/0xb0 [ 956.337372] ? posix_timer_fn+0x3d0/0x3d0 [ 956.341531] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 956.346296] ? trace_hardirqs_off_caller+0x69/0x210 [ 956.351326] ? do_syscall_64+0x21/0x620 [ 956.355314] do_syscall_64+0xf9/0x620 [ 956.359132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 956.364335] RIP: 0033:0x415e21 14:16:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x8000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:17 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x1030000}], 0xc6, 0x0) [ 956.367540] Code: 75 14 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 c4 1b 00 00 c3 48 83 ec 08 e8 ca fc ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 13 fd ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 956.384162] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 956.386442] RSP: 002b:00007f82de469c60 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 956.386458] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 0000000000415e21 [ 956.386467] RDX: 000000000000004a RSI: 0000000020000100 RDI: 00000000000000f0 [ 956.386476] RBP: 00007f82de469ca0 R08: 0000000000000000 R09: 0000000000000000 14:16:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xa000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 956.386484] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000002 [ 956.386493] R13: 00007fff262aab5f R14: 00007f82de46a9c0 R15: 000000000078bf0c 14:16:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xe000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:17 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x2000000}], 0xc6, 0x0) 14:16:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x1270, &(0x7f0000000180)={@local, @remote, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "0c52a9", 0x123a, 0x11, 0x1, @dev={0xfe, 0x80, [], 0x20}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, {[@fragment={0x21, 0x0, 0x4, 0x1, 0x0, 0x9, 0x68}, @srh={0x21, 0x2, 0x4, 0x1, 0xff, 0x0, 0x6, [@local]}, @hopopts={0x8c, 0x20d, [], [@calipso={0x7, 0x48, {0x1, 0x10, 0x1, 0x40, [0x1f, 0x8, 0x100000000, 0x7d, 0x3ff, 0x9, 0x80000000, 0x13d]}}, @jumbo={0xc2, 0x4, 0x7fffffff}, @calipso={0x7, 0x10, {0x0, 0x2, 0x7f, 0x3ff, [0x3]}}, @jumbo={0xc2, 0x4, 0x5}, @generic={0x9, 0x1000, "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"}]}, @hopopts={0x0, 0x7, [], [@enc_lim={0x4, 0x1, 0x7f}, @hao={0xc9, 0x10, @remote}, @hao={0xc9, 0x10, @local}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x13}}, @enc_lim={0x4, 0x1, 0x7}]}, @srh={0x89, 0x2, 0x4, 0x1, 0x5, 0x38, 0x8000, [@mcast2]}, @hopopts={0x1, 0x6, [], [@calipso={0x7, 0x30, {0x2, 0xa, 0x1, 0x1000, [0x100, 0x80000001, 0x4, 0x7ff, 0xdd1]}}, @enc_lim={0x4, 0x1, 0x2}]}], {0x4e20, 0x4e24, 0x102, 0x0, @gue={{0x2, 0x0, 0x2, 0x3}, "24fe2bcbecda07c5e215d5f237b9c17ee97f23a5569b8787d271a3217dcf759dd0e9282fb6c0e803665f9f4b43262be631b796a67513f652b3259d0aef31d3800e15c084f157eda9b8546d407ed865ff51040189db19d010c0721ed763778a1b6ef30a8924c03ae717758fa2df8eac2cea5c23efc11cd95c3b0305fe1c532a5a052a9859da96a39164d7c475df8ea6f4d3ea41fa6b128d0e5833034931918c87ad8d5a85d514ece00907a4550733d02f684d7cce90b790359bff83bed8aa7c0b041c87d5883c7d2960248dec4f8fd67c474af4ea8538eed01b2af92a6569a45e82858f50e6456a536edfe70ab16508092e30"}}}}}}}, 0x0) 14:16:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:17 executing program 1 (fault-call:7 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x8}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 956.787317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 956.797823] FAULT_INJECTION: forcing a failure. [ 956.797823] name failslab, interval 1, probability 0, space 0, times 0 [ 956.809322] CPU: 1 PID: 12056 Comm: syz-executor.1 Not tainted 4.19.134-syzkaller #0 [ 956.817222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.826587] Call Trace: [ 956.829192] dump_stack+0x1fc/0x2fe [ 956.832853] should_fail.cold+0xa/0x14 [ 956.836765] ? setup_fault_attr+0x200/0x200 [ 956.841114] ? tcp_conn_request+0x643/0x3540 [ 956.845537] ? tcp_v6_conn_request+0x100/0x290 [ 956.850139] ? tcp_rcv_state_process+0xacd/0x4c50 [ 956.854997] ? tcp_v6_do_rcv+0x47c/0x1370 [ 956.859162] ? tcp_v6_rcv+0x366b/0x3990 [ 956.863157] ? ip6_input_finish+0x46a/0x17a0 [ 956.867585] ? ip6_input+0xcf/0x3c0 [ 956.871229] ? ip6_rcv_finish+0x1d9/0x2f0 [ 956.875397] __should_failslab+0x115/0x180 [ 956.879654] should_failslab+0x5/0xf [ 956.883388] __kmalloc_track_caller+0x68/0x3c0 [ 956.887986] ? security_netlbl_sid_to_secattr+0x151/0x2b0 [ 956.893586] kstrdup+0x36/0x70 [ 956.896063] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 956.896805] security_netlbl_sid_to_secattr+0x151/0x2b0 [ 956.896829] selinux_netlbl_inet_conn_request+0x123/0x2e0 [ 956.918062] ? selinux_netlbl_sctp_assoc_request+0x6a0/0x6a0 [ 956.923878] ? selinux_skb_peerlbl_sid+0xf0/0x140 [ 956.928749] ? inet_reqsk_alloc+0x93/0x620 [ 956.933010] selinux_inet_conn_request+0x1cc/0x2a0 [ 956.937961] ? selinux_sem_free_security+0x40/0x40 [ 956.942927] security_inet_conn_request+0x50/0xb0 [ 956.947797] tcp_conn_request+0xe2c/0x3540 [ 956.952068] ? tcp_parse_options+0xd90/0xd90 [ 956.956496] ? check_preemption_disabled+0x41/0x280 [ 956.961541] ? mark_held_locks+0xf0/0xf0 [ 956.965630] ? __lock_acquire+0x6de/0x3ff0 [ 956.969900] ? find_match.part.0+0x33f/0x1530 [ 956.974428] ? lock_acquire+0x170/0x3c0 [ 956.978427] tcp_v6_conn_request+0x100/0x290 [ 956.982857] tcp_rcv_state_process+0xacd/0x4c50 [ 956.987547] ? sk_filter_trim_cap+0x497/0x7d0 [ 956.992066] ? tcp_finish_connect+0x500/0x500 [ 956.996579] ? check_preemption_disabled+0x41/0x280 [ 957.001621] ? check_preemption_disabled+0x41/0x280 [ 957.006669] ? sk_filter_trim_cap+0x4c3/0x7d0 [ 957.011187] ? bpf_skb_trim_rcsum+0x210/0x210 [ 957.015705] tcp_v6_do_rcv+0x47c/0x1370 [ 957.019722] ? tcp_v6_fill_cb+0x399/0x4a0 [ 957.023886] tcp_v6_rcv+0x366b/0x3990 [ 957.027727] ? tcp_v6_syn_recv_sock+0x2310/0x2310 [ 957.032587] ? check_preemption_disabled+0x41/0x280 14:16:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x340c0000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x9, 0x3, 0x240, 0x0, 0xffffffff, 0xffffffff, 0xd8, 0xffffffff, 0x1a8, 0xffffffff, 0xffffffff, 0x1a8, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@uncond, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0xf, "cc14", 0x1}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x9, 0x6, 0x8, 0x100, 0x4, 0x0, 0x1ff, 0x6]}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0xff, 0xff, 'bridge_slave_0\x00', 'bond_slave_0\x00', {}, {}, 0x73, 0x2, 0x40}, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@multicast2, [0xffffffff, 0xff000101, 0xff, 0xff000000], 0x4e20, 0x4e20, 0x4e23, 0x4e24, 0x5, 0x20, 0x37c7, 0x1, 0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x60000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0x3f97}) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f00000000c0)={0x3, 0x0, 0x3, 0x1f, 0x80, &(0x7f0000000180)}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @private0, {[], {{0x4e22, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x80000000, 0x1ff) 14:16:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x9effffff, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 957.037621] ? do_csum+0x32a/0x400 [ 957.041188] ip6_input_finish+0x46a/0x17a0 [ 957.045890] ip6_input+0xcf/0x3c0 14:16:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf0ffffff, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 957.045907] ? ip6_input_finish+0x17a0/0x17a0 [ 957.045930] ? ip6_sublist_rcv_finish+0x2c0/0x2c0 [ 957.045955] ip6_rcv_finish+0x1d9/0x2f0 [ 957.045971] ipv6_rcv+0xf2/0x3f0 [ 957.045987] ? ip6_sublist_rcv+0xc30/0xc30 [ 957.046017] ? ip6_rcv_finish_core.constprop.0.isra.0+0x550/0x550 [ 957.046034] ? netif_receive_skb_internal+0x1da/0x3f0 [ 957.046051] ? ip6_sublist_rcv+0xc30/0xc30 [ 957.046068] __netif_receive_skb_one_core+0x114/0x180 [ 957.046084] ? __netif_receive_skb_core+0x3270/0x3270 [ 957.046105] ? lock_acquire+0x170/0x3c0 [ 957.046120] ? netif_receive_skb_internal+0x6e/0x3f0 [ 957.046139] __netif_receive_skb+0x27/0x1c0 [ 957.046157] netif_receive_skb_internal+0xf0/0x3f0 [ 957.046172] ? __netif_receive_skb+0x1c0/0x1c0 [ 957.046195] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 957.046217] tun_rx_batched.isra.0+0x468/0x730 [ 957.046237] ? tun_xdp+0x310/0x310 [ 957.046249] ? tun_get_user+0x26de/0x4be0 [ 957.046270] ? lock_acquire+0x170/0x3c0 [ 957.046281] ? tun_get_user+0x1d11/0x4be0 [ 957.046295] ? check_preemption_disabled+0x41/0x280 [ 957.046313] tun_get_user+0x2911/0x4be0 [ 957.046339] ? tun_chr_read_iter+0x1d0/0x1d0 [ 957.046354] ? lock_downgrade+0x720/0x720 [ 957.046377] ? lock_downgrade+0x720/0x720 [ 957.046389] ? check_preemption_disabled+0x41/0x280 [ 957.046404] ? check_preemption_disabled+0x41/0x280 [ 957.046424] tun_chr_write_iter+0xb0/0x150 [ 957.046442] __vfs_write+0x51b/0x770 [ 957.046461] ? kernel_read+0x110/0x110 [ 957.046485] ? selinux_file_permission+0x87/0x5f0 [ 957.046506] ? security_file_permission+0x1c0/0x220 [ 957.046529] vfs_write+0x1f3/0x540 [ 957.046547] ksys_write+0x12b/0x2a0 [ 957.046569] ? __ia32_sys_read+0xb0/0xb0 [ 957.046583] ? posix_timer_fn+0x3d0/0x3d0 [ 957.046599] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 957.046613] ? trace_hardirqs_off_caller+0x69/0x210 [ 957.046629] ? do_syscall_64+0x21/0x620 [ 957.046648] do_syscall_64+0xf9/0x620 [ 957.046669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.046680] RIP: 0033:0x415e21 [ 957.046696] Code: 75 14 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 c4 1b 00 00 c3 48 83 ec 08 e8 ca fc ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 13 fd ff ff 48 89 d0 48 83 c4 08 48 3d 01 14:16:18 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x3000000}], 0xc6, 0x0) 14:16:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf5ffffff, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:18 executing program 1 (fault-call:7 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x9}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 957.046703] RSP: 002b:00007f82de469c60 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 957.046717] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 0000000000415e21 14:16:18 executing program 1 (fault-call:7 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xfcffffff, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 957.046725] RDX: 000000000000004a RSI: 0000000020000100 RDI: 00000000000000f0 [ 957.046732] RBP: 00007f82de469ca0 R08: 0000000000000000 R09: 0000000000000000 [ 957.046740] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 14:16:19 executing program 1 (fault-call:7 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 957.046749] R13: 00007fff262aab5f R14: 00007f82de46a9c0 R15: 000000000078bf0c 14:16:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xa}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) [ 957.583155] FAULT_INJECTION: forcing a failure. [ 957.583155] name failslab, interval 1, probability 0, space 0, times 0 [ 957.583173] CPU: 0 PID: 12098 Comm: syz-executor.1 Not tainted 4.19.134-syzkaller #0 [ 957.583181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.583186] Call Trace: [ 957.583206] dump_stack+0x1fc/0x2fe [ 957.583230] should_fail.cold+0xa/0x14 [ 957.583247] ? setup_fault_attr+0x200/0x200 [ 957.583337] ? xfrm_expand_policies+0x5e0/0x5e0 [ 957.583361] __should_failslab+0x115/0x180 [ 957.583383] should_failslab+0x5/0xf [ 957.583400] kmem_cache_alloc_node+0x54/0x3b0 [ 957.583421] __alloc_skb+0x71/0x560 [ 957.583442] tcp_make_synack+0x94/0x12b0 [ 957.583462] ? tcp_openreq_init_rwin+0x548/0x990 [ 957.583478] ? tcp_wfree+0x540/0x540 [ 957.583497] ? tcp_twsk_destructor+0x60/0x60 [ 957.583520] tcp_v6_send_synack+0xd4/0x9d0 [ 957.583542] tcp_conn_request+0x15e9/0x3540 [ 957.583568] ? tcp_parse_options+0xd90/0xd90 [ 957.583581] ? check_preemption_disabled+0x41/0x280 [ 957.583601] ? mark_held_locks+0xf0/0xf0 [ 957.583621] ? __lock_acquire+0x6de/0x3ff0 [ 957.583655] ? lock_acquire+0x170/0x3c0 [ 957.583672] tcp_v6_conn_request+0x100/0x290 [ 957.583690] tcp_rcv_state_process+0xacd/0x4c50 [ 957.583706] ? sk_filter_trim_cap+0x497/0x7d0 [ 957.583722] ? tcp_finish_connect+0x500/0x500 [ 957.583734] ? check_preemption_disabled+0x41/0x280 [ 957.583756] ? check_preemption_disabled+0x41/0x280 [ 957.583776] ? sk_filter_trim_cap+0x4c3/0x7d0 [ 957.583793] ? bpf_skb_trim_rcsum+0x210/0x210 [ 957.583813] tcp_v6_do_rcv+0x47c/0x1370 [ 957.583827] ? tcp_v6_fill_cb+0x399/0x4a0 [ 957.583842] tcp_v6_rcv+0x366b/0x3990 [ 957.583869] ? tcp_v6_syn_recv_sock+0x2310/0x2310 [ 957.583880] ? check_preemption_disabled+0x41/0x280 [ 957.583893] ? do_csum+0x32a/0x400 [ 957.583914] ip6_input_finish+0x46a/0x17a0 [ 957.583940] ip6_input+0xcf/0x3c0 [ 957.583955] ? ip6_input_finish+0x17a0/0x17a0 [ 957.583974] ? ip6_sublist_rcv_finish+0x2c0/0x2c0 [ 957.584001] ip6_rcv_finish+0x1d9/0x2f0 [ 957.584018] ipv6_rcv+0xf2/0x3f0 [ 957.584033] ? ip6_sublist_rcv+0xc30/0xc30 [ 957.584052] ? ip6_rcv_finish_core.constprop.0.isra.0+0x550/0x550 [ 957.584068] ? netif_receive_skb_internal+0x1da/0x3f0 [ 957.584085] ? ip6_sublist_rcv+0xc30/0xc30 [ 957.584102] __netif_receive_skb_one_core+0x114/0x180 [ 957.584117] ? __netif_receive_skb_core+0x3270/0x3270 [ 957.584146] ? lock_acquire+0x170/0x3c0 [ 957.584163] ? netif_receive_skb_internal+0x6e/0x3f0 [ 957.584183] __netif_receive_skb+0x27/0x1c0 [ 957.584200] netif_receive_skb_internal+0xf0/0x3f0 [ 957.584215] ? __netif_receive_skb+0x1c0/0x1c0 [ 957.584237] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 957.584256] tun_rx_batched.isra.0+0x468/0x730 [ 957.584275] ? tun_xdp+0x310/0x310 [ 957.584286] ? tun_get_user+0x26de/0x4be0 [ 957.584306] ? lock_acquire+0x170/0x3c0 [ 957.584317] ? tun_get_user+0x1d11/0x4be0 [ 957.584331] ? check_preemption_disabled+0x41/0x280 [ 957.584349] tun_get_user+0x2911/0x4be0 [ 957.584375] ? tun_chr_read_iter+0x1d0/0x1d0 [ 957.584391] ? lock_downgrade+0x720/0x720 [ 957.584414] ? lock_downgrade+0x720/0x720 [ 957.584426] ? check_preemption_disabled+0x41/0x280 [ 957.584440] ? check_preemption_disabled+0x41/0x280 [ 957.584461] tun_chr_write_iter+0xb0/0x150 [ 957.584480] __vfs_write+0x51b/0x770 [ 957.584497] ? kernel_read+0x110/0x110 [ 957.584521] ? selinux_file_permission+0x87/0x5f0 [ 957.584542] ? security_file_permission+0x1c0/0x220 [ 957.584565] vfs_write+0x1f3/0x540 [ 957.584583] ksys_write+0x12b/0x2a0 [ 957.584601] ? __ia32_sys_read+0xb0/0xb0 [ 957.584614] ? posix_timer_fn+0x3d0/0x3d0 [ 957.584629] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 957.584644] ? trace_hardirqs_off_caller+0x69/0x210 [ 957.584660] ? do_syscall_64+0x21/0x620 [ 957.584678] do_syscall_64+0xf9/0x620 [ 957.584697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.584709] RIP: 0033:0x415e21 [ 957.584724] Code: 75 14 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 c4 1b 00 00 c3 48 83 ec 08 e8 ca fc ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 13 fd ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 957.584732] RSP: 002b:00007f82de469c60 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 957.584753] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 0000000000415e21 [ 957.584761] RDX: 000000000000004a RSI: 0000000020000100 RDI: 00000000000000f0 [ 957.584770] RBP: 00007f82de469ca0 R08: 0000000000000000 R09: 0000000000000000 [ 957.584778] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000004 [ 957.584786] R13: 00007fff262aab5f R14: 00007f82de46a9c0 R15: 000000000078bf0c [ 957.699318] FAULT_INJECTION: forcing a failure. [ 957.699318] name failslab, interval 1, probability 0, space 0, times 0 [ 957.699337] CPU: 1 PID: 12108 Comm: syz-executor.1 Not tainted 4.19.134-syzkaller #0 [ 957.699345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.699350] Call Trace: [ 957.699370] dump_stack+0x1fc/0x2fe [ 957.699393] should_fail.cold+0xa/0x14 [ 957.699410] ? mark_held_locks+0xf0/0xf0 [ 957.699427] ? setup_fault_attr+0x200/0x200 [ 957.699445] ? setup_fault_attr+0x200/0x200 [ 957.699467] __should_failslab+0x115/0x180 [ 957.699486] should_failslab+0x5/0xf [ 957.699502] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 957.699523] __kmalloc_node_track_caller+0x38/0x70 [ 957.699541] __alloc_skb+0xae/0x560 [ 957.699563] tcp_make_synack+0x94/0x12b0 [ 957.699583] ? tcp_openreq_init_rwin+0x548/0x990 [ 957.699598] ? tcp_wfree+0x540/0x540 [ 957.699615] ? tcp_twsk_destructor+0x60/0x60 [ 957.699637] tcp_v6_send_synack+0xd4/0x9d0 [ 957.699658] tcp_conn_request+0x15e9/0x3540 [ 957.699684] ? tcp_parse_options+0xd90/0xd90 [ 957.699698] ? check_preemption_disabled+0x41/0x280 [ 957.699736] ? mark_held_locks+0xf0/0xf0 [ 957.699757] ? __lock_acquire+0x6de/0x3ff0 [ 957.699792] ? lock_acquire+0x170/0x3c0 [ 957.699811] tcp_v6_conn_request+0x100/0x290 [ 957.699831] tcp_rcv_state_process+0xacd/0x4c50 [ 957.699847] ? sk_filter_trim_cap+0x497/0x7d0 [ 957.699867] ? tcp_finish_connect+0x500/0x500 [ 957.699879] ? check_preemption_disabled+0x41/0x280 [ 957.699899] ? check_preemption_disabled+0x41/0x280 [ 957.699918] ? sk_filter_trim_cap+0x4c3/0x7d0 [ 957.699938] ? bpf_skb_trim_rcsum+0x210/0x210 [ 957.699956] tcp_v6_do_rcv+0x47c/0x1370 [ 957.699968] ? tcp_v6_fill_cb+0x399/0x4a0 [ 957.699982] tcp_v6_rcv+0x366b/0x3990 [ 957.700010] ? tcp_v6_syn_recv_sock+0x2310/0x2310 [ 957.700021] ? check_preemption_disabled+0x41/0x280 [ 957.700035] ? do_csum+0x32a/0x400 [ 957.700057] ip6_input_finish+0x46a/0x17a0 [ 957.700088] ip6_input+0xcf/0x3c0 [ 957.700101] ? ip6_input_finish+0x17a0/0x17a0 [ 957.700120] ? ip6_sublist_rcv_finish+0x2c0/0x2c0 [ 957.700143] ip6_rcv_finish+0x1d9/0x2f0 [ 957.700160] ipv6_rcv+0xf2/0x3f0 [ 957.700194] ? ip6_sublist_rcv+0xc30/0xc30 [ 957.700215] ? ip6_rcv_finish_core.constprop.0.isra.0+0x550/0x550 [ 957.700231] ? netif_receive_skb_internal+0x1da/0x3f0 [ 957.700248] ? ip6_sublist_rcv+0xc30/0xc30 [ 957.700263] __netif_receive_skb_one_core+0x114/0x180 [ 957.700276] ? __netif_receive_skb_core+0x3270/0x3270 [ 957.700296] ? lock_acquire+0x170/0x3c0 [ 957.700309] ? netif_receive_skb_internal+0x6e/0x3f0 [ 957.700328] __netif_receive_skb+0x27/0x1c0 [ 957.700344] netif_receive_skb_internal+0xf0/0x3f0 [ 957.700359] ? __netif_receive_skb+0x1c0/0x1c0 [ 957.700380] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 957.700400] tun_rx_batched.isra.0+0x468/0x730 [ 957.700418] ? tun_xdp+0x310/0x310 [ 957.700430] ? tun_get_user+0x26de/0x4be0 [ 957.700450] ? lock_acquire+0x170/0x3c0 [ 957.700461] ? tun_get_user+0x1d11/0x4be0 [ 957.700475] ? check_preemption_disabled+0x41/0x280 [ 957.700493] tun_get_user+0x2911/0x4be0 [ 957.700519] ? tun_chr_read_iter+0x1d0/0x1d0 [ 957.700533] ? lock_downgrade+0x720/0x720 [ 957.700557] ? lock_downgrade+0x720/0x720 [ 957.700571] ? check_preemption_disabled+0x41/0x280 [ 957.700586] ? check_preemption_disabled+0x41/0x280 [ 957.700605] tun_chr_write_iter+0xb0/0x150 [ 957.700624] __vfs_write+0x51b/0x770 [ 957.700641] ? kernel_read+0x110/0x110 [ 957.700664] ? selinux_file_permission+0x87/0x5f0 [ 957.700684] ? security_file_permission+0x1c0/0x220 [ 957.700707] vfs_write+0x1f3/0x540 [ 957.700733] ksys_write+0x12b/0x2a0 [ 957.700752] ? __ia32_sys_read+0xb0/0xb0 [ 957.700766] ? posix_timer_fn+0x3d0/0x3d0 [ 957.700782] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 957.700795] ? trace_hardirqs_off_caller+0x69/0x210 [ 957.700811] ? do_syscall_64+0x21/0x620 [ 957.700830] do_syscall_64+0xf9/0x620 [ 957.700850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.700862] RIP: 0033:0x415e21 [ 957.700878] Code: 75 14 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 c4 1b 00 00 c3 48 83 ec 08 e8 ca fc ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 13 fd ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 957.700886] RSP: 002b:00007f82de469c60 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 957.700899] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 0000000000415e21 [ 957.700908] RDX: 000000000000004a RSI: 0000000020000100 RDI: 00000000000000f0 [ 957.700917] RBP: 00007f82de469ca0 R08: 0000000000000000 R09: 0000000000000000 [ 957.700925] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000005 [ 957.700933] R13: 00007fff262aab5f R14: 00007f82de46a9c0 R15: 000000000078bf0c [ 957.843418] FAULT_INJECTION: forcing a failure. [ 957.843418] name failslab, interval 1, probability 0, space 0, times 0 [ 957.843480] CPU: 1 PID: 12118 Comm: syz-executor.1 Not tainted 4.19.134-syzkaller #0 [ 957.843489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.843493] Call Trace: [ 957.843512] dump_stack+0x1fc/0x2fe [ 957.843538] should_fail.cold+0xa/0x14 [ 957.843562] ? setup_fault_attr+0x200/0x200 [ 957.843578] ? lockdep_hardirqs_on+0x288/0x5c0 [ 957.843599] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 957.843615] ? mod_timer+0x4ef/0x1010 [ 957.843639] __should_failslab+0x115/0x180 [ 957.843656] should_failslab+0x5/0xf [ 957.843674] kmem_cache_alloc+0x3f/0x370 [ 957.843698] skb_clone+0x151/0x3d0 [ 957.843726] neigh_probe+0x5e/0x110 [ 957.843741] __neigh_event_send+0x387/0xf60 [ 957.843767] ? neigh_del_timer+0xc0/0xc0 [ 957.843786] ? lock_downgrade+0x720/0x720 [ 957.843804] neigh_resolve_output+0x6d8/0x910 [ 957.843816] ? check_preemption_disabled+0x41/0x280 [ 957.843843] ? rcu_lockdep_current_cpu_online+0x12f/0x1b0 [ 957.843866] ip6_finish_output2+0x113d/0x2290 [ 957.843892] ? ip6_forward_finish+0x4b0/0x4b0 [ 957.843912] ? lock_downgrade+0x720/0x720 [ 957.843928] ? check_preemption_disabled+0x41/0x280 [ 957.843944] ? check_preemption_disabled+0x41/0x280 [ 957.843976] ip6_finish_output+0x7eb/0xc10 [ 957.843995] ip6_output+0x205/0x770 [ 957.844012] ? ip6_finish_output+0xc10/0xc10 [ 957.844033] ? ip6_fragment+0x32a0/0x32a0 [ 957.844051] ? check_preemption_disabled+0x41/0x280 [ 957.844070] ip6_xmit+0xdbf/0x20a0 [ 957.844097] ? ip6_append_data+0x330/0x330 [ 957.844115] ? tcp_make_synack+0xda2/0x12b0 [ 957.844134] ? ac6_proc_exit+0x50/0x50 [ 957.844158] ? check_preemption_disabled+0x41/0x280 [ 957.844181] tcp_v6_send_synack+0x547/0x9d0 [ 957.844208] tcp_conn_request+0x15e9/0x3540 [ 957.844233] ? tcp_parse_options+0xd90/0xd90 [ 957.844246] ? check_preemption_disabled+0x41/0x280 [ 957.844268] ? mark_held_locks+0xf0/0xf0 [ 957.844288] ? __lock_acquire+0x6de/0x3ff0 [ 957.844323] ? lock_acquire+0x170/0x3c0 [ 957.844340] tcp_v6_conn_request+0x100/0x290 [ 957.844358] tcp_rcv_state_process+0xacd/0x4c50 [ 957.844374] ? sk_filter_trim_cap+0x497/0x7d0 [ 957.844392] ? tcp_finish_connect+0x500/0x500 [ 957.844405] ? check_preemption_disabled+0x41/0x280 [ 957.844419] ? check_preemption_disabled+0x41/0x280 [ 957.844437] ? sk_filter_trim_cap+0x4c3/0x7d0 [ 957.844453] ? bpf_skb_trim_rcsum+0x210/0x210 [ 957.844471] tcp_v6_do_rcv+0x47c/0x1370 [ 957.844484] ? tcp_v6_fill_cb+0x399/0x4a0 [ 957.844500] tcp_v6_rcv+0x366b/0x3990 [ 957.844530] ? tcp_v6_syn_recv_sock+0x2310/0x2310 [ 957.844542] ? check_preemption_disabled+0x41/0x280 [ 957.844556] ? do_csum+0x32a/0x400 [ 957.844577] ip6_input_finish+0x46a/0x17a0 [ 957.844606] ip6_input+0xcf/0x3c0 [ 957.844621] ? ip6_input_finish+0x17a0/0x17a0 [ 957.844641] ? ip6_sublist_rcv_finish+0x2c0/0x2c0 [ 957.844664] ip6_rcv_finish+0x1d9/0x2f0 [ 957.844680] ipv6_rcv+0xf2/0x3f0 [ 957.844695] ? ip6_sublist_rcv+0xc30/0xc30 [ 957.844726] ? ip6_rcv_finish_core.constprop.0.isra.0+0x550/0x550 [ 957.844745] ? netif_receive_skb_internal+0x1da/0x3f0 [ 957.844764] ? ip6_sublist_rcv+0xc30/0xc30 [ 957.844781] __netif_receive_skb_one_core+0x114/0x180 [ 957.844797] ? __netif_receive_skb_core+0x3270/0x3270 [ 957.844817] ? lock_acquire+0x170/0x3c0 [ 957.844831] ? netif_receive_skb_internal+0x6e/0x3f0 [ 957.844849] __netif_receive_skb+0x27/0x1c0 [ 957.844865] netif_receive_skb_internal+0xf0/0x3f0 [ 957.844879] ? __netif_receive_skb+0x1c0/0x1c0 [ 957.844900] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 957.844921] tun_rx_batched.isra.0+0x468/0x730 [ 957.844940] ? tun_xdp+0x310/0x310 [ 957.844951] ? tun_get_user+0x26de/0x4be0 [ 957.844971] ? lock_acquire+0x170/0x3c0 [ 957.844983] ? tun_get_user+0x1d11/0x4be0 [ 957.844996] ? check_preemption_disabled+0x41/0x280 [ 957.845014] tun_get_user+0x2911/0x4be0 [ 957.845040] ? tun_chr_read_iter+0x1d0/0x1d0 [ 957.845055] ? lock_downgrade+0x720/0x720 [ 957.845078] ? lock_downgrade+0x720/0x720 [ 957.845090] ? check_preemption_disabled+0x41/0x280 [ 957.845105] ? check_preemption_disabled+0x41/0x280 [ 957.845125] tun_chr_write_iter+0xb0/0x150 [ 957.845143] __vfs_write+0x51b/0x770 [ 957.845160] ? kernel_read+0x110/0x110 [ 957.845182] ? selinux_file_permission+0x87/0x5f0 [ 957.845202] ? security_file_permission+0x1c0/0x220 [ 957.845223] vfs_write+0x1f3/0x540 [ 957.845240] ksys_write+0x12b/0x2a0 [ 957.845256] ? __ia32_sys_read+0xb0/0xb0 [ 957.845269] ? posix_timer_fn+0x3d0/0x3d0 [ 957.845285] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 957.845298] ? trace_hardirqs_off_caller+0x69/0x210 [ 957.845313] ? do_syscall_64+0x21/0x620 [ 957.845331] do_syscall_64+0xf9/0x620 [ 957.845351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.845363] RIP: 0033:0x415e21 [ 957.845378] Code: 75 14 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 c4 1b 00 00 c3 48 83 ec 08 e8 ca fc ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 13 fd ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 957.845386] RSP: 002b:00007f82de469c60 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 957.845399] RAX: ffffffffffffffda RBX: 000000000078bf00 RCX: 0000000000415e21 [ 957.845408] RDX: 000000000000004a RSI: 0000000020000100 RDI: 00000000000000f0 14:16:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) recvmmsg(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/204, 0xcc}, {&(0x7f0000000000)=""/37, 0x25}], 0x2, &(0x7f0000000300)=""/41, 0x29}, 0x4}, {{&(0x7f0000000340)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/164, 0xa4}, {&(0x7f0000000480)=""/69, 0x45}, {&(0x7f0000000500)=""/114, 0x72}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000640)=""/57, 0x39}, {&(0x7f0000000680)=""/122, 0x7a}, {&(0x7f0000000700)=""/189, 0xbd}, {&(0x7f00000007c0)=""/16, 0x10}, {&(0x7f0000000800)=""/4096, 0x1000}], 0x9, &(0x7f00000018c0)=""/191, 0xbf}}, {{0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000001980)=""/4096, 0x1000}], 0x1, &(0x7f00000029c0)=""/224, 0xe0}, 0x5}], 0x3, 0x100, 0x0) 14:16:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xfffff000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:20 executing program 1 (fault-call:7 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:20 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xb}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:20 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x4000000}], 0xc6, 0x0) [ 957.845417] RBP: 00007f82de469ca0 R08: 0000000000000000 R09: 0000000000000000 [ 957.845425] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000006 [ 957.845433] R13: 00007fff262aab5f R14: 00007f82de46a9c0 R15: 000000000078bf0c [ 959.446847] net_ratelimit: 3 callbacks suppressed [ 959.446858] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 959.479244] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 959.522255] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x3}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x80000000) ioctl$NBD_SET_TIMEOUT(r3, 0xab09, 0xe0000000) bind$inet6(r0, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e220000000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) 14:16:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xffffff7f, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 959.642236] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xffffff9e, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xc}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xd, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xe}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xfffffff0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 959.890857] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000440)={0xa, 0x0, 0xffffffff, @private1, 0x73}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="1400f3ffffff00001000000000e40000000004003804e32ab1e01b321228a9f05e00000000a9ed8f7521f15ab5e3f653ca0b571795855b2180592b1d719fdad9ef2126ba420a3a65c28898af253787de5fb6daaad8493d79915c1d0aa6b40e4649ff6a0deed14b104b1af372cc5c07d11f91cb9bcd262755549bcbad52b807f322186b3517867fa61fa7db1cce6d07e079222cacfee6fdb4f36da3e10e7a646c517ef7925aeecd22c8a0f574b3f6440feddb8694d91423a640604b9994b42da0e5e01ca2463ae34303d8b5b01b5f7493440958f4b812eacbd456bb532cbe9e8701aee480"], 0x14}}, 0x0) r3 = socket(0x11, 0x3, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4801000024000b0d00"/18, @ANYRES32=r4, @ANYBLOB="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"/296], 0x148}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', r4}) sendmsg$nl_route(r2, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)=@bridge_getneigh={0x1ec, 0x1e, 0x20, 0x70bd2d, 0x25dfdbfe, {0x7, 0x0, 0x0, r6, 0x2a00, 0x4000}, [@IFLA_CARRIER_CHANGES={0x8, 0x23, 0x2}, @IFLA_GROUP={0x8, 0x1b, 0x6}, @IFLA_GROUP={0x8, 0x1b, 0x464}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x1ff}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x86f}, @IFLA_MTU={0x8, 0x4, 0x6}, @IFLA_IFALIASn={0x4}, @IFLA_VFINFO_LIST={0x140, 0x16, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x20, 0xb89, 0x40000}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x0, 0x7fffffff}}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x200, 0x1ff}}, @IFLA_VF_MAC={0x28, 0x1, {0x0, @random="70027fae4535"}}, @IFLA_VF_RATE={0xfffffffffffffe56, 0x6, {0x2, 0x7f, 0x3}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1f, 0xae13}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x7, 0x101}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0xffff, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xf74, 0x5}}, @IFLA_VF_RATE={0x10, 0x6, {0x0, 0x3ff, 0x32}}]}, {0x4}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x2d161db2}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1, 0x2}}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0xffffffe1, 0x4e9d685d, 0x2}}, @IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0x75e, 0x99, 0x8100}}]}, @IFLA_VF_MAC={0x28, 0x1, {0xfffffffc, @local}}]}]}, @IFLA_VFINFO_LIST={0x58, 0x16, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x3f, 0x5, 0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x8, 0x3d6}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1ff, 0x6}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x2, 0x40}}]}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_LINK_STATE={0xc, 0x5, {0x6, 0x3}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x6, 0x5}}]}]}]}, 0x1ec}, 0x1, 0x0, 0x0, 0x4090}, 0x4004000) listen(r0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000480)={0xfff, 0x38303553, 0x3, @stepwise={0x2, 0x7, 0x2, 0x0, 0x8, 0x1f}}) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xf}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xfffffff5, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:21 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x5000000}], 0xc6, 0x0) [ 960.347855] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.2'. [ 960.349902] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xfffffffc, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 960.570838] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.2'. 14:16:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x10}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) [ 960.727048] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xffffffff, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x60}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:22 executing program 2: getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000018c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="0c020000", @ANYRES16=0x0, @ANYRES16, @ANYRES64, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468305f746f5f68737200000000080003000100000008000300010000007800018008000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000300010000001400020062f2696467655f736c6176655f3100001400020076657468305f746f5f626f6e6400000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020067656e65766531000000000000000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="380001800800030001000000140002007665746830000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="5800018008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468315f746f5f6272696467650008000300070000000800030000000000140002007866726d3000000000000000000000001400020076657468315f746f5f68737200000000340001800800030000000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000300020000005400bbf9080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="140002006970365f767469300000000000000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c6572310000000000000800891754ca6e426f0e0180080003000200000180f7f5380a", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB], 0x20c}, 0x1, 0x0, 0x0, 0x4040015}, 0x80) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r7 = accept(r6, 0x0, 0x0) sendmmsg$alg(r7, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r7, 0x89e7, &(0x7f0000000000)={0x13}) listen(r5, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa6a6f4e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002007209ec1100fd18ab2e1ca552d4b454b0644a4bbd2b42c708cbe340b0032e0001000000000000d9d534d7b6f75a1acab8c3315194907dda0ebd4b2affd53a15c0b5bb79e2a8fe26a72e2eb547bc1751128c08c576e9df0bf7ecda81df7b7b7a67e84ad5c0df34382c9efedd392d04d9d9b8db284f270d6179fd3c4f60e1d8b1508d71a61e9fd1c1346ec811ce0ff9cd7988b879b21a26d0ceedab4b15d98285962de3161b5fabac829798cc58b6a01ace3c2bba2847c65d4fc28c58b6e0430a2e6040d6d9e7e59384cf5ae6a594bead06f2d63c2100"], 0x0) [ 961.036614] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12233 comm=syz-executor.2 14:16:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0xf, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x2000014a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x44}, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:22 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x6000000}], 0xc6, 0x0) 14:16:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xf0}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 961.232435] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0xc0, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xfffffdef, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) accept$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) bind$can_raw(r2, &(0x7f0000000180)={0x1d, r5}, 0x10) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0xec0, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x118}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 961.595064] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 961.718606] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x33fe0, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x300}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:23 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x7000000}], 0xc6, 0x0) 14:16:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x580, 0x0) ioctl$CHAR_RAW_FLSBUF(r1, 0x1261, &(0x7f00000000c0)=0x80000001) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x20000050, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x8080, 0x0) r2 = dup(r0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xa5, &(0x7f0000000200)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @dev, @void, {@x25={0x805, {0x0, 0xc1, 0x27, "95fc04b43f0fb680d8a1243555716f6345f3ba8b94e519b2641f5e785412268e569661a08180c59c44f308c110bda35b9e84aaebb1671c3d2e14dd6473fa9d900041649cae0d862648cce66e8ee7e02a7ee293975bc06ae2a5932a6b0dcbd0c2e9a4897b73d27e89e5a97bd48983c2ef072f3acaefab9aae1976d95b3b7a59ec51b03987c73b9354f601d0dd309cb0df76c765d9"}}}}, 0x0) 14:16:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x500}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x7ffff000, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x2}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f00000000c0)={'macvlan1\x00', {0x2, 0x4e21, @remote}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4bfb, &(0x7f0000000000)=""/16) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002170090780000"], 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r5 = accept(r4, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) sendmsg$SOCK_DESTROY(r5, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000300)={0x204, 0x15, 0x800, 0x70bd29, 0x25dfdbfd, {0x23, 0x4}, [@INET_DIAG_REQ_BYTECODE={0xd3, 0x1, "bd0a4e972e56416d12c259d30819d6e19cd6e7ea795b868f5fb03dcc61b90ef115c6b98bc3782a4fbba6e5621c49c2f28cfba293ae547e6830586658ed4d78e94f3c12d0db0e0c3dd03e4f6f9cbe1b2e533c483a69399f13a42a1e71b65c3b9bcf15bcf324cad4adaa51b31b1d73eec2a300d5fad7649a5a1bf00e62eff920b24dca0666c3d28586fbba5a4989b0c0937e8dddc0fde4b89381d09f7d31f6428e4151f5b0fbc8fd43f78cfbf9ed4bbb42b905cbfa719adc9f60b768652af6cd29b3e6c36c1f22c16f9941652d63a33b"}, @INET_DIAG_REQ_BYTECODE={0x16, 0x1, "3e5d974e78caacc681ec31b4895734149962"}, @INET_DIAG_REQ_BYTECODE={0x42, 0x1, "569189519cf96222e87811f9e8e156271172e6648207a09d6cad8bc10c1ef4eb0f712951ee35ae9eb909f7d614099c92d45d4ec0adb227dae4e70331bc71"}, @INET_DIAG_REQ_BYTECODE={0xbd, 0x1, "9a0ff08898898a769c6d45c8b56826bd55269fa070eb810475ba50dcc60656967573ab815ae0b87d61e447e14cae45b8d0a9de5cc2a52b7f2444b8e80e7432348ba91ef7a1ef35b0b0c80e472b878ee09310972aba90fa06fdc7afedce2c9a978ee43cba388fe369d4e3a6662d5c4d20cb921efc8150bfb46e4a812321f6d6610c3fc073d5b226ced3fbcf378c096032f11d1ab2469fdd213b2e9195423a13c7ecc6dd47a971157b590e4f54851e24903b909ec3b8dc08ee9f"}]}, 0x204}, 0x1, 0x0, 0x0, 0xccd787427512844d}, 0x4040000) getsockopt(r3, 0x6, 0x2, &(0x7f0000000180)=""/118, &(0x7f0000000200)=0x76) 14:16:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x3}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x600}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0xfffffdef, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:24 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x8000000}], 0xc6, 0x0) 14:16:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x3, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500600003b90978a11fded38"], 0x0) 14:16:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x4}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x900}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x8, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000000)=0xffffffc0, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:25 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @hyper}, 0x10, 0x800) connect(r0, &(0x7f0000000180)=@nfc_llcp={0x27, 0x0, 0x2, 0x1, 0x53, 0xbb, "b9cef1894fd870f9883a1733d771e6c4bd65504d70995e3c4aa5a872913600b0dbc34eb23d1105d38c1e042c342ff383f894141d8c329a69c18d3e356290c5", 0xe}, 0x80) getpeername$tipc(r0, &(0x7f00000000c0)=@id, &(0x7f0000000200)=0x10) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000340), 0x1, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0xd, r2, 0x1, 0x5, 0x6, @broadcast}, 0x14) 14:16:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0xa, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x922}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x5}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:25 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x9000000}], 0xc6, 0x0) 14:16:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0xe, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x6}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) connect(r0, &(0x7f0000000000)=@ax25={{0x3, @bcast, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x80) 14:16:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xa00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x10, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x7}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r3 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000280)=@gcm_256={{0x304}, "b7e22818a1fbd43b", "7d2a8dee64603c58b714d2c7fe2eb1eb787ee71a22682433fb31c026c56363db", "6a0af70a", "70b86589e608fecd"}, 0x38) r4 = socket$netlink(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r5, 0xb03, 0x0, 0x0, {0x13}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x94, r5, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xe0de}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7b39}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xff}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb2}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4}, 0x40040) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x14, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xb00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x9}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 964.500918] net_ratelimit: 10 callbacks suppressed [ 964.500930] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 964.521095] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:26 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xa000000}], 0xc6, 0x0) 14:16:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x8, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60400600001484a7e17001cd10eb000000000000bbfe6f000000000500006b1bf7d6a9c371c34a7d66da2de3378a7056000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f00000000c0)=@nfc_llcp={0x27, 0x0, 0x2, 0x6, 0x0, 0x2, "a398f624ff8d1e1723180dfa1cc660cd6b0724590e7a4a43eb6820b60b59a4bd688f0bfe39a35929822f9575b5d360c970f5d336716634eaaae27a7a35c2d8", 0x14}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)="2f3b3a1dcf736c857a50e15135f5f80268974e113998586aacbf7e65f6e3d118a6a101798751faa216a10105c2a37130793d1584d10da310f8901aa12bfaae369e978da8ff7e64889f6b6ba5203c75f7ea79714fd998540a05f4ce8e542886900d7b6dab8eb7cb3a2ae65212816d3c67b4e7ef02662685819ad4938b5916f5fe9c72", 0x82}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="a022ec6e26d372a629e47757a3182ff51342348750da3376e545ba0d9d8db17a33b166fc8accdbe9b7ae40693d00a0a4f4fece6599d5c81f43398c3fad6230682faab0f8ab8a64730d36b5f7855a4d4b89dc5bc74b24af18f4553721478a2d979f6b733929a0a48390354e", 0x6b}, {&(0x7f0000000440)="547567cf0362af936683c88e1555ab8c7f00658f1a50bea928d7a2f278dc7a67d3942315856b5276c4555133f871ee61da6591ac522e8a798388ebf87bac3f34954a7394f6fd194ad46a19ad1cb6a426200908f202c6fa714f6bbd9dbff920aa821e6af38c45ae8f4657061a9c7a2823e5baf5d9b4fb049135df93a8ab74e2911d8dae78cf5ad99bade54da842b0ac568a02b0873675be285a9fcb4d383e510785ad784332e4ff40759da0d71b15ef30c12e7378cad3f2bb7f54b35b3ca4870edc8b1287bb6bf0585b30113d3e4de5aaab2e5cc039f84cebe84a8c7fa041269c64978eb52b4acc3e15bd89023451", 0xee}], 0x4}, 0xc0c5) 14:16:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0xa}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xc00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 964.837614] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0xb, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty, 0xb}, 0x1c) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/bsg\x00', 0x8000, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f00000000c0)=0xc) sendmsg$RDMA_NLDEV_CMD_RES_GET(r1, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x60, 0x1409, 0x100, 0x70bd2d, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4080}, 0x4000000) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x131d, &(0x7f0000000b40)={@local, @dev, @void, {@ipv6={0x86dd, @dccp_packet={0x5, 0x6, "6318ef", 0x12e7, 0x21, 0x0, @remote, @mcast2, {[@routing={0x87, 0xc, 0x0, 0x3, 0x0, [@mcast2, @local, @private2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private1={0xfc, 0x1, [], 0x1}, @private1={0xfc, 0x1, [], 0x1}]}, @hopopts={0x3b, 0x2, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @pad1, @jumbo={0xc2, 0x4, 0x2}]}, @dstopts={0x62, 0x9, [], [@calipso={0x7, 0x30, {0x3, 0xa, 0x9, 0xffff, [0x2, 0x4, 0x8, 0x6, 0x6]}}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @ra={0x5, 0x2, 0x3}]}, @srh={0x11, 0x4, 0x4, 0x2, 0x1, 0x10, 0x2, [@private2, @dev={0xfe, 0x80, [], 0x1d}]}, @dstopts={0x88, 0x21b, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @pad1, @jumbo, @enc_lim={0x4, 0x1, 0x4}, @generic={0xfd, 0x1000, "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"}, @pad1, @enc_lim={0x4, 0x1, 0x7}, @generic={0x3, 0xb8, "72f836794db2eff98ed883cb1f91c3337f5367419e1ccdfa585956a574ee2be863df1aba20d48a1f80397657a5a5fab0a47d538c611c50a33cda06badc6059e47a084cb786dbfafed2d741fca6f6ca395ad3a7f8abe3272c0a5411ab12623cb90920f8aa84280b1184d70b596bd86ed07dc059f414f088f765a17de5c1cf896e8e829c7694af33dca643725a30c42223b0fda1f4a556fab3eeb5a5225334c62374639b280e05b86b21ea05fbc2c7054a1c378065de0b359f"}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}], {{0x4e23, 0x4e21, 0x4, 0x1, 0x3, 0x0, 0x0, 0x5, 0x3, "fb41ff", 0xc, "6964df"}, "d065c0ffe84e6850c2d78e76191075f815bb539346139c448c928084adad6fb8de96047357ca574d0b193cba66ee79359a6dd1b696c684cbdb300c4c8b40f5d37923f481b45334b764a8f0c70a14646f23266e0a904a737b413a1b892fdbfc43699278d2572e959987cb253a6ecb710945d2bbdee99dad2a5f55a484ee257bd81e5e9efe116845a8ae61b9eb3a44155981b4b2767939dbb8442d77535365ec27c294a70913f0300bed7cedd8a8348810ce68d374c01a7a7560c40eda9cccf3ebe863b9bffa319b88a8c7e0128b8fe49bc8b08048ec5f239293dc8517bd1649082bc7eb2a576edaf0ecaf10c3f58e0c"}}}}}}, 0x0) [ 965.088057] dccp_invalid_packet: invalid packet type [ 965.149978] dccp_invalid_packet: invalid packet type 14:16:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x11}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xe00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x10, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 965.291581] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x3c}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:26 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xe000000}], 0xc6, 0x0) 14:16:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x14, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xf00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 965.495899] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x48}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ocfs2_control\x00', 0x800, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)={0x1c, r2, 0x209, 0x0, 0x0, {0x2}, [@FOU_ATTR_AF={0x5}]}, 0x1c}, 0x2}, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x88, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_PEER_V6={0x14, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x88}}, 0x20000001) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0xab70, 0x6}) listen(r0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6tnl0\x00', 0x0, 0x2f, 0x9, 0x1f, 0x8, 0x2, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x10, 0x10001, 0x7}}) sendmsg$nl_route(r1, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)=@ipv6_newaddr={0x78, 0x14, 0x800, 0x70bd26, 0x25dfdbfc, {0xa, 0x20, 0x4, 0xfe, r4}, [@IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IFA_LOCAL={0x14, 0x2, @local}, @IFA_ADDRESS={0x14, 0x1, @ipv4={[], [], @private=0xa010100}}, @IFA_FLAGS={0x8, 0x8, 0x224}, @IFA_FLAGS={0x8, 0x8, 0x10}, @IFA_ADDRESS={0x14, 0x1, @empty}]}, 0x78}, 0x1, 0x0, 0x0, 0x24}, 0x20000000) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r5 = accept(r3, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000008b00)=[{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000400)="0e942f153700e0aca551a26474bcf938645e2b76f50f209b18724d273c56c45dda01d9a9a4265151661e310d3c789c946089f2bce4221471fc72d401ff539d2672ff3a397607889ed86758bdc823ca4d48a077a6bb2a742d8a633d0930a63707ba13dd6957f6d4cbb8608b89cdeeb12847e9992c358031855517f0b5ad9442ba7eb52a6f2a0dc37dea72b654aab21bc81ad42cc4c8ff73efe9b8d8e44f268f2d1ec48e1995ef2a2e0a0eaedb03310fd820baf820813573fe5b9d5d78d2cd", 0xbe}, {&(0x7f0000000140)="36eaa6473690", 0x6}, {&(0x7f0000000780)="1e039ef248c5ab6e24aebc26aac9490c5def344f26336c379dc43a52992648c2950251e3351b93e21b6e62d0cf7fba04d50f6290d3606bf41ef062a9aa463ab24e1b558b775bbe9c712fb41e3a0b67564063080e7ac95d3d87bc00b695acf925b523d57aacee1f19cca68615085f89e71c49d6aea223b061ff66c1771cda0bae07a7129a7ef72a0215311b18fee8abf4773330b9a3690198cd2aa587e640683596eb49ae201f2367ee3f11d1c8f7da7ddc7e794a50c69d7cf996851e560ca3af7802baeac1f46c79379abd5f0ed5823e35df9672cccd462c4b912ce72bb4e054b1cf54e09ae2", 0xe6}, {&(0x7f0000000880)="7042af081c1ef5f514ee88556c3b44b8b8485710a86150609b6a9bf4cc2608d5fa1f38319706bdaa7badeda7f3cc5091de17ffa049342932e432587d06ecbd6121e09f23370f81785e860745ae0c02264c4455eb4a7d2b0518cf927b28ff90cb945a4db215b612d9b6b2b57dfdb98e2f2e24287e41f74405e5dcd2e5513a4de0ad7c36d3caf83a40bd8e7f7c48516663385068f4fa0808cf05682d4e0fc7df397fa9640cf156b048eec39e588d8b", 0xae}], 0x4, &(0x7f0000000980)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0x5b830}, @iv={0x38, 0x117, 0x2, 0x23, "ffb3b65cd2410d0bfa20fc10936662222f160b8b19f615dfb04f9038deb89a90527e78"}, @assoc={0x18, 0x117, 0x4, 0x3ff}, @op={0x18}, @op={0x18}], 0xb0, 0x8000}, {0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000000a40)="15b6181e5ee1758be754f58adb0566167bc07ca97fc2029fb09c55d571ee397add65bf52060e30ac5672815178ff08e3b61c09bc11552ec8b5c1c7f8145ade8bee89020c0d820bc2859bca7bd6f6110ace2e45be5d7c9096e066680523a782b75447e8daa4d7e510d8825eea3712cbea9214fcd41578a9fa7a286cde3ceb55cef1c84e55333a3502055288d8121b00165c1c8d8d3d91a1c49a102a6dd4c60920", 0xa0}, {&(0x7f0000000b00)="dd1732963c8eb904e5d09b2953aa47a4a4cb9e793bfa1629fc88cc6a6b072dfb7ab161fa69f34e454fe90f79cf721d2468d9314ceefc2b13eca397a96ec1ac16325461c798398f124ff6fa56d4759b018520c311d44f3b3508d7cec6a12ea9dbb40f2cb6a6cac1ae3be8788fa3e17eebae09a78f95ab0bbbe4caedd72f0e553d5828f80d53654e194e6bf60c8f8681153754c0f9f1a0c3ecb9eb365e16b9395a3e9ba8c7fb95fcee138a41420a3fcfdeb3dc6263a5a5320d79eb18a61927ec243bd24b05e6021baa21bd6cff925fb59848760e73dadcff8a34e4564afd8198d1a650c26550ed4778febd54eaf51726f280396692b209f20fe9faf2ba244d6c9e06ecc399e672a71250ba191bf46a65da04f6e7c411658e4acf7a2ae9dc6961597e5a7e53f739b3a5582bacf4e9adff7101608d33dfbb2d9c26fd65454d996a57652668b1c9364e917625f3ff9e69c9b4e538bd8f16a8016f4bcf9f5f62c6cb4b4974e4616a61db954d5408ca8c4568f734a0fe56a8af92eebdfe223eb2a2943548814bb59b90cb07cc78304ffa5e2460c8711f0eed03b5de522d24909ce204f9c6afaa180b2593699f678e7c5cfdf614563c9f09871004bac01a46e157c057ed3c9552ee4bf99bbde97f522f21d9a396a3fed5ebb68357f11c0ff7e6dcf81e079e57a6baca4d5d500233ec3900198a55e3fb7e8a1b12b53f8d589cdfd97f193200034429184ed36de5e00bfc8952932bfb827d5a794ddbad36f83cd1703c533f7fdcdcf79d93c37881e246147bf165356ef60378cd1fa692e144817ae6b2fb55a53b959039314306ae41fe7ba26927f894f7c72c4cd961bc663c2e13e74d68a7cc17cefa1dd0ade73fe7f9f30aa96a6f17e7ee1f5b808bd81d19bf74d1b940e3a8959a6849f7f5e2d7cd78f1b1cfc7fd0e7acd3ab2c7a3b8aa63229f11a67556b52a39b8487d1505d44c83f90637e38a1a89c17f68465b9c416d2e2faa05d8aa2382f346d348bf3fa239a9e9c3d6ac06f7e424e89956b58087d656823d7717fcbe9c0c2851049ca65c121b866d5d0d565c5f50985b8d39173c389203f23973c8f18cc37a201800c8c9ce9aa61fa95ecd0e6267eace4b5c4d58fe8624237576cefd4687635c95f8fc6ba2f7ce3025d49bb58d50b6d39c1ef75dd82c449614c30c86315c54661598a44f362f76920ca47c8e0cce47992b402d00a1fc22c90f082de45890ad9ff3ecb2767f58237e4d286d9db3dce05fac1a7d616ad0d65c6b03e8ca953ae5590f25e403c90ea921d12b414335c9792377931bdf3d13c58b1c262c23772b977101581ade9e63c108db5b5a8e73ba4f6049ec61d574ace5bfd1832dfffeeb2be143dba9f04a37ba7413fc0d4a22d89bf566367d3ec4775c8c570bf487439ac078655e81f8b82650e162d8e06eddabf92c07e2eed380a3b7687257d40507785bbdeff7d87ecab5ef00e94eca0590954a8b24d2c1e210b0f26777969a626050b2e3690845ccab2da7fec70b1accd3313ee6b486140b6289d4c64f2d73f35c481a0431ec212b4a122c5d2069a60805bc78671b5425fceb1508f6ac3ea47fd335e7956d98250d0b9e85755c3a03af61b209fb7aa122aab250c95fd18da74a79aa797423249c5fa87e4bc7c1a172dfce0e0805ffa207288444f45b1c26d07dd8c602ab677d425cdeb9b52fb214bb23eaa47771d3bdbf570db24b0e708228725d6dd81f0e302c48ce67b68f29409a15ed1d47ac6c1bf9c3b0be0973b5f7a4a3e58a2192ea480e4ab7b6282c53551a6f557e4c871b1e09e51b5738f756b88d0aa795f376410cb73b5779a9ef4cfc715ec687e0a2198b3945acf960f4d993714cf8d669934a6474fa8cfa73c8137d8e7f8748e90999e9901c222d6b1f15c4cab6d8fb8342835ae22727e8f732d4a68ad244f4a4a83d48295abe4d0466d1e95b32cb7fdc9067e31ef4979234b154794d06e6bd0432f1baf1249330c2faec2b384937c40e9ff4760cc5a28181ef346d42349a307e16921a82748bec14608acd28a33b22741e9ea3f13d57fbd600ff98b5dd4c20602eeb947de4580082c437dff813b498436b5e85333eb031309836de1fdb4f3dcd843a8b929619a5c42292120b3050d37657d2501fc2d159e0da9ef73ada6c5eae992606284c5d7c4144528078929aedef4ee036fca849dc5f1352b14701c4f7f63c62a3e22ce73d397b7279fc6f49f268247ec27c837c676e73f1e6de942593cccfc9c7a23972e886cbd40805d11948c14e681ae24843730ecef7f632a762d1278a25712e63cadf51698aa8ac924aa0b2939f16c6f40fad4deeb49ceeebc8150a016229c62fa489f9ac48efdcae5799a16e3b37879c523a2e890606f70b7b75abc32508826f4f7648d11da7609f7db434af02b346cc86b84a35ca31d52d5fb3898f72c39fdd5360f1833ea318881333b5cdc711a18982de76dfff3b8f5ac5be94bd0c812fe68f79900225de289886c9b1f0a9d7ea3a15656c86c404f1d93e59d976f9d979a407c5b4fd016f7513a16f0a15166963060513acf4580ea36336125ec20b9f8e0a5a95ead0967a24a46e9d17046d8fecb1949ecc63bb0c8fe98d919ed44077852c4285da246a968ac31f4726b718d81259f09a14d920ef775a4f66cfdc6c7100fda07b6a65868500da3d55486997dcad86dd74ce9d66fc0673192a43cb1fd85c73ee6fa2268126e9e7c231a85565d723522917520c29d76f63f741a23a58cb54a9cabd59444dd0bdd006ffb82f1e0730a95846a91c77a779a593215c72f72c0e041a8b1e1c1f2563a1ad3c43f17391b8366f881246fd8caaff461765a788b83534b944d9620a3784c71fd45d88341946d1681168c56f6813c2c804df440b2b4c75272ac5f653eca82dfcb2777719eb17d19fdec6b395b64cc133019df6a9944dbc0788d8e4d3512158fb797ebd473ede3e3b8a2d21aeb55673e23c21518fff25055658c05f75c73ce0bd04e970255f3a56852260791ba571f622cde04cbd402470d631df6759988112473fb4b013691949daff8fbc17ce86c5d13492ab0c790995c316ef4017626c5065814fc18d9c5cd9da5ce3930d60ba0e7b8e00721c0811953bb0e226152ea888abb8900b553b14971cd98c513b7f781fa22d89dda04c6bfa89a9af34c5233ac34545b5fb88be201db2687ad3b80e112cb6b73da61a39c15cc068345b35d93a0298e786a1df0f55876fe8cddf690242003cca988291b7889548b0e2856cd0089076fdb4e1f851f8d32e725f8f27291908e18542ea3bb9c86b3291610457ae3f5ff4e9ce65074a1dcf9a7d68d72062abe7168f378b3e77256eb8cc8c5300d64edc3c942cca297a3a3a6ac3de856467a07a39967ae24a9e04411c3a1f61e991b912662ce3f7b620472a8383253875fdfbb725a602c050a17473dec5d025373b73f562e839ff3af82b9d339079ab4da74cf9e103568f3913c89e5fb5814e299723d955a146184b2f6201304f8902158c89f8ef7b95fd7c5539b513873e13d63b59b575ea9721ba4ed2486f57471530cb9653ee8810d5d4e5320e8c548ffbf9a1f5d45d5f0ca37e3e8ceb7412755e32a43c31433b22de6c33b92045c92d1baf27d248fff4f9b68ac161e1dbf2cc5a2de6759bb2d36fac0e0656135e4c8f7fb58bcac6452577b57cf3f037f344d85f9102ad85775a91571d3d7fd71373e0720ea429cbbc74176ca584498d7f2091fcbc139817e11bd938f675ef626530b932710d949c2db10d93cd6170a41fe2eeb5183552ec1304228d8b03dd4eb35b68f9899756f730a3634aff2ee0affe0ce77edb8dae5631843ac8ff60fe81f5f4f0ef728a8709fecb737bef73694ec1bf2f9df39b8e46a736ee0359709f383210b7e39b979ed138a42ba866969f13b4a24355e15c012bea0795a39bc3e3965e5e975e789c1bfbd53e499e7130be0d6b6fe89c5bb3b070635ed229ab8fd4c79b57398a8ddb2de7ead346771a81cad6f9d11a689b2847757689d29a03f5bbea8a8b26917e67aabae168cff86b2e24097bd81f488ec6b7817e82cb91ee3d4fb09f28a00e38cb04456cfefb706673c5eec0e1524a7550a5669554f7a8232e1a913e62a6feccc4a40f1596fdd189ef481ed5c4bfe15c8b1576226f9b484d96cca23681e74663579546d6e2692ad8a9d377cc1b33885c357e6c86682ea1c1249c987c8b60e7552a6aebea5d4f63433a9b6844d47954561205c19f78adbd1af4b58689e121182eacadf4738a2da424a19a23bc58482de1974ec3773a647b4adb0a7ed885c87a91555164142307cf9cc6601726d80ae506c495fdff2bce82b13acf1dc2ecbd12347f8c0512a9771e590d90051725594f1616d41d627fd1c3cd5336de5d38e4f0a4f5ddbd5f0daa8ce9d53e2b41d1a1565d14ba9942f13da3dd9d3db05d0ad419ea839a15e18b2649d07b28c4c31486d2b274fd48818fdc68a320930bb7edfd02714899a45b8f0a8169850ff6830abdd4e5416056e284420cd8e002a76a6444756d26525a9b9924183b3dcdc0e70ee0784810dc0da0683987685780e7ebac8e412d86003ae19ed4d3260ab21cb90d871cfaed424c07c39545d8339c0099fe06ea61ebaf3272ad0c7b1f8a98d5697796394e8099c1f99617b8a801ef4d7f2551d2c4378e7e67db8463aa2a8a098abf03a40840ab82e94eec07309a47560b16c77c6f8dce93c973a7bef61b8991ddf289b1adc2c6333b01acd08ef846c315ce08f5e6b5e80cc18e28385a6d66eb81a18ec64da620c7c5f5b1454fcc6c9c8ad93019f2791090d78c90aed49baaa92045a730cc9af4fd73b4b5d2d8a542c41bfd9f13aee05ce71cc806f7e96ef78dddd256982ab9bd0f2d2d2a0d77256f9982aa9c3b3b8ffc41beb17cae3afce97d808aacd23b25a8d0dd662b13558bed6de8871c19444d56490b9cd8a0fb2d4540c83df60392d2ec968fd847f801419cf07f5f0c53e19efd57e205951f34205172c559e062757761d2a10ef55911ec2dce5651bdfa90e4c670a362c1ef627b78bc68b2aead0843a315e7967c468847c30694eba658ce722b95e038b22f41cb038c2b856b1e8f744e6d0c7631c2b2aba11272fe0ab85e5ab739be69a5d171281c031b5dfbe98c34795f47260a721364eb3f70491b1f1b9f0a34ebccc54e0bb0e4927594be36de887710bca50f41e8a4b86d95de57dbb059a007a6ead20edf69aa5ae9754cb52a82febf66ed8bd44a204c54c6c1c2fa8d08761d1dd8b914e3b551b16b2300fa50f6293f33fc55594b78ad478854a39656d63a8a5c04b0fc8e7e4fb1826e59cf8d4196d8d8e8047cc18f39fd2ec640684c2b7748269959b17d113820fb3c34f19541f5dfdb25116e0037c7bbd609ce4e89c8d1fd6bc6263196dfac14dc37c9060b6df267d8ddea2946e2626369f6f4db34097d85b3bb69a3513a647c141b08a14611be3259767d8b62decb9c8b3270cc0a3fa6c11b18f2504d4a800b8a09385938f71bb0cfd5214ed261769b286d2fc0201bb3e03bcc89b49d9d6e76ff74ee245fc622f483d7d4f5e85307f0a93d112ec4ac1c40836463055c7235955f1f90059d768ddc0853bb6007262cbf28f16a336b138fc04d8f25e542b10ccdf5548810a0aed03b12cf1d09e14f52db8b9c3df374618600cbc3aa2af5f621cd8d2f8570304bd3ae3e11d689a1d1426bae218208b0ea28b2a0dfdfeeebb81c16cf845e6b21093ba57551a6d0d6edaabaca98776f819183b49158d34c6aeab4484682db09733298af6497da7bbd844c959bf9500e5462b6", 0x1000}, {&(0x7f0000001b00)="7ee5578c232ba15ffa86ae21a00d5dfab46be4ed2ae3dc216fe9404368a138ef96b2acb35090f56b95e6446c1148cf1172043d7a19d75c4704c83dff68bf1390c584c94b1ede4ed61b3703c4309b77b71211fc60a40262a6ccbd968b5c022c360615c0ece03275145ba0a2121a29b7b42616b1fe84a8946ad7ee5f54b04b45ae242d882329481d24dbf768e472d7e65801384a2ef17c171174a4afabe3bb07d81d29bac5e2c76f49d31b7beb7143a6db05", 0xb1}, {&(0x7f0000001bc0)="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", 0x1000}, {&(0x7f0000002bc0)="699728192da87b4d10cb6dc83389dc841a9143aabe9aeff43084a4c1763619aca27eec08625801b6d0d53516b4e967b034c41bdd786f51c82b9271d01c7d65bbb9de94398b7e25375767c6ca7a9c29154cc268704714d235039cbd", 0x5b}, {&(0x7f0000002c40)="99675586426bab99d63f2fa40f90cb0c545beb3c77a8e2205c817a1c5ecdd952a6ccb66bf15821c1be9993463d20e85dcdf1a3992d7693f4fa399c47e6b1dd133001f38719fec85713746f8dc4fc3151cde14bac79b67593203550d524be552505ab92e24697a67b", 0x68}, {&(0x7f0000002cc0)="6e59522c917495825b533c0d139ad1366e6dc421c13a14dd97e8f1611229cc4e08f9441bc9f9f8f61224", 0x2a}, {&(0x7f0000002d00)="4229dbbaa5dbfaf8c6bf86c363c84626a0384c3dd77c39a464e7053f16e3eb445041ced183c081a52f116c9e5ea8e9f736e97c78dbc5bbbd6ac25e0585fde2da", 0x40}], 0x8, &(0x7f0000002f40)=[@assoc={0x18, 0x117, 0x4, 0x7ff}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @iv={0x30, 0x117, 0x2, 0x1a, "faa41ba867b28d8cdf33622be067a03f3d88da8c0d5df32ce9be"}, @iv={0x78, 0x117, 0x2, 0x5d, "f5fe433c4fb07734ba2643a0381e0cf1992c321bdb8cf7587fc2ec9bc851070dacc17684fbce91696e63956257fe99aff761c9df5cf4274ab48e262b6c8aa54db69dc7c5086e3b238a2c7231cf0eff861dccaeb0fc34098dd9422ac8ae"}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x1138, 0x4000}, {0x0, 0x0, &(0x7f0000002e40)=[{&(0x7f0000002dc0)="efd77422abaccb171023544b3f30850e6a2b995a916e471f89b0d7fa2242d2e4467d4a900635162d1e818502a8e92d68473396d41f454502998f7d9ef8d333fe71e2883aba190e4c5dff64ceed270c4260b752093548f2fac1ac23ea47", 0x5d}, {&(0x7f0000004080)="c4ee4c4dbca9b9857b17ed3ce3157c2d7bc350102cad45a01a881d9dc31ce9a87d07a941eeb5f5f402035635c9c81b1435abd447d3247bbedecfd64d3cc88d7b818a1eb6162da7f727db28928922f6fc404fdf92f2696c89f89749228a3b44fe113cafe8d583135b2cf5606b368ed83b91f26cb47f8fba385b28e2d5e99b4d8d20aa36751d", 0x85}, {&(0x7f0000004140)="c553aedc5c82386fe2866b36affe2282e4348bd4693df67857fea9ee1622c37e84faae5dc23f442fc58479dd55791bcec9bf5ff44c8cd54fb9771d54cea1e18b7afb3039deb56668e19310e7d182571913e2d011", 0x54}, {&(0x7f00000041c0)="837fea183c8eadcd88c2fb2cb18e8cfc02a24ad0a29c160643b341a42e68fb8631b641d1f13fa18074f126ce6367a3f8d5f6bcebf23e7d3aed9f05d4f687a964e55b0a308106bda4a9cc2f49763f", 0x4e}], 0x4, 0x0, 0x0, 0x40800}, {0x0, 0x0, &(0x7f0000005500)=[{&(0x7f0000004240)="ac9530e5c77c78edd7d6d8b784afaad16c6890d693e6eeb932ac780bd1635910fec2a9cca8c461e74bb9ecbe6f42ed357e4a3cf817bcee7a2e62714223efb96ef672c9e5b6049d2990a8ab10e2f0d991c4b6dbc4064966ef6de17bb5606e250ec58d901333ffe2c2d7f6ebc1ab7c4922f3a1c8d4419b08fd61bcbf18aee1f2d4d404a06bba7f40f656505ab5232e9d4a8d400ea6c00b44c637f0970b672c8f43500a7f9d16cf43d603565553f42b89116da147d5f165a3e5d2cedc45162eb1f00d67e9ecda166c7b4f682e1766078de35fed0af05d4f9c636087c10924c821f0a63a873e52404df12755ab586f25087cdfb511ac19", 0xf5}, {&(0x7f0000004340)="c64bc03d394ace424973ca500f6e32f5da39df90ab2f63cf1db8d8919c1986ae36c9d19964a899f21ceded55c5df33ab63ec32f322be9f3c257bf0258ff9d48d94905a06478cdfb15268f3b900c1fddc", 0x50}, {&(0x7f00000043c0)="7345792482371287ff908a4c714d0c6789e0b83e155a52325d4f25007d1c14d9a3908901af30bc8ad0621392d42b447fe358f59ed45d38a0d910f084dd807417eb0e0f4c2962ad40325d2633c0851189b6dd060486e5dace2e50f6816206a6455c5e1508ebc5887a61238206f3d525d839877f00f34f64199fd49b53ba08964c6140c48b742f5297af7053f4c2f56b36f7d7c5fbd970343cc4677aa36b0441123b05550100a50da269d163281e747f6ebe3a4037f4922d399197312e6dfe94d3823866fb5dce46766c9bdf10cf0be17c93d24f5ecbcba3ea8ed36e0bc54fb63ec2c0320b019515c3e312b0d172289ddad1f9f7b427e68a604c2fc07ada4b393a263690021f7d3195d8b13b82297062cf2108286ed01868f74e7b0878234825c3eb388b89ab7eea29c5433ede332a9520aa06e9990072da893295c3fade8e1802ee25462a1d1f9930b795ff6bb240f1b73adbc77d439b2b92f636fa4fc46830216ba6b797c83dc09fd478b7e6ef43815ba6cb8423ce79559bad600644dde9c1e683b6d1a1f39417385b3bdc98b476c7affb4232986079d0bd512eb14a4a1350205a26740f89197edbfcd0ac40da5c9c4c79679498520a24aab83815392b75c9d362eac451a496da032af63a17013bdadae9b0ea5709c4b8325083075b603839f9e29b5f33bdb8d59447de70d16b4c10c0638ae122b23b1d5316245fa2f9c7d3f649f6017394dcf7377a3e0d1141260c77747104d24c924782a446e4305d6350f37b516cf78b89f0f9946802b7aeed19bf2894d27ea6986b40eea577e9421f5c894368a626bf7b62ff182b6a518f6ee91e497b05f77d861252307993dc9bd69765fdb4ff4ab556222b2281826c9dd0d0ba0223e4cdf21b6f1eeff9783403031d24eb2fcc33548a0326fec1f3db702169a43f7855a6fe2b35f1494bbfba18298eb3bd0a8f5cfa0db9021a786171cf5b9c06fe602afaf464e8ad2cf3510e4681a1f8ab8f6f805eda8585ce3b3f080f514d035be2eab7a108af79d7c549f52097883b1bad3c5f865b5c67a3a477ca50cb6f31d0a89738a3f2f599fcc282dbd6ad5f4bc6b98ce1c8bfde8625794c7e1779369231892df606c21589ceac6d7a0fd6f98fb0da6c61a09309b41e8357b43c3fe0e3c6caaf37c22f747ecc0374c806652bdb7f5aa0d414bb5c4f529e77e912dff92d823b1dce0c49dcaf2ed9a6459dc9a91055d97e2474af1beb046bfbbc4cfea5b86e2522d0621d4d71a72bf9a6b4c294bcf38dad8f4bdc4434612dd8ac5f9824c72bd5c8cda52e1336bbc2bbd16a882458ca85a373c5985cec8648b771fa09e1c88e8588d3f7269fb03915c726da007d07acb5f8f337b503bc25e4d94052c8dc48c430b23dfab37633e6d57f1df2d038d1ba2d84de4cb9410ab5b45dfe6be846837d4e469cd85718ad9654eec2dda0ebc95845b8205222cef269a8035d3772fad9b35a51deecec6997bf3ab378f3e04c987cf5dbd28ce1c5407f09c36eb6e9b1e3409b32762658c5593725deb7ec7538c37e25fe6df098c3bb5d3dd4df1416258e66617d5210310e7273b24170b0e6d5432484aeb2aa048156ed3beae86ba9411e8159abcab7bc32c031e99c59209cf2210ada1dad5a5316e2daa9e2a893cd82bc50c50c5328b71d32d9d9171acbbb216830d2fc8848082d2c6225134b4053a76dd3cf7c20f9d8eb8d6619255248916fde7c8ed03d291a51c232bb8264f6aaba7f2b9183ea0fa6d4f3b69e19dc446fedc877916407c8fed975f4d9b0f03f5b75774a10d3830981aa8b56746e7628f99c048d0daa40aa915a3325f8c6be1e79a6ea2a8340ad843acffae6bbb74aded96ba66822dbb0b9717138d2fe43c2c941e4a87a67ad7ddb3c5b9d05c8fee4063e24cd917cfab8d182c068fdaff02f835ca7096b165ea25fe632c07edf18ab8c7462eb48f3434511eeb734ebc03058e9e77806cd527bb574c08d4f025ab6f9bf6538f1f9eeba4b5dc0705043899dd9980080b8ecb911dfddced2e3e54e71e80dbfa90116f09a200f85066fd150c229fac5e9a4a34ea009d124b75b06096ab114ea63fc4751f4f1d015c3eff962d67150ed4add049f5e335a778cf8ed2c6236278a66ad0dd921cec753db35208f4a78756836189e405e0a35dc349537b0ab1b7863b33ffced83991b666e31d40ee6697f09c22b8a15e0a26649429349ed1ea1be9b8153a02277776288f7f5debffb0913bb222fd61b60d56330a4580d511b369302129fd5ff45fa361c47105263c76acc4dc1a21bd719d210ea3056bdec72cdcf6e26ff4e2336b0c42ed89c68813c501e864d15469ad22f317b85776f9e392439367ff5fca82407963a010c59c6c96de37148788d2b64e1a4231aa87622418a4fd1c3ffddea270278a0892f21ba2e86ff324e10639342aa511ef77a2112c1730fcf090d2952004b0e537ba597f0f2d65a5508e556f21babad02d5f5d995bbf60e430f54b7214db986715967a1d0d4f604a947b773192d4a85e486b40f38aa163397d067eb9ac8a712620997ba4bfbec6e20d0870f790e7d7106f3d54af9602efbefe83fb95a5309bdb70b744fcb52154c791bade5230d861e367bae93f79c3f7900839ac03a2229d33da59932be415a9108795dafa9824f7ce1a89e85c0d9ef6469514fafc518c3646a1e564f84aa9047765950828fd0baeb9328be5720cb1a2a892db638214a8ba1a3b45875b36103651ddefa5ca925ff44f2d807d558aacfab083edaf587e43663648c18576651c4e7f6da2f153b8d86e8ab60080e3965bafa621e9603a6d854990952e33b526bab5a88d5d65fa407740c9ba37e004eeab23b934701d3103e796c1e52197e776e54f68efbfb0ec8012a8758553eb612b9e1b6adab5da70e393cd08c545705d161a4dc1c3b73b58ba49acbcabe0fa125fc10d6d21c17d8036ade9235f6ec37216ab11c46ccecdf188dae8049aff9a1b102799fb227298707f1d4d9f96c9c3dde6f12a7b01922db1f44570608d2dd49ded9babd4548754a32429db5eb127cac6b2a59f92794dc6590687e0ca6fd67446d25682cc9c9f973fa063343e388077e522adfd54cb903d199f7aebc46fbc2a991e9f50578bdb3f9a1a45c1c8b022a6a9dc3771d6dab59b10e5af42094bb4904c93320330df629534bec51b5c147c9894a8a834148776530d5d50ad01e80c1817476a4e1da7dd27e84ab9eaf0da8fc44c9bbce23840cd42c38f2e39d86c7c83bbf02bd25ba8dd8e535cb79cb118776f8e499b81404bd0ef1eab88b5ac7077669c6457173e52964c5b5d6b2ed4770560093fb5766dfb7720af4af18e0682acf82f31778f42b9a830d2cd1131fd9b150c975a80622e76a9b43b45177b960ae7bd4e7f4a3a9781704bda3c657ba0fa08d2845ca48da8ecc58ef59b0b4a3a9c05c750d9a2648e1664e36b9992536181b4c33968271e24777af1c8180256abe911cff1b92a3df59e67a3ef3c2cbeb61df2e80ebeb7bfe7ed56c5c7bf0203dc42987eb448d27e06fbd5b1fcad1be5e3feb0aceae5a7b978c5d79b82406d8e5dd7f9eea5565b40d6efeb0877b6177ad8576f674e378dcc2c0d4da7ca484f09087147e55ef9967d6625e015c106e5647299f1e2e8c84e9b400eaa21473bcb3242b1996b05e9f931a339bc1b4ca3f5195adab42c8d4729ff949bb8909cd2ae34e91c570a4eb4637eaade08b83496d1b373381a947f1480e07f026a94c0e56596b7518676382575eb4cd4411a97df121030db7b34d368bd0bfe5eccc90613e9222791f41b32456a11af7a6a45b593843e99995f87ee0beb76c14ce4667c3671a6fe511bdfe351022240971feb60e555a1ed75bcffa6f2d3953f87bc199834bc8d3be3e290c5aa6a9c046f4209f9f19a60b4f41d6f3159e864e754b23eb8748de655ca72f78f31786456085d173bf5849bb6de5fef114343b01c772cf497e291dbda94720875ed87d547f74ce7b2000a17b93b17e1c1866b7d582bb100fb7058fea0373a3e862adb7f6aa2a3dee01c471746cf5a3e13ae2e1dc9298cc968ad41070156f2db73f795479771b3a0db56cd9f0f78d093a60b969bbf6820dc3762c0aa2fefbbd6949ae6dc994c80cdf1788226af3eb114cfc3b6c6372dc36fc61084be90a83217a92a8ffb5e94ab28267142cd992cf1fd5af7cbc80d26ab1980a7219ab136918eb9559b3e20798db7239d686f42036da32a63c33098ea4b4b208850fbacd532fb6ee12d7b26afd386560db05d8734b676fd6a281388d9ee37a4f53bc4fccacb6e38e3be768b5c381dc85ac7ef681a8dac5fb65f9cdbc0fa252f3e4c2084c8ae41a83b71494e842b0c30c49147f9dd8c80c73d9d6fb2aecd14a6c413e66a51b9cc3a93f472693dddbdae07563ced60e415243dd44435423e361f5d9a94ff40bdff846eff050da421f47f8018295e70ce4102f1b3b144e5198de92a5fd600475e3f9d4c890cb19f8df1e32cc7433411d2a49ed33636eb337dd7f9bcbad4e83899c70eb9056a0fe3390003cb39ef8954d4cf5ec32a14871735380ac4a62bd9e03740b1be6666a605eeefa0626a94c2dbdb10933a460a309b0e4eac99242fc0c889a5d8a04f0014ea04d31a32a891c7180a06642bfd2bc9f378d9aa4f2fd7ff7b4ff8cc578bd78de32fa3db2923d56e5c42a97a245a8fc36fb2a44439f1c64083ea710d51e89033fbac6b0a84d0399631b845348bd0a0c10a9dc340ed51dd2bec7e422b31d991df04a8b7063124d8da77b0fb261308ebc72b6c86222bfdbc07505873469c922a5c92597a2ba3e941735f3fcf32d81f0b8c2aa8c9e7015be2cdc089342e9ad70bb891dcdb8df332190128391fb608b9d128729079623c1b777a7e5068cf7a4290d98f026de440d3f1943266ad652cc6ce838cbca1ad44c23b368c2048b6f40ab1964ab8108ec863a594ba83ed5c584a15ded6e22642611c9a848ea26fab7a16df56c1690fc73ebfc36e81ed49798f76762dd849caf3aef1394a092fb330e4175bb0651b9f4aed1cb904e178aae0882f88fe38fcb05afcb3e51c0fdb0c0f05527af94126e641bca943c9be3714d4c092818a8f36dce35b708d0ec93d273661f70740a490f3c0f14ad901e2536bbc5345527bcd3c4dbc42062193a5e5e9dee48994380f3924e0fa1b55d684fcb82996397dfb56b788a877c47e1a1190d80aa4116d8fa736e98e885955c04a515071bc0a89aa75a6739fa1e99c6abae463b3ba7b231f06304e80c878f8d86e837496a3ce87e317b521bb8ee5d3424231fb1c6431c472b5812c21b57e10bc04cd234a7aa55fa6afc8a13aee9e73ecf2ea1129d5650bb55cd8c54309a450ac57234132d1b10202c49962bc7203980c0848ebf27ee9766966d85d962d9e8a9e1ec88e865b08ae62f5ad1663e108e6a93c323a5946fed58edd18ad22c59186b0e7106e36451f9316078fd37f65ec6a0c53540fc513d0a77b9f52511f8bed479518dfa143238db0fac97e3b42e0d94a5451db1fc3382ad3459b610776d027747de65f500e29645d03fab38d5ed2b06be9c1060a1a12366d69a7b1b20d88b16aafd266d553eb54e2682d6a87d6d05585323e8c7c824b4dd99e532cbcb4c47ac4041bb61a86bc96424e7b8c526a7e84704920d1ca1128de1b1a4c81e0c5a4c06922721174d33b7fbdff2b7f783d8da83be13548ebce11865de1737b56a46cf7af9c26129019e3b68d8e45d64af15e812ecf0cbff2cb75728a8115328da3906397da72b5be18c94d7cf3160875a25868c506be678f72810c9ef92b063", 0x1000}, {&(0x7f00000053c0)="6ada13d298e82a36ccdac61036b0e3f5026155346cbe85d2466547f0757022f395aebf99ccd9f3b9a0e7fc55a560010c53750c4dc00956a8f4e260658c9185fa9de3bdcfcbba7f2b1290c425bcc043ab5338448e25e5560a46d9e2ad0f54a08168a1a10d5dadaaca3c0eca074951d8e05b033ecf99d474ae2a", 0x79}, {&(0x7f0000005440)="13b7921b9676795aa48dfc7adc996caa0d90ecae60e69ea0584ff1040de4187a06d5c85d45b0545d90b604a96c961c1c53a589a12ea7ac35a1c28f498ff653614fe0086d378764285ba97c8ab20c397e71af88e09526a8099c65a9516c593be8467136a57598d427156968a0d65a24646ee0c9963b5ea0c7dc2125a9dc02284422a3b107924d9c3e1b20a27e0a34ec1dc411", 0x92}], 0x5, 0x0, 0x0, 0x4000000}, {0x0, 0x0, &(0x7f0000005ac0)=[{&(0x7f0000005580)="a75364674b2900c7d38a479ad995f373afde1c3c905c7355324e59f4c88a1f365481", 0x22}, {&(0x7f00000055c0)="e9b53462943525b9e18f233c32cccba2136531a6e07460296c8400614ef7e81a5c1761a94b728a36503ba752e0e405b366222ed7e209afeab4", 0x39}, {&(0x7f0000005600)="f0194210", 0x4}, {&(0x7f0000005640)="9038e4cb0c50bdd6f0534641c426c1dc942b57d810a9af35507d217b9263f53f4c94a13ae636d44d90514ff401ce1ce1c0b4ff31da6b7f0712373d2b30a04c2cce1a8adf77dd7012ccfbdebde660c15a702bf1805d5923983f044abdf63421d7e109b1082e0e765411010fee597eaa07a6f1c827f74a517a224371c82dcf29637fb8140fd82189ceb920c7fa7e35c6a5a12afafc38075c226ca2870be021cd7a9b32b78372a753d6800c027a4f", 0xad}, {&(0x7f0000005700)="93d3b6fff2023e04c6d8b95643cad91a808e30e6889f5a5196dcdb548ec63a201bdb8c5e3683d021d49fefb9440dee78033fc89f96f6474b1098ffdadd1cbd6c961609f75d7db58398c75007f84814e2c8a3bbfd688b9b3d4ba9501b4e632266fa51413b7401331e3c7de5cb3c62097eac60e5d6042239745a0c3d6527e59b3acd7179f8452d10b7fa9fa5ef766a70bdef1d61a9fc167a4a0f5b88150b8ca38afc67eeff8da136e0a5dfb270d97cd73ab515b9edfa3af390424d95366b571bbf783959a30c3cf38ece18d7d84b9f2efe6536a7cdd164e06d9776e9fa695b77d598207aa3596817dc2f0900d067b5bc2a", 0xf0}, {&(0x7f0000005800)="7687eb1495a1dd5110eb75477583379761d4df008fbfc67d391fc4f6ea17a83c1e9fc85c636934b882ed7e297ae25caf559064a28395b9808d5c2013d75e36fb2edc41b8bd3e98b1978dfc47f62ee876061a8718ee9e75ff4a03dde490f7deb0e28d50f06561b403e1646c9e47302197848788c1f0be7ab28a05049784fb2f76fb1c03247050084888dfa194af5e21c00f4388239bc351f458c13e4745853ffcb04881d46297dfa559569998479ff9cd4c5d3d0b7f3a289e98c2663a34c3e033fa504b772734ec2177969a596b660dedc997aa", 0xd3}, {&(0x7f0000005900)="64c8279a61966753197440dae1", 0xd}, {&(0x7f0000005940)="1e0dd9a76781efb364688238506bf3a4d4a1199ab68845ef2300f181c97be4d70ec7e63029102d56c07d31d0aa83539aeb9b48440c4d287f343fc66f4a331291ceb4d6b8cacc9cdbe0d03468f1427fa6dafde55216e1a832f66c887619335ba35db3fec222c6b501593333363863245fc6a491b85a76e229e56ce8ae6e5e99faa1ef4ea819cd7763addea2e5cc54b63d1b0b46ac3e871fd560082024e2da58cc9ace40513f24b35f888dad7fed24f91040c18c95ce1a98ef27c057058ad43333c22cd2747eabdd5c8e37592dfe046d2ae8e79ea26b7b61ea5bf636d8f97a56", 0xdf}, {&(0x7f0000005a40)="ecfbe4cc3485051ca7fb8369b3a51ab75dda9f1905cb4ce4f1ebd11eca504bc9ef0d369b64d9cd12b96eea998423850e83431725710d150d6498b39a7a4f2deaada63e", 0x43}], 0x9, &(0x7f0000005b80)=[@op={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x9}], 0x48, 0x4000800}, {0x0, 0x0, &(0x7f0000005d00)=[{&(0x7f0000005c00)="ccc562d9d84c0362d9012a69a70076e6c831d383ada199495edaf58fd56741c9ec79c9ac9ac5f18df66365a32d1bb37f4c95b1d5cfba1e4ace0402b0d68f0700d0f919c14640c7aefe1d5f78da0f129e03e520a0cb7e6b422fbdebf69df8c5d5", 0x60}, {&(0x7f0000005c80)="85b59885c6656f114c272a61651683e95ab669ee37aa6392c1d74f88ddc44981652ddade1e7972a9320d30b0590fa2bb0d71c5a91d6366222dc94b0a40b3ab8382df7ebf9ae938d1db1548f09369c864fc0038aa20f4b9bceda297ff6f4f77278c5b277a0f6ce11c45a48b2e547c20a4d67d5a3b434c3063c8de641d", 0x7c}], 0x2, &(0x7f0000005d40)=ANY=[@ANYBLOB="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"], 0x1120, 0x4050}, {0x0, 0x0, &(0x7f00000071c0)=[{&(0x7f0000006e80)}, {&(0x7f0000006ec0)="d37c3ef6bcd9e72bab8d781563605a0326bcc763ca369b7342bdb49c56bbe38fe731d5d09432fa7def437661f4889486ec3232f4e14bba95302b75278c02803e2bc85e189c64760e32a6d73bd23c517d64a98f2362d0e5afe9b762a676e40ccc53864e80c3bbe67e6bcee3677a9159e211b85a08c9bfbcdbe3b4e7267ce60c47e382ac5afda3e0819d1d1c533643d90694daecb8f6ae364303410119df50f05a5992e6ce7129510b23acbe6a46974fcdfc30ddbb31dc66fed99fe1de7504b76f737142e024b9f7b1aff29781994f3d5b5c3047c2d23fbf133836781285bc38b12e7945", 0xe3}, {&(0x7f0000006fc0)="6217c2494bc25eac630070677e5b4fd06e90987b1d76d262ddb9ab936a20e70fbf2b6b63b6b4c4fc9f11fa7054cd", 0x2e}, {&(0x7f0000007000)="694d25de0b7e332c4af75fc3377d2e6b7e474f94e62315c1c4fd96ed81b96bd6033a1f49f4f79487d43a3da167bf2120d11faf88f1d1ea9e54ef9e932fd5e95036da0ffe4f26680ffca9f87464c6427525828d547fea926ef1aab0fe5541bb9cb09d4b5c831d8f07acd9ee742064d5e3a56ac9eee60e2a60445db885fad7e789f5c2fff0deb85dd801ee974712210d6b7f49a3d6adda9f47dfa142daa0cba56e7234770a98d460bf96dc03f8edd14b", 0xaf}, {&(0x7f00000070c0)="7e5a8e08d828f869009a0987eb8d20401248f4951193aeadf03e916ccc4d38fd70f4413ff3e3dc16cab06a1f974639fa59fd6f61ed279b332b6eb31db059c4ac25d475d1e053620eb3ce900f3447b930c7ea02259fcf60c49e3132c53898b3449816ddc8f445025ea0d28e50b81464d80f", 0x71}, {&(0x7f0000007140)="91c54df84040bac45584892831a06193e8f32eaac2e82cc8c1840fe049049c967fce71d02e954f08bc14fcc3532462b0806c36b8705c3f9a61b5b7e2372aaa3acd215523808193883c398bf414ac510cb116f4de0ce2566c1e6a13d1dff07ae98f698c0cbcd1225e4ef6bb9b9a3ac21a0ada3cab", 0x74}], 0x6, &(0x7f0000007240)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x1}, {0x0, 0x0, &(0x7f0000007600)=[{&(0x7f0000007280)="5cb224d94118de85292e42d04e370cc2ac8d26472658a4d77415200c7a165a97ac676c2a3d5d657f376e17288899a8343fa210517aff8ad4912f4e3c6efd99219371a269e6b9c44306b1ba24cc11e6a08f84af33648e0349798950c7d35093f24906e6f6acc748845162fa2c910c610371844cd0e9bdaa9b9900a5747ca314dfbcb3d0d7ad23d16d07d79236b5769c908a32e51d0546a772c471a29fc1", 0x9d}, {&(0x7f0000007340)="3c87ecef7397fec8993691c9e124fb1979b8256221a25ea295dcca63967ca7da6e06dffd07771d4ec0fc921fec11013aff5e3f74aa3d09a4e6938651318073a2778cef8ac35ad1c26587e3582ba0eba60bae84d0ca99ea612b2a0683351fe280eb572b3fe28b2b34df00d8164b65450459f863c1259d9cfb1431da1cbfc25870978f339010153fb302d5597dc4ff10327f355c2f2a2d3b1ddc0f7006bfcfabc941aa2259f550ad6473d80fef7e499e64c602e4d7e0f15199a4c6479727c5feb8ebf3f520b1bf1d0c22a281b9c86e59", 0xcf}, {&(0x7f0000007440)="262608f5bcde96e410a71cd09ecdd0bfbd4a40ddfeea8f7cdcbc3f2c0e347602eccb31ab92335b2f73c661232aba41e4f79242d9bb785317d3b1528fa5f10483411cb75e992368689756671356c052116c6afa38802697dbde2903690af892836ab70d16d291e0854a8b602ccbc69084e868a54b9e9c8dd9c131131aad3c64fc9cd0d4c7f6684233f9b386c1eff4631faa4824eefc9ae29760bff3915f7de2a10f0e770c3666020156fb96ccf9cd40928457d6d1efa8ad2b25b928a219c48e02a30570018f28426b62663996216f8075f1f8c965f05627", 0xd7}, {&(0x7f0000007540)}, {&(0x7f0000007580)="8ed0feff59063e9e3f4adf7376df40e6fa16eadc25efbf767bc8e69796cf3387ab46113a1c795696922242aefccf220606824a0264836d74f44dae0d9941c404de70e0113749cab1901addb84bb9d84ea1a5196cd385f6ef99e515533fd848c3b93ef0175c2146233502a3dfa701e682eff8ea79eee400e2eb", 0x79}], 0x5, &(0x7f0000007680)=[@op={0x18}, @op={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x5}, @iv={0x78, 0x117, 0x2, 0x63, "5b18dade84da6972bcff01fcbd56f875a1eeae4cbd630e2f788347f5e9e9c451ec0f67d3908f9ed4fddbd882db69ad8982cceb82919176adfbf73b9a6bce83c19f1686945bf6629520420c9807f92c7f072f94df75d53c337c56399c4590507e8d665f"}, @assoc={0x18, 0x117, 0x4, 0x5}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}], 0x1108, 0x4891}, {0x0, 0x0, &(0x7f0000008a40)=[{&(0x7f00000087c0)="af6444f90300b836381c030c32c7c3fa5d90c1bcb13fc47ffc6523921dbd7983de77a3310410123710566b22dd35561d68be50eaf032864c87c53d218be740f5cc3039db47e065187a1913672cec3813724298ec3ee6ca74f559c9dbe6e2222c2ab168383866b05eab2eaff57e04a50debbe711fef81a2d2", 0x78}, {&(0x7f0000008840)="99cb03bde52e3740b32dae6159dc23a40f8f08879238fdb79abc69a1d9be39734ae7d08b5dc9c5efd2d00e15189b8d02d9279dd36cd3be49db96f23006edf34b3502c214a5e37c7a5e0005e9e85abd66eb68380506bfd02ee9064162b8012308268053815aa4059932fcf4ff1c9971e3627854792cd7", 0x76}, {&(0x7f00000088c0)="918c75484ecddeb1342ad45549db680878417907defc68a42522bcf7e3213b35a30386efa542be804aa74aecb384778c210f87a38c730d86fc28cd765d15a6f90963eac4300fbd640abd1faa14585589ec057676d478953507ff9b3ac78fee97d3a6e9ccfc4bbcdf228b6b4686c2c67d898ffd124eb6a0040dd12e6a0b02a8d94e007bd9c91fe59f269b352ab91dc58c729b96bc44cb6d82a45e6c88c7d3bd3751121f87d6e5375e0a35097fabc4bbc54fa0e49f62401493be95df9871160512ccf558e7e3b02dee2e9a4366a3f87a80e9eb715920786b2b60646ed61b4f0164361a41db827db0cd6b9c4fafd4457ad5f8849c", 0xf3}, {&(0x7f00000089c0)="0121d0fde128313b0c2966aa7ab8a6a2ae452b803bea412dcde50a823a3c55bb86bb29d949071f189944c6ada3c4d90226d1b2c66da93ecdbd7a338108d8003a8992ffc731470822b0661f2a6902f12fd443ce1cf7c8f3428f615941c2a00984ed42f5e5089a", 0x66}], 0x4, &(0x7f0000008a80)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2}, @assoc={0x18, 0x117, 0x4, 0x9}], 0x48, 0x4}], 0x9, 0x40044) recvmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000180)=0x4) syz_emit_ethernet(0x4a, &(0x7f0000000680)=ANY=[@ANYBLOB="aaaaaabeaaaaaaaaaaaaaa86dd6240060000140600fe8000000000000000000000000000bb07000000000000000000000000aa0daa00004e2200", @ANYRES64, @ANYBLOB="2a99148ddb49881f945887f74d7a5fe3f7104fad5adbdf3da2cf5d17bf94e06c035f9d3a122ffd2dbcbc01c784155b6da817e26d4fbe501c0bcb357619db7d606bf4c8a9892c3a99ee534b3887126e4de2a03ee078894a6ac901dfedb1ac94417f41292de97d3e55e0df87719b44864f2aa9982469108e287fd757ec5987b15391a3d2fe4f67efd849b98685595375f862b6d9ba2972b197bc26f098", @ANYRESDEC], 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000006e80)={0x7, 0x47, 0x1}, 0x7) 14:16:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x4, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x1801}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) [ 965.802140] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c) listen(r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000000b010800000000000000000000000087a2eeb2da3f17d1ba62392ca57d73c8f9ae9452ccf020daebb134e47f7d2f2ff3e48ab773076b65f0b08f67954986a555c41ada23929c98cb95faef7d0f7749fa885fb91fed918cf8bf84b36b95e7855482d0adee77fb8b"], 0x14}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd604006004238a1babb7573310000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) 14:16:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x802, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x4c}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x1f00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 966.157345] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:27 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x10000000}], 0xc6, 0x0) 14:16:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000000)=0x1, &(0x7f00000000c0)=0x2) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 14:16:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x803, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x2000}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x60}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 966.381410] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x805, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x68}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0x2}, 0x23) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x806, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x2209}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x6c}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:28 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x11000000}], 0xc6, 0x0) 14:16:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x74}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x808, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000e1c61bb35b7f139c4c7a8d3b3d3a75b19a8974b1d2ffeaf872ef809b028b59a3222f6882657093c6550186b56d4f5a13dd8b2ed72fa8aa5a85ad77aa9750c4544a541c45177504b346091f68409fd48b6bfb62b4e1702b18507ae2c698b14a0b205ebd3f036afdf712a14b99f6e379efde62d8b34e9c18d595d7c567b1d51f5e1dcfa1dbdc5c9919e0b260a7a149dc6f93132791c43edaad88b9718480018b8404cc"], 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000100)={0x9, 0xffffffc1, 0xa74, 0x401}, 0x10) 14:16:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x5865}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0x7a}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x809, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000580)={0x44, r4, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_REG_RULES={0x1c, 0x22, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x8000}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x4}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xf8}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x4404) r5 = socket(0x11, 0x3, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xa4, r4, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_MESH_CONFIG={0x34, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x3}, @NL80211_MESHCONF_POWER_MODE={0x8, 0x1a, 0x2}, @NL80211_MESHCONF_PATH_REFRESH_TIME={0x8}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x7f}, @NL80211_MESHCONF_CONFIRM_TIMEOUT={0x6, 0x2, 0x17}, @NL80211_MESHCONF_AUTO_OPEN_PLINKS={0x5, 0x7, 0x80}]}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_TTL={0x5, 0x6, 0x8}]}, @NL80211_ATTR_MESH_CONFIG={0x2c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_PLINK_TIMEOUT={0x8, 0x1c, 0x80}, @NL80211_MESHCONF_HT_OPMODE={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_RSSI_THRESHOLD={0x8, 0x14, 0xffffffffffffffba}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5, 0x11, 0x1}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40010}, 0x4) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:29 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x6000}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={[], 0xff}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x80a, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:29 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x20000000}], 0xc6, 0x0) 14:16:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x80b, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:29 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x6558}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) 14:16:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x810, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x2, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:30 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x8100}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x3, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:30 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x21000000}], 0xc6, 0x0) 14:16:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x2, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x4, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:30 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xf000}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x3, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x5, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x4, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000016c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000019c0)={&(0x7f0000001700)={0x284, r3, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_FEATURES_WANTED={0x264, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xc0, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\'\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '#-#\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x81}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ')&-+\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffc}, @ETHTOOL_A_BITSET_BIT_NAME={0x19, 0x2, 'cpuacct.usage_percpu\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x7d, 0x4, "40cda962e002d0f00cb8dd4ad71bb5542c47a17d827cd306743a16ee7d7a04a32aeee1b11965ffde4cf4a47c5bfbf72008910ed6b478011edc42f40955b28afde3eda406ed2a78a4ec0b2454f0273436c016c5a46851c643e73259743548399a9b46235f637cb0b680ac9fb781566c47fa7049b9b349b7dc05"}, @ETHTOOL_A_BITSET_VALUE={0x6b, 0x4, "4f5c034b62944f645ab3c6bf24331951ac30f5ba09b63864b43136abe55b1102a0792b7059cc02ca59d6ef397cca2ecc20f2776c3ac8cc2ed774e8156f7e91514b8a96a1fb42de8e9175a3599b8293937eef134adc3380ca8d812fb3faf3731bd7dbebc4054823"}, @ETHTOOL_A_BITSET_BITS={0x84, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '#/@\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x19, 0x2, 'cpuacct.usage_percpu\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x19, 0x2, 'cpuacct.usage_percpu\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x16}, @ETHTOOL_A_BITSET_BIT_NAME={0x19, 0x2, 'cpuacct.usage_percpu\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8171}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}]}]}, 0x284}, 0x1, 0x0, 0x0, 0x440c4}, 0x4044800) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'veth0_to_hsr\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x90, r3, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x4008}, 0x8001) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000000), &(0x7f00000000c0)=0x8) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x3d1200, 0x0) 14:16:30 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x6, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x8, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:30 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x2b000000}], 0xc6, 0x0) 14:16:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xa, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 969.708476] net_ratelimit: 13 callbacks suppressed [ 969.708488] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 969.758940] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x7, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 969.847315] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x9, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:31 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaa1aaaaaaaaaaaaaa0086dd6040060000140600fe800000000000000000000000f8ffbafe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) [ 969.923022] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xe, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 970.081891] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x9) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0) 14:16:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xf, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:31 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0xa, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:31 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x2c000000}], 0xc6, 0x0) 14:16:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300), &(0x7f0000000340)=0x4) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000000b0108000000000000000000000004"], 0x14}}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r3 = accept(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0xc87d, 0xfffa, 0x8000, 0x8, 0x5, 0x0, 0x3, 0x6, 0x0}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000200)={r4, 0x1}, &(0x7f00000002c0)=0x8) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f0000000000)={0x7, 'veth0_to_batadv\x00', {}, 0x81e0}) 14:16:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x60, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 970.617904] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x3}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0xf, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 970.748680] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xf0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 970.811223] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) [ 970.851697] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe800000edffffffffffffff000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) 14:16:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x4}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x300, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x2, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xa00, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:32 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x33000000}], 0xc6, 0x0) 14:16:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x3, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x5}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xc34, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB='P\x00\x00\x00\x00x\x00\x00'], 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsgid(r4) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000000b01080000000000000012f4ffff00"], 0x14}}, 0x0) r7 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/mISDNtimer\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000180)={0x19c, 0x1a, 0x1, 0x70bd29, 0x25dfdbfb, "", [@nested={0x180, 0x51, 0x0, 0x1, [@typed={0x99, 0x3e, 0x0, 0x0, @binary="3b16f3a8434dc3e65c2cceeb35c6990b6b42a47b1918f1808a7dc10a6a1e18f160f9d102774fb19369f1f75673ec8de72de8cf3e6bf0bc2b159a6e78efa67c913afd074b92480e35a064f1fa10f3491dc51378be260735c6a4edf93a8626147cef8ada49f3d855d0c299ef06641cf90861b0b131f0cee7e2b338833206ca096f9c8773dca07cecd6e2df137fb6bbdb658a74e556ff"}, @typed={0x8, 0x4f, 0x0, 0x0, @uid=0xffffffffffffffff}, @typed={0xd, 0x2d, 0x0, 0x0, @binary="335e5b5e04ad70efb9"}, @generic="3424b83d4469d0056679160a69f6abde69306f193326d86237222a909d1ddcc1652519e9b638b9cf27c3e0f3d38a94b970e622117f06aad1a873cbbea8f882264b22603d96d871a46c6135fc2765e3d5e592f663140bd7950331b5105a1bb98384122083f2429c9b", @generic="273f666db7da2f8ad5d2b80c9a7a96e98c53802b4fba0faf34a9394e150d0eaf950c4248c8ad801c264beea8c3e1600c53e559b035d72b38cd1be7c073e9afa4665cec471feb7c1bd07489d3c1852250baff344ec96a305c6b8c2f83143f056f"]}, @typed={0xc, 0x33, 0x0, 0x0, @u64=0x100000000}]}, 0x19c}, {&(0x7f0000000340)={0x2d8, 0x17, 0x400, 0x70bd2b, 0x2, "", [@generic="bd10821eafb5b7767a9f559a197159df57fd95489fba2508e68b4b04a016311f628a7e312e645ca08226c3f5daff63bc97934b05644bc72503073e9e9adcf669383d208e21806f99c3a9d4093987b6b0d71db2bf26eaa13722501e1adcdef78b2ac84b730a93d072bc24", @typed={0x8, 0x19, 0x0, 0x0, @fd=r1}, @nested={0x226, 0x8f, 0x0, 0x1, [@typed={0x14, 0x67, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00'}, @generic="ffeb8c15706778521ad9dd897a6b77968ad5ca4ec9acc34addf22a9101a005602deebe6e9c1084c16be046ae13097ea3ce72bab9275c7205fba773babb97aae817b9399c684cd5088afbcaf3eca85b635d287b04c709bafbbf18d53438445a7d205aa0c8b036fffd25a4eb1902d72af1072e0d4163f8ad1a7e9b04fb732cac09918c553463508135ae982714babd88092ef6b98136b4d999c7b021fd5f4f784415760d25a6123ef2000f83", @generic="4d1b9aa854fa835f66434c0bcbaf80d77978b68ab5935201ee3dd93fee2fc6e187a96a0554d2a73b8444f33f1519b5ba656850ccf8f58ca6daa0ca71a23ced1089fbb3c000566586d3bd1214ccff8be823312fa19ca7c22dc38322801fbc6b18cc508fd5d11e0bd47c8429afdc0f3e", @typed={0x14, 0x8f, 0x0, 0x0, @ipv6=@remote}, @generic="6bcde5c9eef972e33cce065bdd989f5dfece1d2dc9695b06ab5410b5826a51a3ec30df67bab88e98c3b14edd2bff408eb51493ffa73d9525a1bc320184d99ea047c43f451de381aa89d0e7290e6abdd65e40d0993e9dce85dc9e92db0a6b5e3c1bb1e6e66c6807ea83efae3bb3aa0aa1f25f2b89fc97457ab6e8d5d3e868529688f104d273620a49db7afd18519873c649380d236af56659cf407d7589bf02f5292e6e003033a79b07ae321e452d5c2a2663900d3a5ef340245a245e77a434ec94cdac6c7a1b4f9cb5a02e2d39d03915ee467be5045ea3256e9a087d043dab77"]}, @typed={0x7, 0x2e, 0x0, 0x0, @str='@,\x00'}, @nested={0x24, 0x12, 0x0, 0x1, [@generic="801601d75d408060865af76247e7fc3e283e42afda26605ac68558d14cd84f53"]}]}, 0x2d8}, {&(0x7f0000000640)={0xdc, 0x36, 0x200, 0x70bd26, 0x25dfdbfd, "", [@typed={0xc, 0x57, 0x0, 0x0, @u64=0x6}, @generic="42166a17953c18e860a4d1fa8ac09a0fd48084124d97a1154653d5ea824eb83e10757fbaa1275c066eff1adb305105514039cebe090b2cc3cfb6e292cd82aa61076f7f66161b28c264cd78454e8662a281d86b4578e8b56c0c87b683a26480b5dc499fd646d902", @generic="1d1d1243ee388c07d57b21bdc71c78010bdbd1138d59429dc523fe5fa91d55b0969b766963c4e7727966b7fddbb7242ecf68328d613ed3103cf908f7d861c743f88f03b42ef26ee298793af0c13df24e9d1f160cbcdc7728b1"]}, 0xdc}, {&(0x7f0000000840)=ANY=[@ANYBLOB="240900001700000227bd7000fddbdf25a8017a8014001d00ff01000000000000000000000000000114000400fe8000000000000000000000000000aa054acbb3ff31a75411a4111dc5f52ddb75e72fc2ffc4f31ba1bb289039d4b8e8450277333ca53bdc5002c108006800", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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"], 0x924}, {&(0x7f00000000c0)={0x18, 0x27, 0x100, 0x70bd28, 0x25dfdbfb, "", [@typed={0x7, 0x38, 0x0, 0x0, @str=')-\x00'}]}, 0x18}, {&(0x7f0000001180)={0x1d8, 0x23, 0x10, 0x70bd2c, 0x25dfdbff, "", [@typed={0x14, 0x20, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, [], 0x1}}, @typed={0x6, 0x8d, 0x0, 0x0, @str='^.'}, @nested={0x199, 0x40, 0x0, 0x1, [@generic="f0be63510d7b4db063826d84615608c8d74d6a482e47eaaec768da111ae794ab798adef36cbada3559986cdb8c62f6a2963be3f49a4a18778efc47dc3b91cf439acf645399c2522266804ea2a5a8f822af27", @typed={0x8, 0x37, 0x0, 0x0, @pid}, @generic="b2167576427c5b8c33d047e95a8f47e14e39fc1087d9e14a30e17c11070ace8ddd344c0eefac879f5da80e84c55f5cf64c6d4046c0f943c05a151b0e48e3395a6ae7b117d6d6ffcad86ab77aa4e9e25825c0b51d0e65059638391a39d910a792bd96e3c56add8ed6d3d19876283ca2b32d72fff47a7148eda60ca884af23b9e3c81ce257ff8c62d2f7f54f8b87c6d527b77ce230de2dbb985ba5a67f3686be4b88515efd9f7732c31bd9f656d0a97c8f6e440de4ce0b0b8d4c8a48dbd91ffcac2d3feafbeb3c9efad8aa342a", @generic="f5df0999f74b3cf9ff59d15c041115258513a8d17a53d252a04cd7a556caa8cbe22c9c6eaa1eef66d98e8758154dd4ff6b540c78da8fba78dcaee85f8cb1", @typed={0x8, 0x2c, 0x0, 0x0, @fd}, @typed={0x8, 0x3d, 0x0, 0x0, @fd=r1}, @generic="523256a012895aca8580866a5d31fe0a82fa4a242b3a66c443687d2ed92c994200"]}, @generic="f5f003c91ac11d94ca1ce03b1f23ca"]}, 0x1d8}, {&(0x7f0000001380)={0x254, 0x27, 0x2, 0x70bd28, 0x25dfdbfc, "", [@typed={0x8, 0x42, 0x0, 0x0, @uid}, @generic="415c07c7de0bc31e50cdd324d65030eadc178785b893f95035f05384da1c6b42ec3c461aea25ac72b17dc81b6860403ea2ac338712b8a9d6408d4e9ea17cc13f905c09f807a0e0d58516acee67a93fc55b3235bd57e1102ea7c24e1abea6ae168acff9f05264339450a675f9abf7a871e100fa18fc7fe06d2425b75b40c31f2c7a591475023675e90f786e6db3f83240263cda7a8a447facf1d3746a2c3cc65948a5dbe1b10b99da38ffb8d0d856f8e0207407", @generic="eaf1e7462cb022498f9b07690df42d5ae5e8bcadc268dd448e304c2bf81c736f7cd0400cd6c3b5c4838a4906993d34b87aea3752c9d6d4c0867714d046cac8e2ec45c3c4456aecbfe7ba6b2b422f00d778e830a5ea536ebcb0cd936384c520aec04af0fa6092570077f99f2168b3b911b5f09440f869d90bdf0b824be2e4296888319c36d27dcaafe4c1f022b6d5ae1837789a55e5d9f038827fe1ceda6986fd0a4a7048e3bfe031d19c", @nested={0xcd, 0x6c, 0x0, 0x1, [@generic="df116de4a18d6ec6838ad4e0b4a81dca7302edfa19b7eef0d5bf0dabff0d40795128740ea3f2462dded008044efce1c8868d098b5d70a70b47f8ce75cbacadb13b5b605401bff3af35d58db2a72baadd24d5c30fa0bfe01a10f6fe3e3370d319210cf3757e38f6c5e72551bd1eb8680da25452fa64cb4c4b2ac34406d5b40c9c3e9e853b0420b96732f1bf837ce18e7156348c", @generic="8a630bd4fff2ebc2fea162a688ff6490067e5619ccf70d2fcbf89f1c336e1cb735dc7aecf6ecc97c3f29206079f7c850114aae826fc9"]}, @typed={0xc, 0xa, 0x0, 0x0, @u64=0x2}]}, 0x254}, {&(0x7f0000001c40)=ANY=[@ANYBLOB="80020000110001002bbd7000fedbdf25b801518008003f0000000000c6eb76028e68e3ec8d5cdf1aceeab49e00fb3e347eb0de8a64a8d02f2fcdcfe690a665622808fd1d8efac76fe10a77dfd0b9e401990921024ea1a3881c7e35f0a1baf8168fd66b6258282f59e42b1fefd74c6bc81d9a3bcc9727d5c19b869320a0a6c7d56f43f1f7a82976c97b64df83a9fb9b193d8b9abb7c9a5f49ac2d6dce703d6747b6bef0d931eeafc3ab362307cd9dfbacb0feb4b3bbf134d6e405003a000000000008004a00", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="cd06e278780eede508042841ab4e1f7234ac0ed39684b7d24916"], 0x280}], 0x8, &(0x7f0000001b40)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r2, r4}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x1c, 0x1, 0x1, [r1, r0, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r5, r6, r1]}}, @rights={{0x18, 0x1, 0x1, [r0, r7]}}], 0xb0, 0x41}, 0x1) r8 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) 14:16:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xe00, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x4, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xda, &(0x7f0000000180)={@random="7b9d627f3a3a", @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0xa4, 0x6, 0x0, @remote, @local, {[@srh={0x2, 0xe, 0x4, 0x7, 0x95, 0x68, 0xfff8, [@empty, @loopback, @loopback, @mcast2, @mcast1, @local, @mcast2]}, @fragment={0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x67}, @dstopts={0x6}, @fragment={0x0, 0x0, 0x62, 0x0, 0x0, 0xb, 0x65}], {{0x1000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x6}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x5, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:33 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x3a000000}], 0xc6, 0x0) 14:16:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xf00, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000005c0)={0x6, 0x0, [{0x4, 0x8a, &(0x7f0000000180)=""/138}, {0x0, 0xf5, &(0x7f0000000240)=""/245}, {0xd000, 0x19, &(0x7f0000000000)=""/25}, {0x4, 0xc0, &(0x7f0000000340)=""/192}, {0x10000, 0xd9, &(0x7f0000000400)=""/217}, {0x3000, 0x8c, &(0x7f0000000500)=""/140}]}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000006c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe800000000000000000000000da0d7913b139907f4d635ca548760000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500200fc90780000"], 0x0) 14:16:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x7, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x8}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x340c, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x8, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x155200, 0x0) r2 = socket$nl_rdma(0x10, 0x3, 0x14) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_RESETEP(r3, 0x80045503, &(0x7f0000000200)={0x3, 0x1}) r4 = socket$nl_rdma(0x10, 0x3, 0x14) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x3) ioctl$PPPIOCSMAXCID(r5, 0x40047451, &(0x7f00000001c0)=0x10001) sendmsg$inet6(r1, &(0x7f00000005c0)={&(0x7f0000000240)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x23}, 0x1}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000280)="e9028b679f67d37e0ca15b0e5f52f6fdda04355d9097bbf6ecce1af1c4a71960c292bad133107a45e457cdc5368df481c23c033ac8a2492b3445863bd0324e6eff59e8e542bc475db7505936386baa01359b33f667303fd11dce36b49f229558bd21c2df5520becc6ac66239531e8cf88db3e6dfaf850b0c0b2243103d821c3cc42cc10d96d04159b578284a5ee906d6ab5a1f60a3df1a4bc8c5c60f721f26f0e499c9e1c3f85e7d85e1c8b22157d096f2b59eda446ad7f57eb3993dc0e2d30ffeb4544a40f64b30efcb2de553d2cfc5dea1500c0efa60a7080b545656bb7dd1e056ea97757446d38c06fb49fc096f68e9acd42e92648ec041", 0xf9}, {&(0x7f0000000380)="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", 0x106}], 0x2, &(0x7f00000004c0)=[@rthdr={{0xb8, 0x29, 0x39, {0x2c, 0x14, 0x0, 0x20, 0x0, [@mcast2, @local, @mcast1, @private1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @loopback, @private0, @dev={0xfe, 0x80, [], 0xb}, @local]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7}}], 0xd0}, 0x44844) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344, 0x41424344}, 0x7f, 0x2) syz_emit_ethernet(0x4a, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaaaaaad93ac108aaaaf2fc5e9c3e2e3b0cbf79f31fce8822000000000000000000000000000000bbfe8000000000000000000000000000aa00004e22078a", @ANYRES32=0x41424344, @ANYRES32=r6, @ANYBLOB="5002000090780000"], 0x0) 14:16:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x6000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:33 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x3b000000}], 0xc6, 0x0) 14:16:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x9, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x501200, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) bind$phonet(r4, &(0x7f0000000000)={0x23, 0x5, 0x40, 0x6}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getdents(r2, &(0x7f0000000180)=""/155, 0x9b) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000fd3fed54d6b5849d", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) 14:16:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xf000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xa}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xf0ffff, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0xa, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xb}, 0x1c) r1 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000000)={0xff, 0x4, 0x1a, 0x1}, 0x10) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002907802000000"], 0x0) 14:16:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xb, 0x801}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, 0x7, 0x1, 0x5, 0x0, 0x0, {0xa, 0x0, 0x5}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008001}, 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80141, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x2, {{0xa, 0x4e24, 0x10000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xffffffff}}, 0x1, 0x4, [{{0xa, 0x4e24, 0x100, @loopback, 0x7}}, {{0xa, 0x6, 0x7fff, @dev={0xfe, 0x80, [], 0xf}, 0x6}}, {{0xa, 0x4e23, 0x9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8000}}, {{0xa, 0x4e22, 0x1000, @rand_addr=' \x01\x00', 0x46f2}}]}, 0x290) r3 = socket$can_bcm(0x1d, 0x2, 0x2) accept4(r3, 0x0, &(0x7f0000000000), 0x80800) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 972.622000] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:34 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x3c000000}], 0xc6, 0x0) 14:16:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0xb, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x1000000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x440100, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xc}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x2000000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "020600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xe}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "090600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x3000000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x4000000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "600600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:34 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x3f000000}], 0xc6, 0x0) 14:16:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={r2, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={r2, 0x8, 0xd4, 0xffff4ae8, 0x800, 0x3}, &(0x7f0000000400)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={r2, 0x80, 0x10}, 0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x0, 0x70bd25, 0x0, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}]}, 0x1c}}, 0x4) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r5, 0x8, 0x0, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r5, 0x8, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x43}}]}, 0x24}, 0x1, 0x0, 0x0, 0xc011}, 0x8081) listen(r3, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) 14:16:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "630600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x101200, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_rdma(0x10, 0x3, 0x14) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000000b01f400"/20], 0x14}}, 0x0) r8 = socket$nl_rdma(0x10, 0x3, 0x14) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) io_submit(0x0, 0x8, &(0x7f0000000840)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f0000000180)="baa1fbb2eba2deac37a3a29f920eaea8104f1057c8565f3ad84e286302b3ae3e9bc591cde48191bcb2be3f2196d21b009701b9829494363a6374930403f35edc47384ae7869b916e380d906f3f7ab39cb89b933b829481c16e8395797f5020450c78d491", 0x64, 0x0, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x6, 0x800, r0, &(0x7f0000000200)="912fbe4d0efc95eba334f1448b27f8b69b2497cf7bd94faf4f6dfda586318050f60af09e63fba3da5d20745cbb7c40bc9985c4f1e19ebc11cdb32dbfff4e8a1a08052934e9ccdaa5adce281dc8ceeb85b8e96d50a8f5f3f2de5f25e7913032b2c55f9ef229f06605351c418f23dcdc3392760419bf11a237c07e5154bb09", 0x7e, 0x8}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)="7f83233c8076d2ad98afa756424b6efefec9a5b07bf66a2eaa29fe5734f0f3ad83a2df72296d687a5cd911e6126c0137775c770a00aed95d29d8bd29f8019352bfa5d926fae3fe3a43b199eacb818d30fd81d359", 0x54, 0x2, 0x0, 0x2}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x5, 0x8, 0xffffffffffffffff, &(0x7f0000000380)="9c2f998c74670490a31c2ed27da1bcd51d2b475efc4ca11a1898a222eb8a6b6e6b152ec28054034f4a6964c1d0cc2de01353297176ba10e9acf7b68187d674500500d77db5729d3d82eefd444b", 0x4d, 0x7fff, 0x0, 0x72a6e03502cd770e, r1}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x3, 0x4, r2, &(0x7f0000000480)="dfa155e2aef101f35d41ceb0f186b2861d4dc12753fd3c8ba91ac9f5ae4afbc744071c94cdfc3521ca03e77c884c39440576824f33f8864514fa8bcfda6de503a9980c97d2639e404fc9ae32c546fa25ceaf6cb34f569b997a36073549eba79b0d72448b0aba3c9a35006dd55276b8fd4b9fa1c38bba7b5c033d89fc68ca3399998351d5a5185981c3c29057c90b17333dbf0c4ab49b21e9f93439ec6dd9218fac032b03b11b6f01552ad7", 0xab, 0x5, 0x0, 0x1, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x6, 0x5de, r0, &(0x7f0000000580)="86d7459f4353e66b9b83c1f06152f7b028fc7f623a4ae18fc49864f3153af7203978808041adaa7e76cd8694e5eafea5a03ddc2543cc472d9e154cd23ed7262b809626f14f802534142e0e2f1657cdfa4053d0a031fad8b76b80159c765af7c8053d0e0ec21e033d900a1d467838e1bdaea2091ac9fc6f14229cd0c30b0bd72ca99a7df0496d260c4c0cfc5af68c7f1b701ddba0837bf54ad0a0c9ae0eb183c076dfded392", 0xa5, 0x9, 0x0, 0x1, r6}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x7, 0x1a, r7, &(0x7f0000000680)="49e307c4629cf55243de1a48547ce5ebf712b0984ec8a3621ef1ef956b4de9a34a8fa6825aa241f309be129ce5d839e679a0cf23def301", 0x37, 0x2e, 0x0, 0x2, r9}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x6, 0x2, r0, &(0x7f0000000700)="6a0091c84d67cc4d3f69f27d977d69606a119734062ea42944bdca3d426a37e1b91ad61677daaba50c45b1a9e2d328aa2933e56449ea7df1be77f0f85d390e3732ada3c5c88e360430dd688580ae6eac0248285d97a7a98f4514d280d83dbf56fd3ac9e1f57d2e9c35ddb7a24ca07253dc5d688b4f7691d71f999a2493a042cd7566ce1fc0abe589367a5d5923851daba5eef463426196b32db64dcf5f77292e35b1850affb79e8f4de3ddb364766ae6eaa741678cbb86a9c614d51f7f56a72fecb5b21ec316b0e860432d", 0xcb, 0x7e, 0x0, 0x3}]) syz_emit_ethernet(0x8a, &(0x7f0000000880)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x2, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "17b2bb1b52676034716889cef28c9069"}, @generic={0x4, 0x4, "3dd3"}, @nop, @mss={0x2, 0x4, 0x5}, @exp_fastopen={0xfe, 0x14, 0xf989, "7e4e3b20201824d0b646867265c5ea84"}, @window={0x3, 0x3, 0x7f}, @sack_perm={0x4, 0x2}, @sack={0x5, 0xa, [0x1, 0x2]}, @nop]}}}}}}}}, 0x0) 14:16:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x8000000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x10}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "740600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80800) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000200)={0x3, 0xfffffffd}) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000000)={0x0, 0x7, 0x5460}, 0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000), 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x100e, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r4 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000340)={{&(0x7f0000000240)=""/191, 0xbf}, &(0x7f0000000300), 0x2}, 0x20) 14:16:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xa000000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x60}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:35 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x40000000}], 0xc6, 0x0) 14:16:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xe000000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000000000dc72fa2cfc7952913be570eac69e4d8b72a46a3582e55ae7892253c2656263e1f748aadfee8f00000000000000006069aa61d5fe27ad94274b"], 0x14}}, 0x0) r2 = socket$nl_rdma(0x10, 0x3, 0x14) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000000)={0x5, 0x21, 0x14, 0x17, 0x9, 0x7, 0x3, 0x156}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x401, 0x6, 0x3ff, 0x800, 0x401}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) 14:16:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xf0}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xf000000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400300", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x4, 0x8, 0x101, 0x0, 0x0, {0x2, 0x0, 0x8}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x17}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000410}, 0x24008014) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x118}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x340c0000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 974.828292] net_ratelimit: 13 callbacks suppressed [ 974.828304] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:36 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x60000000}], 0xc6, 0x0) 14:16:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000005bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) r3 = dup(0xffffffffffffffff) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r3, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="54010000", @ANYRES16=r4, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x70, r4, 0x1, 0x70bd26, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x1}}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000010}, 0x24044800) 14:16:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x300}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x60000000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400500", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 975.224082] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x9effffff, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) waitid(0x1, 0x0, 0x0, 0x8, &(0x7f0000000300)) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f00000001c0)=0x6) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'ipvlan0\x00'}) 14:16:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@\a\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xf0ffffff, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x500}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 975.540039] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xf5ffffff, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 975.598699] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:37 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x68000000}], 0xc6, 0x0) 14:16:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) accept4$unix(r2, &(0x7f0000000180), &(0x7f00000000c0)=0x6e, 0x800) open(&(0x7f0000000200)='./file0\x00', 0x400000, 0x100) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(0xffffffffffffffff, 0x800455d1, &(0x7f0000000000)) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@\b\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x600}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xfcffffff, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xfffff000, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 976.041531] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 976.055433] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @rand_addr=' \x01\x00', @mcast2, {[], {{0x0, 0x4e1e, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x200}}}}}}}, 0x0) 14:16:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@\t\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xffffff7f, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x900}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:37 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x7ffffff7}], 0xc6, 0x0) [ 976.462759] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@\n\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xffffff9e, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0x3f97}) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000180)=""/4096) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x922}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 976.686732] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xfffffff0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 976.784031] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@\v\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 977.021237] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xfffffff5, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xa00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@)\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:38 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x80040200}], 0xc6, 0x0) 14:16:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@+\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xfffffffc, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xb00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0xffffffff, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xc00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@,\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0x40000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xe00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@/\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020002, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:39 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x84ffffff}], 0xc6, 0x0) 14:16:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@3\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020003, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@:\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xf00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020004, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@;\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x1801}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020008, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@<\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x1f00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:40 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x87ffffff}], 0xc6, 0x0) 14:16:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa002000a, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@t\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x2000}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa002000e, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4089ff", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x2209}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa002000f, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400602", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020060, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:41 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x5865}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 980.069010] net_ratelimit: 9 callbacks suppressed [ 980.069022] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:41 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x88ffffff}], 0xc6, 0x0) 14:16:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa00200f0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400603", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:41 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x6000}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020300, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 980.450846] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400604", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020a00, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:42 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x6558}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 980.802848] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020c34, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400605", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:42 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0x8100}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 981.073306] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400606", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:42 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x8dffffff}], 0xc6, 0x0) 14:16:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020e00, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 981.234851] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020f00, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:42 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xf000}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400607", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 981.500894] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa002340c, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400609", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 981.753113] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:43 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0026000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:43 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xac050000}], 0xc6, 0x0) 14:16:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "40060a", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400611", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 982.004759] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:43 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x3, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa002f000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 982.195534] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 982.244796] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "40063c", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 982.357349] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:43 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x35, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 982.461459] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x2}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, 0x0, 0x0) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400648", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x3}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:44 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xc5000000}], 0xc6, 0x0) 14:16:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x124, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x4}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "40064c", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400660", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x8}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0xe74, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0xa}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400668", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 983.449576] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, 0x0, 0x0) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0xe7c, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0xe}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:45 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xe8030000}], 0xc6, 0x0) 14:16:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "40066c", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0xe9c, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 984.143609] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400674", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x60}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 984.267491] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x44000, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x105000, 0x0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r2, 0x820, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x10014) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6040060000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500200af000d104695193ddc4607a50090780000"], 0x0) 14:16:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, 0x0, 0x0) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x2, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "40067a", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x610000, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local, 0x1}, 0x1c) r2 = socket$nl_rdma(0x10, 0x3, 0x14) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x488080, 0x0) write$snapshot(r4, &(0x7f0000000200)="3fdbf82b90f41d1a625b6abdd1ea06ea863f6395e1e95112feed85f61cd3449a3488541976fee3abfdad99b2d99737672986957389c80bdd164df51c65d715d6fa81d9859122eb57d095e8142b0dde9eee85d839e63d6457ba7cce90c0912891e94c599a17b21bf682db395467635a358036a2a673970fba043bad0081e035199ed42efb88872ce9acaa57dd3c76ced5703f82b04a62822a03759252f0ed9f863d7cc84bbb462f828f3a77dd54d2fabcdaf158e68768dc1d99e065a4f7c4c0b229464ef6ad1653a0e3a4365a0f28766314e720", 0xd3) ioctl$VIDIOC_G_OUTPUT(r3, 0x8004562e, &(0x7f0000000140)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) listen(r0, 0x0) syz_emit_ethernet(0x11e, &(0x7f0000000340)=ANY=[@ANYBLOB="aa09aaaaaaaaaaaaaaaaaa008137ffff01100304fffffffff0ffffff00000003000000003ea8ae494cecfffe04aa389a33e209e55c348aef2c8e2770d8a1764f1cdd32a50ef7448468fb3bcfa523e27d2109016b3e5bd92b2c8071249f7da621799b0b5361e7494c8ff0a65431a627856def0f33a5f6adaaf05702b50e86d7138701651f92c49cc006de2c333545b27d5a086a60ff43380e6d2ea3371556d8a87e5d3bc251af048f2d636e834519c2afc1c24ff950360cec807dca08189fd36bf2ee9d7ccac3846a78a3380d82dd35eb9d4e80efc97db4abc4ded72c68e3bed60007bb49eb8e76d4422474fe5411c58254a7cac4957c0fc3d8b06d6aab246c9e8814f1d63947a589409de86a53d63dd006d24cf2866aaa14f1e949fda2cf"], 0x0) 14:16:46 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xeffdffff}], 0xc6, 0x0) 14:16:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x2}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:46 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x3, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, 0x0, 0x0) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x3}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:46 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x8, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 985.336771] net_ratelimit: 8 callbacks suppressed [ 985.336790] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x4}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 985.470441] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 985.586678] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:47 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xf4010000}], 0xc6, 0x0) 14:16:47 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0xe, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x8}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 985.845284] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:47 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x35, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, 0x0, 0x0) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0xa}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 986.276702] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:47 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x3, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0xe}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 986.396448] netlink: 284 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 986.532502] netlink: 284 bytes leftover after parsing attributes in process `syz-executor.0'. [ 986.665888] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:48 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xf5ffffff}], 0xc6, 0x0) 14:16:48 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x124, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x60}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 987.057094] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 987.077425] netlink: 284 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:48 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x88ffffff}], 0xc6, 0x0) [ 987.210220] netlink: 284 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0x2}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:48 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x3, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 987.415412] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0x3}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:48 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xf7ffff7f}], 0xc6, 0x0) 14:16:48 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0xe, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) [ 987.646805] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0x4}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 987.716574] netlink: 'syz-executor.0': attribute type 14 has an invalid length. 14:16:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 987.801697] netlink: 'syz-executor.0': attribute type 14 has an invalid length. 14:16:49 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x35, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:49 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xe00}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0x8}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 987.915802] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0xa}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:49 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x3a000000}], 0xc6, 0x0) 14:16:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:49 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x3}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:49 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xfc000000}], 0xc6, 0x0) 14:16:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0xe}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 988.210932] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 988.228605] netlink: 280 bytes leftover after parsing attributes in process `syz-executor.0'. [ 988.305853] netlink: 280 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:49 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x24}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0xf}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 988.510409] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0x60}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 988.629093] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:50 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x118}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0xf0}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:50 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xfe800000}], 0xc6, 0x0) 14:16:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000580)={0x44, r4, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_REG_RULES={0x1c, 0x22, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x8000}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x4}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xf8}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x4404) r5 = socket(0x11, 0x3, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xa4, r4, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_MESH_CONFIG={0x34, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x3}, @NL80211_MESHCONF_POWER_MODE={0x8, 0x1a, 0x2}, @NL80211_MESHCONF_PATH_REFRESH_TIME={0x8}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x7f}, @NL80211_MESHCONF_CONFIRM_TIMEOUT={0x6, 0x2, 0x17}, @NL80211_MESHCONF_AUTO_OPEN_PLINKS={0x5, 0x7, 0x80}]}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_TTL={0x5, 0x6, 0x8}]}, @NL80211_ATTR_MESH_CONFIG={0x2c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_PLINK_TIMEOUT={0x8, 0x1c, 0x80}, @NL80211_MESHCONF_HT_OPMODE={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_RSSI_THRESHOLD={0x8, 0x14, 0xffffffffffffffba}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5, 0x11, 0x1}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40010}, 0x4) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0x300}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:50 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0xdfc}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0xa00}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 989.291188] netlink: 280 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 989.546016] netlink: 280 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0xc34}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:51 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0xe54}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:51 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xfec00000}], 0xc6, 0x0) 14:16:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae00"/24, 0x18) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="ffacae24", 0x4}, {&(0x7f0000000180)="b5bdea6c29880966d1ed058cef5250ac0c310ad85868280a630cdde0", 0x1c}], 0x2}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002e80)=""/167, 0xa7}], 0x1}, 0x0) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f0000000000)=0xffffffc0, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 989.954490] netlink: 280 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0xe00}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:51 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x6000000}], 0xc6, 0x0) 14:16:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 990.082498] netlink: 280 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0xf00}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:51 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0xe68}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 990.370025] netlink: 280 bytes leftover after parsing attributes in process `syz-executor.0'. [ 990.447486] net_ratelimit: 9 callbacks suppressed [ 990.447497] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 990.586208] netlink: 280 bytes leftover after parsing attributes in process `syz-executor.0'. 14:16:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0x340c}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:51 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:52 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xfeffffff}], 0xc6, 0x0) 14:16:52 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0xe90}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 990.709036] FAULT_INJECTION: forcing a failure. [ 990.709036] name failslab, interval 1, probability 0, space 0, times 0 [ 990.756649] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 990.778930] CPU: 1 PID: 14092 Comm: syz-executor.2 Not tainted 4.19.134-syzkaller #0 [ 990.786985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 990.796366] Call Trace: [ 990.798975] dump_stack+0x1fc/0x2fe [ 990.802628] should_fail.cold+0xa/0x14 [ 990.806545] ? setup_fault_attr+0x200/0x200 [ 990.810891] ? lock_acquire+0x170/0x3c0 [ 990.814898] __should_failslab+0x115/0x180 [ 990.819150] should_failslab+0x5/0xf [ 990.822878] kmem_cache_alloc_node+0x245/0x3b0 [ 990.827481] __alloc_skb+0x71/0x560 [ 990.831134] netlink_sendmsg+0x9ee/0xc40 [ 990.835220] ? nlmsg_notify+0x1a0/0x1a0 [ 990.839210] ? kernel_recvmsg+0x220/0x220 [ 990.843990] ? nlmsg_notify+0x1a0/0x1a0 [ 990.847982] sock_sendmsg+0xc3/0x120 [ 990.851717] ___sys_sendmsg+0x7bb/0x8e0 [ 990.855707] ? check_preemption_disabled+0x41/0x280 [ 990.860852] ? copy_msghdr_from_user+0x440/0x440 [ 990.865627] ? __fget+0x32f/0x510 [ 990.869101] ? lock_downgrade+0x720/0x720 [ 990.873265] ? check_preemption_disabled+0x41/0x280 [ 990.878297] ? check_preemption_disabled+0x41/0x280 [ 990.883337] ? __fget+0x356/0x510 [ 990.886814] ? do_dup2+0x450/0x450 [ 990.890367] ? lock_downgrade+0x720/0x720 [ 990.894533] ? vfs_write+0x3d7/0x540 [ 990.898271] ? __fdget+0x1d0/0x230 [ 990.901835] __x64_sys_sendmsg+0x132/0x220 [ 990.906084] ? __sys_sendmsg+0x1b0/0x1b0 [ 990.910159] ? vfs_write+0x393/0x540 [ 990.913901] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 990.918677] ? trace_hardirqs_off_caller+0x69/0x210 [ 990.923727] ? do_syscall_64+0x21/0x620 [ 990.927759] do_syscall_64+0xf9/0x620 [ 990.931582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 990.936781] RIP: 0033:0x45c369 14:16:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0x6000}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 990.939991] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 990.958903] RSP: 002b:00007fcc30bc9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 990.966626] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045c369 [ 990.973910] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 990.981194] RBP: 00007fcc30bc9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 990.988478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 990.995760] R13: 00007ffcb7c2287f R14: 00007fcc30bca9c0 R15: 000000000078bf0c 14:16:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:52 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x2}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0xf000}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:52 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xff000000}], 0xc6, 0x0) [ 991.243735] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {0x0, 0x0, 0xffff}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:52 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:52 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x3}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x3}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 991.612775] FAULT_INJECTION: forcing a failure. [ 991.612775] name failslab, interval 1, probability 0, space 0, times 0 [ 991.639959] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 991.735160] CPU: 1 PID: 14143 Comm: syz-executor.2 Not tainted 4.19.134-syzkaller #0 [ 991.743183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 991.752546] Call Trace: [ 991.755150] dump_stack+0x1fc/0x2fe [ 991.758815] should_fail.cold+0xa/0x14 [ 991.762754] ? setup_fault_attr+0x200/0x200 [ 991.767097] ? lock_acquire+0x170/0x3c0 [ 991.771100] __should_failslab+0x115/0x180 [ 991.775351] should_failslab+0x5/0xf [ 991.779091] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 991.784230] __kmalloc_node_track_caller+0x38/0x70 [ 991.789188] __alloc_skb+0xae/0x560 [ 991.792845] netlink_sendmsg+0x9ee/0xc40 [ 991.796930] ? nlmsg_notify+0x1a0/0x1a0 [ 991.800926] ? nlmsg_notify+0x1a0/0x1a0 [ 991.804916] sock_sendmsg+0xc3/0x120 [ 991.808681] ___sys_sendmsg+0x7bb/0x8e0 [ 991.812671] ? check_preemption_disabled+0x41/0x280 [ 991.817705] ? copy_msghdr_from_user+0x440/0x440 [ 991.822479] ? __fget+0x32f/0x510 [ 991.825961] ? lock_downgrade+0x720/0x720 [ 991.830129] ? check_preemption_disabled+0x41/0x280 [ 991.835168] ? check_preemption_disabled+0x41/0x280 [ 991.840212] ? __fget+0x356/0x510 [ 991.843719] ? do_dup2+0x450/0x450 [ 991.847373] ? lock_downgrade+0x720/0x720 [ 991.851652] ? vfs_write+0x3d7/0x540 [ 991.855391] ? __fdget+0x1d0/0x230 [ 991.858942] __x64_sys_sendmsg+0x132/0x220 [ 991.863177] ? __sys_sendmsg+0x1b0/0x1b0 [ 991.867235] ? vfs_write+0x393/0x540 [ 991.870986] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 991.875736] ? trace_hardirqs_off_caller+0x69/0x210 [ 991.880748] ? do_syscall_64+0x21/0x620 [ 991.884717] do_syscall_64+0xf9/0x620 [ 991.888503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 991.893673] RIP: 0033:0x45c369 [ 991.896848] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 991.915739] RSP: 002b:00007fcc30bc9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 991.923451] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045c369 14:16:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x8}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 991.930702] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 991.937954] RBP: 00007fcc30bc9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 991.945214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 991.954136] R13: 00007ffcb7c2287f R14: 00007fcc30bca9c0 R15: 000000000078bf0c 14:16:53 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 992.037424] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 992.095278] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 992.103785] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 992.123078] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 992.134736] FAULT_INJECTION: forcing a failure. 14:16:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) [ 992.134736] name failslab, interval 1, probability 0, space 0, times 0 [ 992.192490] CPU: 1 PID: 14170 Comm: syz-executor.2 Not tainted 4.19.134-syzkaller #0 [ 992.200418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.209781] Call Trace: [ 992.212386] dump_stack+0x1fc/0x2fe [ 992.216044] should_fail.cold+0xa/0x14 [ 992.219959] ? setup_fault_attr+0x200/0x200 [ 992.224317] ? lock_downgrade+0x720/0x720 [ 992.228530] ? check_preemption_disabled+0x41/0x280 [ 992.233569] __should_failslab+0x115/0x180 [ 992.237821] should_failslab+0x5/0xf [ 992.241552] kmem_cache_alloc+0x3f/0x370 [ 992.245639] skb_clone+0x151/0x3d0 [ 992.249273] netlink_deliver_tap+0x955/0xb00 [ 992.253780] netlink_unicast+0x545/0x690 [ 992.257864] ? netlink_sendskb+0x110/0x110 [ 992.262122] netlink_sendmsg+0x6bb/0xc40 [ 992.266292] ? nlmsg_notify+0x1a0/0x1a0 [ 992.270292] ? kernel_recvmsg+0x220/0x220 [ 992.274456] ? nlmsg_notify+0x1a0/0x1a0 [ 992.278440] sock_sendmsg+0xc3/0x120 [ 992.282152] ___sys_sendmsg+0x7bb/0x8e0 [ 992.286120] ? check_preemption_disabled+0x41/0x280 [ 992.291124] ? copy_msghdr_from_user+0x440/0x440 [ 992.295880] ? __fget+0x32f/0x510 [ 992.299319] ? lock_downgrade+0x720/0x720 [ 992.303450] ? check_preemption_disabled+0x41/0x280 [ 992.308448] ? check_preemption_disabled+0x41/0x280 [ 992.313466] ? __fget+0x356/0x510 [ 992.316934] ? do_dup2+0x450/0x450 [ 992.320585] ? lock_downgrade+0x720/0x720 [ 992.324737] ? vfs_write+0x3d7/0x540 [ 992.328441] ? __fdget+0x1d0/0x230 [ 992.331974] __x64_sys_sendmsg+0x132/0x220 [ 992.336213] ? __sys_sendmsg+0x1b0/0x1b0 [ 992.340309] ? vfs_write+0x393/0x540 [ 992.344017] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 992.348757] ? trace_hardirqs_off_caller+0x69/0x210 [ 992.353760] ? do_syscall_64+0x21/0x620 [ 992.357725] do_syscall_64+0xf9/0x620 [ 992.361519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 992.366696] RIP: 0033:0x45c369 [ 992.369875] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:16:53 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xfffffdef}], 0xc6, 0x0) 14:16:53 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 14:16:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 992.388777] RSP: 002b:00007fcc30bc9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 992.396469] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045c369 [ 992.403725] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 992.410978] RBP: 00007fcc30bc9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 992.418240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 992.425493] R13: 00007ffcb7c2287f R14: 00007fcc30bca9c0 R15: 000000000078bf0c 14:16:53 executing program 2 (fault-call:1 fault-nth:3): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 992.528551] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 992.531627] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 14:16:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 14:16:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 992.612208] FAULT_INJECTION: forcing a failure. [ 992.612208] name failslab, interval 1, probability 0, space 0, times 0 [ 992.701831] CPU: 1 PID: 14192 Comm: syz-executor.2 Not tainted 4.19.134-syzkaller #0 [ 992.709760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.719123] Call Trace: [ 992.721738] dump_stack+0x1fc/0x2fe [ 992.725402] should_fail.cold+0xa/0x14 [ 992.729318] ? setup_fault_attr+0x200/0x200 [ 992.733657] ? lock_acquire+0x170/0x3c0 [ 992.737659] __should_failslab+0x115/0x180 [ 992.741915] should_failslab+0x5/0xf [ 992.745646] kmem_cache_alloc_trace+0x284/0x380 [ 992.750458] ip_set_create+0x4b0/0x12c0 [ 992.754581] ? __find_set_type_get+0x400/0x400 [ 992.759215] ? lock_downgrade+0x720/0x720 [ 992.763401] ? __find_set_type_get+0x400/0x400 [ 992.768006] nfnetlink_rcv_msg+0xc4f/0xf60 [ 992.772281] ? nfnetlink_net_exit_batch+0x150/0x150 [ 992.777331] ? avc_has_extended_perms+0xea0/0xea0 [ 992.782197] ? avc_has_extended_perms+0xea0/0xea0 [ 992.787058] ? __dev_queue_xmit+0x15f5/0x2e00 [ 992.791580] ? lock_downgrade+0x720/0x720 [ 992.795753] ? cred_has_capability.isra.0+0x139/0x2b0 [ 992.800957] ? cred_has_capability.isra.0+0x1b0/0x2b0 [ 992.806168] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 992.811114] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 992.816072] netlink_rcv_skb+0x160/0x440 [ 992.820155] ? nfnetlink_net_exit_batch+0x150/0x150 [ 992.825193] ? netlink_ack+0xae0/0xae0 [ 992.829107] ? ns_capable+0xde/0x100 [ 992.832864] nfnetlink_rcv+0x1b2/0x41b [ 992.836770] ? nfnetlink_rcv_batch+0x1df0/0x1df0 [ 992.841557] netlink_unicast+0x4d5/0x690 [ 992.845638] ? netlink_sendskb+0x110/0x110 [ 992.849898] netlink_sendmsg+0x6bb/0xc40 [ 992.853986] ? nlmsg_notify+0x1a0/0x1a0 [ 992.857972] ? kernel_recvmsg+0x220/0x220 [ 992.862142] ? nlmsg_notify+0x1a0/0x1a0 [ 992.866146] sock_sendmsg+0xc3/0x120 [ 992.869877] ___sys_sendmsg+0x7bb/0x8e0 [ 992.873864] ? check_preemption_disabled+0x41/0x280 [ 992.878901] ? copy_msghdr_from_user+0x440/0x440 [ 992.883675] ? __fget+0x32f/0x510 [ 992.887149] ? lock_downgrade+0x720/0x720 [ 992.891309] ? check_preemption_disabled+0x41/0x280 [ 992.896340] ? check_preemption_disabled+0x41/0x280 [ 992.901376] ? __fget+0x356/0x510 [ 992.904849] ? do_dup2+0x450/0x450 [ 992.908403] ? lock_downgrade+0x720/0x720 [ 992.912568] ? vfs_write+0x3d7/0x540 [ 992.916300] ? __fdget+0x1d0/0x230 [ 992.919857] __x64_sys_sendmsg+0x132/0x220 [ 992.924106] ? __sys_sendmsg+0x1b0/0x1b0 [ 992.928178] ? vfs_write+0x393/0x540 [ 992.931921] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 992.936691] ? trace_hardirqs_off_caller+0x69/0x210 [ 992.941728] ? do_syscall_64+0x21/0x620 [ 992.945726] do_syscall_64+0xf9/0x620 14:16:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 14:16:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00), 0x0, 0x0) [ 992.949549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 992.954752] RIP: 0033:0x45c369 [ 992.957954] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 992.976863] RSP: 002b:00007fcc30bc9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 992.984584] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045c369 [ 992.991866] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 14:16:54 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0xe}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 992.999150] RBP: 00007fcc30bc9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 993.006432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 993.013717] R13: 00007ffcb7c2287f R14: 00007fcc30bca9c0 R15: 000000000078bf0c [ 993.042534] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00), 0x0, 0x0) [ 993.209190] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 993.270559] nla_parse: 5 callbacks suppressed [ 993.270568] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.4'. 14:16:54 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xffffff7f}], 0xc6, 0x0) 14:16:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00), 0x0, 0x0) 14:16:54 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x35}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x10}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:54 executing program 2 (fault-call:1 fault-nth:4): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 993.390894] FAULT_INJECTION: forcing a failure. [ 993.390894] name failslab, interval 1, probability 0, space 0, times 0 [ 993.420630] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 993.428472] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 14:16:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 993.455125] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 993.473907] CPU: 1 PID: 14237 Comm: syz-executor.2 Not tainted 4.19.134-syzkaller #0 [ 993.481831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.491202] Call Trace: [ 993.493805] dump_stack+0x1fc/0x2fe [ 993.497455] should_fail.cold+0xa/0x14 [ 993.501367] ? setup_fault_attr+0x200/0x200 [ 993.505710] ? lock_acquire+0x170/0x3c0 [ 993.509709] __should_failslab+0x115/0x180 [ 993.513970] should_failslab+0x5/0xf [ 993.517705] kmem_cache_alloc_trace+0x284/0x380 [ 993.522395] hash_ip_create+0x438/0xbd0 [ 993.526390] ? hash_ip4_uadt+0x780/0x780 [ 993.527079] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 993.530464] ip_set_create+0x6ae/0x12c0 [ 993.544789] ? __find_set_type_get+0x400/0x400 [ 993.549414] ? lock_downgrade+0x720/0x720 14:16:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 993.553587] ? __find_set_type_get+0x400/0x400 [ 993.558196] nfnetlink_rcv_msg+0xc4f/0xf60 [ 993.562457] ? nfnetlink_net_exit_batch+0x150/0x150 [ 993.567502] ? avc_has_extended_perms+0xea0/0xea0 [ 993.572370] ? avc_has_extended_perms+0xea0/0xea0 [ 993.577237] ? ___preempt_schedule+0x16/0x18 [ 993.579825] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 993.581661] ? mark_held_locks+0xf0/0xf0 [ 993.581681] ? ___preempt_schedule+0x16/0x18 [ 993.581701] ? cred_has_capability.isra.0+0x139/0x2b0 14:16:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 993.581714] ? cred_has_capability.isra.0+0x1b0/0x2b0 [ 993.581729] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 993.581740] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 993.581760] netlink_rcv_skb+0x160/0x440 [ 993.625117] ? nfnetlink_net_exit_batch+0x150/0x150 [ 993.630244] ? netlink_ack+0xae0/0xae0 [ 993.633838] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 993.634146] ? ns_capable+0xde/0x100 [ 993.648173] nfnetlink_rcv+0x1b2/0x41b 14:16:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 993.652087] ? nfnetlink_rcv_batch+0x1df0/0x1df0 [ 993.656875] netlink_unicast+0x4d5/0x690 [ 993.660956] ? netlink_sendskb+0x110/0x110 [ 993.665218] netlink_sendmsg+0x6bb/0xc40 [ 993.669299] ? nlmsg_notify+0x1a0/0x1a0 [ 993.673290] ? kernel_recvmsg+0x220/0x220 [ 993.677469] ? nlmsg_notify+0x1a0/0x1a0 [ 993.681468] sock_sendmsg+0xc3/0x120 [ 993.685201] ___sys_sendmsg+0x7bb/0x8e0 [ 993.689194] ? check_preemption_disabled+0x41/0x280 [ 993.694228] ? copy_msghdr_from_user+0x440/0x440 [ 993.699010] ? __fget+0x32f/0x510 [ 993.702506] ? lock_downgrade+0x720/0x720 [ 993.706665] ? check_preemption_disabled+0x41/0x280 [ 993.711697] ? check_preemption_disabled+0x41/0x280 [ 993.716734] ? __fget+0x356/0x510 [ 993.720213] ? do_dup2+0x450/0x450 [ 993.723778] ? lock_downgrade+0x720/0x720 [ 993.727946] ? vfs_write+0x3d7/0x540 [ 993.731683] ? __fdget+0x1d0/0x230 [ 993.735244] __x64_sys_sendmsg+0x132/0x220 [ 993.739932] ? __sys_sendmsg+0x1b0/0x1b0 [ 993.744009] ? vfs_write+0x393/0x540 [ 993.747745] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 993.752516] ? trace_hardirqs_off_caller+0x69/0x210 [ 993.757557] ? do_syscall_64+0x21/0x620 [ 993.761550] do_syscall_64+0xf9/0x620 [ 993.765373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 993.770577] RIP: 0033:0x45c369 [ 993.773788] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 993.793832] RSP: 002b:00007fcc30bc9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 14:16:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:55 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x2}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 993.801553] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045c369 [ 993.808834] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 993.816114] RBP: 00007fcc30bc9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 993.823395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 993.830685] R13: 00007ffcb7c2287f R14: 00007fcc30bca9c0 R15: 000000000078bf0c [ 993.880715] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 993.908490] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. 14:16:55 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xffffff84}], 0xc6, 0x0) 14:16:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:55 executing program 2 (fault-call:1 fault-nth:5): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:55 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x25}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:55 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x2}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 994.199003] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 994.203691] FAULT_INJECTION: forcing a failure. [ 994.203691] name failslab, interval 1, probability 0, space 0, times 0 [ 994.211528] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 994.219835] CPU: 0 PID: 14286 Comm: syz-executor.2 Not tainted 4.19.134-syzkaller #0 [ 994.234154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.243524] Call Trace: [ 994.246122] dump_stack+0x1fc/0x2fe [ 994.249765] should_fail.cold+0xa/0x14 [ 994.253683] ? setup_fault_attr+0x200/0x200 [ 994.258025] ? lock_acquire+0x170/0x3c0 [ 994.262022] __should_failslab+0x115/0x180 [ 994.266272] should_failslab+0x5/0xf [ 994.269993] __kmalloc+0x2ab/0x3c0 [ 994.273548] ? ip_set_alloc+0x33/0x70 [ 994.277367] ip_set_alloc+0x33/0x70 [ 994.281004] hash_ip_create+0x4d9/0xbd0 [ 994.284991] ? hash_ip4_uadt+0x780/0x780 [ 994.289066] ip_set_create+0x6ae/0x12c0 [ 994.293059] ? __find_set_type_get+0x400/0x400 [ 994.297680] ? lock_downgrade+0x720/0x720 [ 994.301848] ? __find_set_type_get+0x400/0x400 [ 994.306440] nfnetlink_rcv_msg+0xc4f/0xf60 [ 994.310703] ? nfnetlink_net_exit_batch+0x150/0x150 [ 994.315742] ? avc_has_extended_perms+0xea0/0xea0 [ 994.320597] ? avc_has_extended_perms+0xea0/0xea0 [ 994.325451] ? __dev_queue_xmit+0x15f5/0x2e00 [ 994.329963] ? lock_downgrade+0x720/0x720 [ 994.334133] ? cred_has_capability.isra.0+0x139/0x2b0 [ 994.339335] ? cred_has_capability.isra.0+0x1b0/0x2b0 [ 994.344543] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 994.349476] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 994.354423] netlink_rcv_skb+0x160/0x440 [ 994.358492] ? nfnetlink_net_exit_batch+0x150/0x150 [ 994.363528] ? netlink_ack+0xae0/0xae0 [ 994.367442] ? ns_capable+0xde/0x100 [ 994.371171] nfnetlink_rcv+0x1b2/0x41b [ 994.375069] ? nfnetlink_rcv_batch+0x1df0/0x1df0 [ 994.379849] netlink_unicast+0x4d5/0x690 [ 994.383928] ? netlink_sendskb+0x110/0x110 [ 994.388183] netlink_sendmsg+0x6bb/0xc40 [ 994.392260] ? nlmsg_notify+0x1a0/0x1a0 [ 994.396240] ? kernel_recvmsg+0x220/0x220 [ 994.400400] ? nlmsg_notify+0x1a0/0x1a0 [ 994.404386] sock_sendmsg+0xc3/0x120 [ 994.408123] ___sys_sendmsg+0x7bb/0x8e0 [ 994.412117] ? check_preemption_disabled+0x41/0x280 [ 994.417156] ? copy_msghdr_from_user+0x440/0x440 [ 994.421933] ? __fget+0x32f/0x510 [ 994.425408] ? lock_downgrade+0x720/0x720 [ 994.429567] ? check_preemption_disabled+0x41/0x280 [ 994.434592] ? check_preemption_disabled+0x41/0x280 [ 994.439636] ? __fget+0x356/0x510 [ 994.443109] ? do_dup2+0x450/0x450 [ 994.446658] ? lock_downgrade+0x720/0x720 [ 994.450820] ? vfs_write+0x3d7/0x540 [ 994.454547] ? __fdget+0x1d0/0x230 [ 994.458110] __x64_sys_sendmsg+0x132/0x220 [ 994.462361] ? __sys_sendmsg+0x1b0/0x1b0 [ 994.466440] ? vfs_write+0x393/0x540 [ 994.470179] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 994.474950] ? trace_hardirqs_off_caller+0x69/0x210 [ 994.479987] ? do_syscall_64+0x21/0x620 [ 994.483984] do_syscall_64+0xf9/0x620 [ 994.487803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 994.493003] RIP: 0033:0x45c369 [ 994.496207] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 994.515116] RSP: 002b:00007fcc30bc9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 994.522835] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045c369 [ 994.530112] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 994.537385] RBP: 00007fcc30bc9ca0 R08: 0000000000000000 R09: 0000000000000000 14:16:55 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xffffff87}], 0xc6, 0x0) 14:16:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 994.544657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 994.551933] R13: 00007ffcb7c2287f R14: 00007fcc30bca9c0 R15: 000000000078bf0c 14:16:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:55 executing program 5 (fault-call:8 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 994.691254] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 14:16:56 executing program 2 (fault-call:1 fault-nth:6): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 994.735124] FAULT_INJECTION: forcing a failure. [ 994.735124] name failslab, interval 1, probability 0, space 0, times 0 [ 994.745070] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 994.758648] CPU: 1 PID: 14307 Comm: syz-executor.5 Not tainted 4.19.134-syzkaller #0 [ 994.766565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.775924] Call Trace: [ 994.778523] dump_stack+0x1fc/0x2fe [ 994.782146] should_fail.cold+0xa/0x14 [ 994.786055] ? setup_fault_attr+0x200/0x200 [ 994.790382] __should_failslab+0x115/0x180 [ 994.794612] should_failslab+0x5/0xf [ 994.798314] kmem_cache_alloc_node+0x245/0x3b0 [ 994.802885] __alloc_skb+0x71/0x560 [ 994.806514] alloc_skb_with_frags+0x92/0x570 [ 994.810924] ? __lock_acquire+0x6de/0x3ff0 [ 994.815156] sock_alloc_send_pskb+0x6e1/0x830 [ 994.819649] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 994.824399] ? sock_kzfree_s+0x60/0x60 [ 994.828272] ? retint_kernel+0x2d/0x2d [ 994.832153] ? __ip6_append_data.isra.0+0x173c/0x2d70 [ 994.837329] ? __ip6_append_data.isra.0+0x174f/0x2d70 [ 994.842520] __ip6_append_data.isra.0+0x1ab2/0x2d70 [ 994.847528] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 994.852715] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 994.857456] ? ip_do_fragment+0x2270/0x2270 [ 994.861782] ? ip6_setup_cork+0x16c0/0x16c0 [ 994.866103] ip6_make_skb+0x2e4/0x4de [ 994.869887] ? ip_do_fragment+0x2270/0x2270 [ 994.874196] ? ip_do_fragment+0x2270/0x2270 [ 994.878503] ? ip6_push_pending_frames+0xe0/0xe0 [ 994.883249] ? lock_release+0x429/0x8b0 [ 994.887210] ? lock_downgrade+0x720/0x720 [ 994.891344] ? check_preemption_disabled+0x41/0x280 [ 994.896344] ? check_preemption_disabled+0x41/0x280 [ 994.901350] udpv6_sendmsg+0x2328/0x2a90 [ 994.905399] ? ip_do_fragment+0x2270/0x2270 [ 994.909710] ? udp_v6_push_pending_frames+0x360/0x360 [ 994.914887] ? process_measurement+0xc7b/0x1440 [ 994.919542] ? lock_downgrade+0x720/0x720 [ 994.923685] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 994.928429] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 994.933189] inet_sendmsg+0x132/0x5a0 [ 994.936978] ? security_socket_sendmsg+0x83/0xb0 [ 994.941719] ? inet_recvmsg+0x5c0/0x5c0 [ 994.945697] sock_sendmsg+0xc3/0x120 [ 994.949398] ___sys_sendmsg+0x3b3/0x8e0 [ 994.953363] ? copy_msghdr_from_user+0x440/0x440 [ 994.958109] ? __fget+0x32f/0x510 [ 994.961552] ? lock_downgrade+0x720/0x720 [ 994.965685] ? check_preemption_disabled+0x41/0x280 [ 994.970689] ? __fget+0x356/0x510 [ 994.974133] ? do_dup2+0x450/0x450 [ 994.977662] ? rcu_nmi_exit+0xb3/0x180 [ 994.981558] ? __fdget+0x1d0/0x230 [ 994.985086] __sys_sendmmsg+0x195/0x470 [ 994.989046] ? __ia32_sys_sendmsg+0x220/0x220 [ 994.993530] ? lock_downgrade+0x720/0x720 [ 994.997684] ? __mutex_unlock_slowpath+0xea/0x610 [ 995.002514] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 995.007271] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 995.011848] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 995.016587] ? rcu_nmi_exit+0xb3/0x180 [ 995.020460] ? retint_kernel+0x2d/0x2d [ 995.024340] __x64_sys_sendmmsg+0x99/0x100 [ 995.028577] do_syscall_64+0xf9/0x620 [ 995.032379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.037564] RIP: 0033:0x45c369 [ 995.040744] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 995.059634] RSP: 002b:00007f22a5db9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 995.067325] RAX: ffffffffffffffda RBX: 0000000000026280 RCX: 000000000045c369 [ 995.074664] RDX: 00000000000000c6 RSI: 0000000020006d00 RDI: 0000000000000005 14:16:56 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xffffff88}], 0xc6, 0x0) [ 995.081933] RBP: 00007f22a5db9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 995.089195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 995.096446] R13: 00007fffad06ff9f R14: 00007f22a5dba9c0 R15: 000000000078bf0c 14:16:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x3}}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x28}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x2, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 995.264818] [ 995.266482] ====================================================== [ 995.272804] WARNING: possible circular locking dependency detected [ 995.279123] 4.19.134-syzkaller #0 Not tainted [ 995.283616] ------------------------------------------------------ [ 995.289942] syz-executor.0/14326 is trying to acquire lock: [ 995.295652] 00000000b68b74a1 ((&q->adapt_timer)){+.-.}, at: del_timer_sync+0x75/0x270 [ 995.303642] [ 995.303642] but task is already holding lock: [ 995.309621] 00000000902b8fd3 (&qdisc_tx_lock){+.-.}, at: red_change+0x379/0x1080 [ 995.317281] [ 995.317281] which lock already depends on the new lock. [ 995.317281] [ 995.323087] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 995.325601] [ 995.325601] the existing dependency chain (in reverse order) is: [ 995.325605] [ 995.325605] -> #1 (&qdisc_tx_lock){+.-.}: [ 995.325634] red_adaptative_timer+0x92/0x5c0 [ 995.325650] call_timer_fn+0x177/0x700 [ 995.355582] expire_timers+0x243/0x4e0 14:16:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x3, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 995.357174] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 995.360005] run_timer_softirq+0x21c/0x670 [ 995.360018] __do_softirq+0x26c/0x9a0 [ 995.360031] irq_exit+0x215/0x260 [ 995.360045] smp_apic_timer_interrupt+0x136/0x550 [ 995.386978] apic_timer_interrupt+0xf/0x20 [ 995.391744] kasan_kmalloc+0x101/0x160 [ 995.396165] __kmalloc_track_caller+0x155/0x3c0 [ 995.401368] kmemdup_nul+0x2d/0xa0 [ 995.405445] security_context_to_sid_core+0xb3/0x590 14:16:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x4, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 995.411083] security_context_to_sid+0x35/0x40 [ 995.416200] selinux_inode_setsecurity+0x197/0x3d0 [ 995.421671] selinux_inode_notifysecctx+0x2b/0x60 [ 995.427049] security_inode_notifysecctx+0x50/0xb0 [ 995.432509] kernfs_refresh_inode+0x328/0x4b0 [ 995.437532] kernfs_iop_permission+0x6a/0xb0 [ 995.442473] inode_permission.part.0+0x276/0x450 [ 995.447764] link_path_walk.part.0+0x952/0x1230 [ 995.452962] path_lookupat+0xe4/0x8d0 [ 995.457278] filename_lookup+0x1ac/0x5a0 [ 995.461858] vfs_statx+0x113/0x210 [ 995.465942] __se_sys_newlstat+0x96/0x120 [ 995.470626] do_syscall_64+0xf9/0x620 [ 995.474961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.480666] [ 995.480666] -> #0 ((&q->adapt_timer)){+.-.}: [ 995.486573] del_timer_sync+0xab/0x270 [ 995.491006] red_destroy+0x15/0x60 [ 995.495143] qdisc_destroy+0x180/0x780 [ 995.499555] red_change+0x514/0x1080 [ 995.503792] tc_modify_qdisc+0xf6a/0x1a80 [ 995.508471] rtnetlink_rcv_msg+0x453/0xb80 [ 995.513239] netlink_rcv_skb+0x160/0x440 [ 995.517830] netlink_unicast+0x4d5/0x690 [ 995.522427] netlink_sendmsg+0x6bb/0xc40 [ 995.527022] sock_sendmsg+0xc3/0x120 [ 995.531270] ___sys_sendmsg+0x7bb/0x8e0 [ 995.535774] __x64_sys_sendmsg+0x132/0x220 [ 995.540540] do_syscall_64+0xf9/0x620 [ 995.544866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.550613] [ 995.550613] other info that might help us debug this: [ 995.550613] [ 995.558749] Possible unsafe locking scenario: [ 995.558749] [ 995.564799] CPU0 CPU1 [ 995.569443] ---- ---- [ 995.574091] lock(&qdisc_tx_lock); [ 995.577701] lock((&q->adapt_timer)); [ 995.584094] lock(&qdisc_tx_lock); [ 995.590271] lock((&q->adapt_timer)); [ 995.594146] [ 995.594146] *** DEADLOCK *** [ 995.594146] [ 995.600220] 2 locks held by syz-executor.0/14326: [ 995.605047] #0: 00000000a78d9a2c (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 [ 995.613189] #1: 00000000902b8fd3 (&qdisc_tx_lock){+.-.}, at: red_change+0x379/0x1080 [ 995.621216] [ 995.621216] stack backtrace: [ 995.625701] CPU: 1 PID: 14326 Comm: syz-executor.0 Not tainted 4.19.134-syzkaller #0 [ 995.633569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.642906] Call Trace: [ 995.645479] dump_stack+0x1fc/0x2fe [ 995.649104] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 995.654902] __lock_acquire+0x30c9/0x3ff0 [ 995.659050] ? mark_held_locks+0xf0/0xf0 [ 995.663111] ? debug_check_no_obj_freed+0x201/0x482 [ 995.668111] ? mark_held_locks+0xf0/0xf0 [ 995.672174] ? trace_hardirqs_off+0x64/0x200 [ 995.676581] lock_acquire+0x170/0x3c0 [ 995.680394] ? del_timer_sync+0x75/0x270 [ 995.684469] ? kfree+0x110/0x210 [ 995.687831] del_timer_sync+0xab/0x270 [ 995.691713] ? del_timer_sync+0x75/0x270 [ 995.695766] ? red_offload.isra.0+0x430/0x430 [ 995.700246] red_destroy+0x15/0x60 [ 995.703793] qdisc_destroy+0x180/0x780 [ 995.707672] red_change+0x514/0x1080 [ 995.711389] ? red_destroy+0x60/0x60 [ 995.715098] ? red_destroy+0x60/0x60 [ 995.718800] tc_modify_qdisc+0xf6a/0x1a80 [ 995.722943] ? tc_get_qdisc+0xb60/0xb60 [ 995.726903] ? rtnetlink_rcv_msg+0x3fe/0xb80 [ 995.731301] ? tc_get_qdisc+0xb60/0xb60 [ 995.735276] rtnetlink_rcv_msg+0x453/0xb80 [ 995.739506] ? rtnl_calcit.isra.0+0x430/0x430 [ 995.743991] ? memcpy+0x35/0x50 [ 995.747270] ? netdev_pick_tx+0x2f0/0x2f0 [ 995.751425] ? __copy_skb_header+0x414/0x500 [ 995.755833] ? kfree_skbmem+0x140/0x140 [ 995.759810] netlink_rcv_skb+0x160/0x440 [ 995.763858] ? rtnl_calcit.isra.0+0x430/0x430 [ 995.768337] ? netlink_ack+0xae0/0xae0 [ 995.772220] netlink_unicast+0x4d5/0x690 [ 995.776267] ? netlink_sendskb+0x110/0x110 [ 995.780498] netlink_sendmsg+0x6bb/0xc40 [ 995.784569] ? nlmsg_notify+0x1a0/0x1a0 [ 995.788533] ? kernel_recvmsg+0x220/0x220 [ 995.792723] ? nlmsg_notify+0x1a0/0x1a0 [ 995.796680] sock_sendmsg+0xc3/0x120 [ 995.800390] ___sys_sendmsg+0x7bb/0x8e0 [ 995.804353] ? __lock_acquire+0x6de/0x3ff0 [ 995.808571] ? copy_msghdr_from_user+0x440/0x440 [ 995.813316] ? __fget+0x32f/0x510 [ 995.816754] ? lock_downgrade+0x720/0x720 [ 995.820902] ? check_preemption_disabled+0x41/0x280 [ 995.825909] ? check_preemption_disabled+0x41/0x280 [ 995.830928] ? __fget+0x356/0x510 [ 995.834385] ? do_dup2+0x450/0x450 [ 995.837927] ? __fdget+0x1d0/0x230 [ 995.841453] __x64_sys_sendmsg+0x132/0x220 [ 995.845673] ? __sys_sendmsg+0x1b0/0x1b0 [ 995.849725] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 995.854473] ? trace_hardirqs_off_caller+0x69/0x210 [ 995.859592] ? do_syscall_64+0x21/0x620 [ 995.863571] do_syscall_64+0xf9/0x620 [ 995.867384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.872562] RIP: 0033:0x45c369 [ 995.875743] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 995.894743] RSP: 002b:00007faa5edfac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 995.902454] RAX: ffffffffffffffda RBX: 000000000002b780 RCX: 000000000045c369 [ 995.909710] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000004 14:16:57 executing program 5 (fault-call:8 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x8, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:57 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xffffff8d}], 0xc6, 0x0) [ 995.916965] RBP: 000000000078bf40 R08: 0000000000000000 R09: 0000000000000000 [ 995.924252] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bf0c [ 995.931506] R13: 00007ffd90999d3f R14: 00007faa5edfb9c0 R15: 000000000078bf0c [ 995.955483] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 14:16:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 995.990345] FAULT_INJECTION: forcing a failure. [ 995.990345] name failslab, interval 1, probability 0, space 0, times 0 [ 996.001695] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 996.057982] net_ratelimit: 4 callbacks suppressed [ 996.057995] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 996.076448] CPU: 0 PID: 14350 Comm: syz-executor.5 Not tainted 4.19.134-syzkaller #0 [ 996.084358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.093714] Call Trace: [ 996.096309] dump_stack+0x1fc/0x2fe [ 996.099958] should_fail.cold+0xa/0x14 [ 996.103873] ? setup_fault_attr+0x200/0x200 [ 996.108209] ? lock_acquire+0x170/0x3c0 [ 996.112208] ? lock_downgrade+0x720/0x720 [ 996.116375] __should_failslab+0x115/0x180 [ 996.120641] should_failslab+0x5/0xf [ 996.124367] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 996.129489] __kmalloc_node_track_caller+0x38/0x70 [ 996.134432] __alloc_skb+0xae/0x560 [ 996.138073] alloc_skb_with_frags+0x92/0x570 [ 996.142493] ? event_sched_in+0x700/0xdb0 [ 996.146654] ? deref_stack_reg+0x134/0x1d0 [ 996.150900] sock_alloc_send_pskb+0x6e1/0x830 [ 996.155409] ? sock_kzfree_s+0x60/0x60 [ 996.159310] ? retint_kernel+0x2d/0x2d [ 996.163204] ? deref_stack_reg+0x134/0x1d0 [ 996.167449] __ip6_append_data.isra.0+0x1ab2/0x2d70 [ 996.172480] ? ip_do_fragment+0x2270/0x2270 [ 996.176834] ? ip6_setup_cork+0x16c0/0x16c0 [ 996.181167] ? lock_acquire+0x170/0x3c0 [ 996.185155] ? ip6_sk_dst_lookup_flow+0xa70/0xa70 [ 996.190012] ip6_make_skb+0x2e4/0x4de [ 996.193837] ? ip_do_fragment+0x2270/0x2270 [ 996.198177] ? ip_do_fragment+0x2270/0x2270 [ 996.202517] ? ip6_push_pending_frames+0xe0/0xe0 [ 996.207283] ? rcu_nmi_exit+0xb3/0x180 [ 996.211190] ? lock_downgrade+0x720/0x720 [ 996.215348] ? lock_acquire+0x170/0x3c0 [ 996.219332] ? ip6_dst_hoplimit+0xa1/0x3f0 [ 996.223563] udpv6_sendmsg+0x2328/0x2a90 [ 996.227616] ? ip_do_fragment+0x2270/0x2270 [ 996.231921] ? udp_v6_push_pending_frames+0x360/0x360 [ 996.237152] ? lock_downgrade+0x720/0x720 [ 996.241280] ? lock_acquire+0x170/0x3c0 [ 996.245236] ? process_measurement+0x926/0x1440 [ 996.249903] ? up_write+0x18/0x150 [ 996.253445] ? retint_kernel+0x2d/0x2d [ 996.257317] inet_sendmsg+0x132/0x5a0 [ 996.261142] ? security_socket_sendmsg+0x83/0xb0 [ 996.266027] ? inet_recvmsg+0x5c0/0x5c0 [ 996.269988] sock_sendmsg+0xc3/0x120 [ 996.273690] ___sys_sendmsg+0x3b3/0x8e0 [ 996.277655] ? mark_held_locks+0xf0/0xf0 [ 996.281875] ? copy_msghdr_from_user+0x440/0x440 [ 996.286615] ? _kstrtoull+0x186/0x420 [ 996.290416] ? _parse_integer+0x180/0x180 [ 996.294574] ? lock_downgrade+0x720/0x720 [ 996.298701] ? lock_acquire+0x170/0x3c0 [ 996.302659] ? __fget+0x94/0x510 [ 996.306010] ? kstrtou8_from_user+0x200/0x200 [ 996.310489] ? __fget+0x356/0x510 [ 996.313929] ? do_dup2+0x450/0x450 [ 996.317450] ? get_pid_task+0xf4/0x190 [ 996.321320] ? __fdget+0x1d0/0x230 [ 996.324849] __sys_sendmmsg+0x195/0x470 [ 996.328807] ? __ia32_sys_sendmsg+0x220/0x220 [ 996.333289] ? lock_downgrade+0x720/0x720 [ 996.337430] ? __mutex_unlock_slowpath+0xea/0x610 [ 996.342302] ? check_preemption_disabled+0x41/0x280 [ 996.347302] ? wait_for_completion_io+0x10/0x10 [ 996.351963] ? vfs_write+0x393/0x540 [ 996.355662] ? ksys_write+0x1c8/0x2a0 [ 996.359445] ? __ia32_sys_read+0xb0/0xb0 [ 996.363497] ? posix_timer_fn+0x3d0/0x3d0 [ 996.367632] __x64_sys_sendmmsg+0x99/0x100 [ 996.371873] do_syscall_64+0xf9/0x620 [ 996.375658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 996.380830] RIP: 0033:0x45c369 [ 996.384003] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:16:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x4}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x3c}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xa, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:57 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xfffffff5}], 0xc6, 0x0) [ 996.402900] RSP: 002b:00007f22a5db9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 996.410597] RAX: ffffffffffffffda RBX: 0000000000026280 RCX: 000000000045c369 [ 996.417860] RDX: 00000000000000c6 RSI: 0000000020006d00 RDI: 0000000000000005 [ 996.425113] RBP: 00007f22a5db9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 996.432363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 996.439676] R13: 00007fffad06ff9f R14: 00007f22a5dba9c0 R15: 000000000078bf0c 14:16:57 executing program 5 (fault-call:8 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xe, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 996.510673] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 996.532975] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 996.553933] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 14:16:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 996.582702] FAULT_INJECTION: forcing a failure. [ 996.582702] name failslab, interval 1, probability 0, space 0, times 0 [ 996.622026] CPU: 0 PID: 14381 Comm: syz-executor.5 Not tainted 4.19.134-syzkaller #0 [ 996.629948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.639308] Call Trace: [ 996.641910] dump_stack+0x1fc/0x2fe [ 996.645561] should_fail.cold+0xa/0x14 [ 996.649462] ? setup_fault_attr+0x200/0x200 [ 996.653807] ? lock_downgrade+0x720/0x720 [ 996.655076] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 996.657967] __should_failslab+0x115/0x180 [ 996.657987] should_failslab+0x5/0xf [ 996.676251] kmem_cache_alloc+0x3f/0x370 [ 996.680387] __nf_conntrack_alloc+0xda/0x5e0 [ 996.684815] init_conntrack+0xeb1/0x1180 [ 996.688890] ? nf_conntrack_alloc+0x40/0x40 [ 996.693216] ? hash_conntrack_raw+0x2d6/0x460 [ 996.697729] ? nf_ct_gc_expired+0x300/0x300 [ 996.702126] ? ip6t_do_table+0xd26/0x1940 [ 996.706294] nf_conntrack_in+0x85a/0xce0 [ 996.710376] ? init_conntrack+0x1180/0x1180 [ 996.714714] ? ip6t_alloc_initial_table+0x621/0x6a0 [ 996.719754] nf_hook_slow+0xc5/0x1e0 [ 996.723493] __ip6_local_out+0x48c/0x860 [ 996.727571] ? ip6_find_1stfragopt+0x2c0/0x2c0 [ 996.732173] ? icmpv6_send+0x210/0x210 [ 996.736075] ? ip_do_fragment+0x2270/0x2270 [ 996.740415] ip6_local_out+0x26/0x170 [ 996.744236] ip6_send_skb+0xb3/0x300 [ 996.747960] udp_v6_send_skb+0x7d7/0x1610 [ 996.749272] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 996.752117] udpv6_sendmsg+0x236b/0x2a90 [ 996.752132] ? ip_do_fragment+0x2270/0x2270 [ 996.752150] ? udp_v6_push_pending_frames+0x360/0x360 [ 996.776012] ? lock_downgrade+0x720/0x720 14:16:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4006ff", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 996.780182] ? lock_acquire+0x170/0x3c0 [ 996.784186] ? process_measurement+0x926/0x1440 [ 996.788880] ? up_write+0x18/0x150 [ 996.792447] ? __save_stack_trace+0x72/0x190 [ 996.796879] ? kernel_recvmsg+0x220/0x220 [ 996.801041] inet_sendmsg+0x132/0x5a0 [ 996.804855] ? security_socket_sendmsg+0x83/0xb0 [ 996.809628] ? inet_recvmsg+0x5c0/0x5c0 [ 996.813619] sock_sendmsg+0xc3/0x120 [ 996.817121] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 996.817342] ___sys_sendmsg+0x3b3/0x8e0 14:16:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4006ff", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 996.831642] ? mark_held_locks+0xf0/0xf0 [ 996.835717] ? copy_msghdr_from_user+0x440/0x440 [ 996.840483] ? _kstrtoull+0x186/0x420 [ 996.844292] ? _parse_integer+0x180/0x180 [ 996.848457] ? lock_downgrade+0x720/0x720 [ 996.852612] ? lock_acquire+0x170/0x3c0 [ 996.856597] ? __fget+0x94/0x510 [ 996.859980] ? kstrtou8_from_user+0x200/0x200 [ 996.861754] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 996.864484] ? __fget+0x356/0x510 [ 996.864501] ? do_dup2+0x450/0x450 [ 996.881797] ? get_pid_task+0xf4/0x190 [ 996.885699] ? __fdget+0x1d0/0x230 [ 996.889250] __sys_sendmmsg+0x195/0x470 [ 996.893236] ? __ia32_sys_sendmsg+0x220/0x220 [ 996.897741] ? __fget+0x94/0x510 [ 996.901123] ? lock_downgrade+0x720/0x720 [ 996.905286] ? __mutex_unlock_slowpath+0xea/0x610 [ 996.910140] ? trace_hardirqs_on_caller+0x5a/0x210 [ 996.915089] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 996.919857] ? rcu_nmi_exit+0xb3/0x180 [ 996.923741] ? retint_kernel+0x2d/0x2d [ 996.927613] __x64_sys_sendmmsg+0x99/0x100 [ 996.931829] do_syscall_64+0xf9/0x620 [ 996.935612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 996.940853] RIP: 0033:0x45c369 [ 996.944027] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 996.962950] RSP: 002b:00007f22a5db9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 996.970647] RAX: ffffffffffffffda RBX: 0000000000026280 RCX: 000000000045c369 [ 996.977929] RDX: 00000000000000c6 RSI: 0000000020006d00 RDI: 0000000000000005 [ 996.985181] RBP: 00007f22a5db9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 996.992443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 996.999695] R13: 00007fffad06ff9f R14: 00007f22a5dba9c0 R15: 000000000078bf0c 14:16:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x5}}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:16:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4006ff", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:58 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0xfffffffe}], 0xc6, 0x0) 14:16:58 executing program 5 (fault-call:8 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x3}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x60, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 997.110560] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 997.135365] FAULT_INJECTION: forcing a failure. [ 997.135365] name failslab, interval 1, probability 0, space 0, times 0 [ 997.165618] CPU: 1 PID: 14429 Comm: syz-executor.5 Not tainted 4.19.134-syzkaller #0 [ 997.173540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.182898] Call Trace: [ 997.185499] dump_stack+0x1fc/0x2fe [ 997.189149] should_fail.cold+0xa/0x14 [ 997.193054] ? should_fail+0x142/0x7b0 [ 997.196956] ? setup_fault_attr+0x200/0x200 [ 997.201294] ? setup_fault_attr+0x200/0x200 [ 997.205624] ? rcu_nmi_exit+0xb3/0x180 [ 997.209523] __should_failslab+0x115/0x180 [ 997.213773] should_failslab+0x5/0xf [ 997.217500] __kmalloc_track_caller+0x68/0x3c0 [ 997.222094] ? nf_ct_ext_add+0x299/0x620 [ 997.226171] nf_ct_ext_add+0x299/0x620 [ 997.230075] init_conntrack+0x45c/0x1180 [ 997.234154] ? tcp_error.cold+0xcc/0xcc [ 997.238144] ? nf_conntrack_alloc+0x40/0x40 [ 997.242479] ? hash_conntrack_raw+0x2d6/0x460 [ 997.246993] ? nf_ct_gc_expired+0x300/0x300 [ 997.251336] ? ip6t_do_table+0xd26/0x1940 [ 997.255507] nf_conntrack_in+0x85a/0xce0 [ 997.259581] ? init_conntrack+0x1180/0x1180 [ 997.263913] ? ip6t_alloc_initial_table+0x621/0x6a0 [ 997.268949] nf_hook_slow+0xc5/0x1e0 [ 997.272677] __ip6_local_out+0x48c/0x860 [ 997.276765] ? ip6_find_1stfragopt+0x2c0/0x2c0 [ 997.281360] ? icmpv6_send+0x210/0x210 [ 997.285255] ? ip_do_fragment+0x2270/0x2270 [ 997.289594] ip6_local_out+0x26/0x170 [ 997.293413] ip6_send_skb+0xb3/0x300 [ 997.297135] udp_v6_send_skb+0x7d7/0x1610 [ 997.301301] udpv6_sendmsg+0x236b/0x2a90 [ 997.305371] ? ip_do_fragment+0x2270/0x2270 [ 997.309707] ? udp_v6_push_pending_frames+0x360/0x360 [ 997.314912] ? lock_downgrade+0x720/0x720 [ 997.319067] ? lock_acquire+0x170/0x3c0 [ 997.323051] ? process_measurement+0x926/0x1440 [ 997.327729] ? up_write+0x18/0x150 [ 997.331288] ? trace_hardirqs_on_caller+0x5a/0x210 [ 997.336242] inet_sendmsg+0x132/0x5a0 [ 997.340053] ? security_socket_sendmsg+0x83/0xb0 [ 997.344827] ? inet_recvmsg+0x5c0/0x5c0 [ 997.348811] sock_sendmsg+0xc3/0x120 [ 997.352531] ___sys_sendmsg+0x3b3/0x8e0 [ 997.356520] ? mark_held_locks+0xf0/0xf0 [ 997.360596] ? copy_msghdr_from_user+0x440/0x440 [ 997.365362] ? _kstrtoull+0x186/0x420 [ 997.369166] ? _parse_integer+0x180/0x180 [ 997.373301] ? lock_downgrade+0x720/0x720 [ 997.377429] ? lock_acquire+0x170/0x3c0 [ 997.381401] ? __fget+0x94/0x510 [ 997.384761] ? kstrtou8_from_user+0x200/0x200 [ 997.389323] ? __fget+0x356/0x510 [ 997.392832] ? do_dup2+0x450/0x450 [ 997.396355] ? get_pid_task+0xf4/0x190 [ 997.400241] ? __fdget+0x1d0/0x230 [ 997.403827] __sys_sendmmsg+0x195/0x470 [ 997.407804] ? __ia32_sys_sendmsg+0x220/0x220 [ 997.412292] ? lock_downgrade+0x720/0x720 [ 997.416489] ? __mutex_unlock_slowpath+0xea/0x610 [ 997.421334] ? check_preemption_disabled+0x41/0x280 [ 997.426400] ? wait_for_completion_io+0x10/0x10 [ 997.431053] ? vfs_write+0x393/0x540 [ 997.434779] ? ksys_write+0x1c8/0x2a0 [ 997.438562] ? __ia32_sys_read+0xb0/0xb0 [ 997.442611] ? trace_hardirqs_off_caller+0x69/0x210 [ 997.447611] __x64_sys_sendmmsg+0x99/0x100 [ 997.451832] do_syscall_64+0xf9/0x620 [ 997.455622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 997.460805] RIP: 0033:0x45c369 [ 997.464042] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 997.482931] RSP: 002b:00007f22a5db9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 997.490664] RAX: ffffffffffffffda RBX: 0000000000026280 RCX: 000000000045c369 [ 997.497923] RDX: 00000000000000c6 RSI: 0000000020006d00 RDI: 0000000000000005 [ 997.505178] RBP: 00007f22a5db9ca0 R08: 0000000000000000 R09: 0000000000000000 14:16:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "40067f", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x8}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:58 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0x2, 0x0) [ 997.512448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 997.519717] R13: 00007fffad06ff9f R14: 00007f22a5dba9c0 R15: 000000000078bf0c 14:16:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x6}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x300, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0xa}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 997.623628] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:16:59 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0x3, 0x0) 14:16:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xa00, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:59 executing program 5 (fault-call:8 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "40068d", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x10}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xe00, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x8}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:59 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0x4, 0x0) [ 997.881803] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 997.907642] FAULT_INJECTION: forcing a failure. [ 997.907642] name failslab, interval 1, probability 0, space 0, times 0 [ 997.918936] CPU: 1 PID: 14490 Comm: syz-executor.5 Not tainted 4.19.134-syzkaller #0 [ 997.926826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.936186] Call Trace: [ 997.938795] dump_stack+0x1fc/0x2fe [ 997.942440] should_fail.cold+0xa/0x14 [ 997.946343] ? setup_fault_attr+0x200/0x200 [ 997.950680] ? __local_bh_enable_ip+0x18d/0x270 [ 997.955365] __should_failslab+0x115/0x180 [ 997.959616] should_failslab+0x5/0xf [ 997.963348] kmem_cache_alloc_node+0x54/0x3b0 [ 997.967862] __alloc_skb+0x71/0x560 [ 997.971508] alloc_skb_with_frags+0x92/0x570 [ 997.975930] ? fib6_rule_lookup+0x195/0x4e0 [ 997.980272] sock_alloc_send_pskb+0x6e1/0x830 [ 997.984779] ? lock_downgrade+0x720/0x720 [ 997.988942] ? sock_kzfree_s+0x60/0x60 [ 997.992847] ? ip6_dst_lookup_tail+0xdb8/0x19b0 [ 997.997530] ? dst_release+0x54/0xb0 [ 998.001259] ? trace_hardirqs_on_caller+0x5a/0x210 [ 998.006212] ? trace_hardirqs_on_caller+0x5a/0x210 [ 998.011161] __ip6_append_data.isra.0+0x1ab2/0x2d70 [ 998.016211] ? trace_hardirqs_on_caller+0x5a/0x210 [ 998.021156] ? rawv6_rcv.cold+0x3e/0x3e [ 998.025154] ? ip6_setup_cork+0x16c0/0x16c0 14:16:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf00, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x1440, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4006c0", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:59 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0x5, 0x0) [ 998.029496] ip6_append_data+0x1e7/0x330 [ 998.033570] ? rawv6_rcv.cold+0x3e/0x3e [ 998.037561] ? rawv6_rcv.cold+0x3e/0x3e [ 998.041561] icmp6_send+0x17c4/0x2230 [ 998.045390] ? icmpv6_push_pending_frames+0x470/0x470 [ 998.050594] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 998.055366] ? trace_hardirqs_on_caller+0x5a/0x210 [ 998.060316] ? rcu_nmi_exit+0xb3/0x180 [ 998.064226] ? trace_hardirqs_on_caller+0x5a/0x210 [ 998.069181] ? lock_acquire+0x170/0x3c0 [ 998.073174] ? inet6_unregister_icmp_sender+0x50/0x50 14:16:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x3f00, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 998.075359] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 998.078376] ? icmpv6_push_pending_frames+0x470/0x470 [ 998.078394] ? icmpv6_send+0xde/0x210 [ 998.097679] icmpv6_send+0xde/0x210 [ 998.101322] ip6_link_failure+0x26/0x4e0 [ 998.105401] ? inet6_rtm_delroute+0x140/0x140 [ 998.109911] ip6_tnl_xmit+0x474/0x3500 [ 998.113829] ? mark_held_locks+0x20/0xf0 [ 998.117915] ? ip6_tnl_parm_from_user+0x4b0/0x4b0 [ 998.122831] ? calibrate_delay.cold+0x36f/0x3ef [ 998.127514] ? rcu_nmi_exit+0xb3/0x180 14:16:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x4014, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 998.131418] ? retint_kernel+0x2d/0x2d [ 998.135316] ? map_id_range_down+0x1c4/0x340 [ 998.139740] ? projid_m_show+0x220/0x220 [ 998.143812] ? ip6_tnl_start_xmit+0xf5a/0x1dd0 [ 998.148406] ? check_memory_region+0x38/0x170 [ 998.152919] ip6_tnl_start_xmit+0x924/0x1dd0 [ 998.157344] ? ip6_tnl_link_config+0x8b0/0x8b0 [ 998.161944] ? __skb_gso_segment+0x720/0x720 [ 998.166363] ? validate_xmit_xfrm+0x3dc/0xe30 [ 998.170873] dev_hard_start_xmit+0x1a8/0x920 [ 998.175300] __dev_queue_xmit+0x269d/0x2e00 [ 998.179637] ? lock_downgrade+0x720/0x720 [ 998.183797] ? trace_hardirqs_on_caller+0x5a/0x210 [ 998.188741] ? netdev_pick_tx+0x2f0/0x2f0 [ 998.192903] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 998.197671] ? rcu_nmi_exit+0xb3/0x180 [ 998.201576] ? lock_acquire+0x170/0x3c0 [ 998.205561] ? ip6_finish_output2+0x1f2/0x2290 [ 998.210160] ip6_finish_output2+0x113d/0x2290 [ 998.214679] ? ip6_forward_finish+0x4b0/0x4b0 [ 998.219192] ? lock_downgrade+0x720/0x720 [ 998.223357] ? lock_acquire+0x170/0x3c0 [ 998.227346] ? ip6_mtu+0x17a/0x480 [ 998.230922] ip6_finish_output+0x7eb/0xc10 [ 998.235189] ip6_output+0x205/0x770 [ 998.238836] ? ip6_finish_output+0xc10/0xc10 [ 998.243261] ? ip6_fragment+0x32a0/0x32a0 [ 998.247424] ? ip_do_fragment+0x2270/0x2270 [ 998.251764] ip6_local_out+0xaf/0x170 [ 998.255584] ip6_send_skb+0xb3/0x300 [ 998.259314] udp_v6_send_skb+0x7d7/0x1610 [ 998.263483] udpv6_sendmsg+0x236b/0x2a90 [ 998.267561] ? ip_do_fragment+0x2270/0x2270 [ 998.271905] ? udp_v6_push_pending_frames+0x360/0x360 [ 998.277115] ? retint_kernel+0x2d/0x2d [ 998.281025] ? rw_copy_check_uvector+0x36/0x340 [ 998.285714] ? write_comp_data+0x23/0x70 [ 998.289806] ? __save_stack_trace+0x72/0x190 [ 998.294228] ? kernel_recvmsg+0x220/0x220 [ 998.298383] ? trace_hardirqs_on_caller+0x5a/0x210 [ 998.303330] inet_sendmsg+0x132/0x5a0 [ 998.307142] ? security_socket_sendmsg+0x83/0xb0 [ 998.311908] ? inet_recvmsg+0x5c0/0x5c0 [ 998.315892] sock_sendmsg+0xc3/0x120 [ 998.319614] ___sys_sendmsg+0x3b3/0x8e0 [ 998.323598] ? mark_held_locks+0xf0/0xf0 [ 998.327668] ? copy_msghdr_from_user+0x440/0x440 [ 998.332435] ? _kstrtoull+0x186/0x420 [ 998.336248] ? _parse_integer+0x180/0x180 [ 998.340410] ? lock_downgrade+0x720/0x720 [ 998.344566] ? lock_acquire+0x170/0x3c0 [ 998.348552] ? __fget+0x94/0x510 [ 998.351929] ? kstrtou8_from_user+0x200/0x200 [ 998.356439] ? __fget+0x356/0x510 [ 998.359906] ? do_dup2+0x450/0x450 [ 998.363453] ? get_pid_task+0xf4/0x190 [ 998.367351] ? __fdget+0x1d0/0x230 [ 998.370901] __sys_sendmmsg+0x195/0x470 [ 998.374882] ? __ia32_sys_sendmsg+0x220/0x220 [ 998.379362] ? __fget+0x94/0x510 [ 998.382723] ? lock_downgrade+0x720/0x720 [ 998.386859] ? __mutex_unlock_slowpath+0xea/0x610 [ 998.391686] ? check_preemption_disabled+0x41/0x280 [ 998.396706] ? wait_for_completion_io+0x10/0x10 [ 998.401375] ? vfs_write+0x393/0x540 [ 998.405082] ? ksys_write+0x1c8/0x2a0 [ 998.408868] ? __ia32_sys_read+0xb0/0xb0 [ 998.412973] ? trace_hardirqs_off_caller+0x69/0x210 [ 998.417978] __x64_sys_sendmmsg+0x99/0x100 [ 998.422211] do_syscall_64+0xf9/0x620 [ 998.426007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 998.431179] RIP: 0033:0x45c369 [ 998.434353] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 998.453238] RSP: 002b:00007f22a5db9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 998.460936] RAX: ffffffffffffffda RBX: 0000000000026280 RCX: 000000000045c369 [ 998.468203] RDX: 00000000000000c6 RSI: 0000000020006d00 RDI: 0000000000000005 [ 998.475486] RBP: 00007f22a5db9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 998.482739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 998.489995] R13: 00007fffad06ff9f R14: 00007f22a5dba9c0 R15: 000000000078bf0c 14:16:59 executing program 5 (fault-call:8 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:16:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4006f5", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:16:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x14}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:16:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x6000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:16:59 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0x6, 0x0) 14:16:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x9}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:16:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x102}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 998.613606] FAULT_INJECTION: forcing a failure. [ 998.613606] name failslab, interval 1, probability 0, space 0, times 0 [ 998.624900] CPU: 1 PID: 14536 Comm: syz-executor.5 Not tainted 4.19.134-syzkaller #0 [ 998.632787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.642150] Call Trace: [ 998.644753] dump_stack+0x1fc/0x2fe [ 998.648402] should_fail.cold+0xa/0x14 [ 998.652310] ? setup_fault_attr+0x200/0x200 [ 998.656662] ? ip6_pol_route+0xfa/0x1270 [ 998.660738] ? setup_fault_attr+0x200/0x200 [ 998.665076] __should_failslab+0x115/0x180 [ 998.669329] should_failslab+0x5/0xf [ 998.673061] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 998.678098] __kmalloc_node_track_caller+0x38/0x70 [ 998.683040] __alloc_skb+0xae/0x560 [ 998.686678] alloc_skb_with_frags+0x92/0x570 [ 998.691098] ? fib6_rule_lookup+0x195/0x4e0 [ 998.695485] sock_alloc_send_pskb+0x6e1/0x830 [ 998.699997] ? lock_downgrade+0x720/0x720 [ 998.704161] ? sock_kzfree_s+0x60/0x60 [ 998.708091] ? ip6_dst_lookup_tail+0xdb8/0x19b0 14:17:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x103}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:17:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 998.712770] ? dst_release+0x54/0xb0 [ 998.716501] ? xfrm_lookup_with_ifid+0x519/0x1cb0 [ 998.721369] __ip6_append_data.isra.0+0x1ab2/0x2d70 [ 998.726404] ? mark_held_locks+0xf0/0xf0 [ 998.730480] ? rawv6_rcv.cold+0x3e/0x3e [ 998.734473] ? ip6_setup_cork+0x16c0/0x16c0 [ 998.738808] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 998.743577] ? ip6_sk_dst_lookup_flow+0xa70/0xa70 [ 998.748431] ? rcu_nmi_exit+0xb3/0x180 [ 998.752337] ip6_append_data+0x1e7/0x330 [ 998.756411] ? rawv6_rcv.cold+0x3e/0x3e [ 998.760400] ? rawv6_rcv.cold+0x3e/0x3e 14:17:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x201}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 998.764392] icmp6_send+0x17c4/0x2230 [ 998.768213] ? lock_acquire+0x170/0x3c0 [ 998.772216] ? icmpv6_push_pending_frames+0x470/0x470 [ 998.777426] ? switch_mm_irqs_off+0x764/0x1340 [ 998.782034] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 998.786819] ? rcu_nmi_exit+0xb3/0x180 [ 998.790741] ? lock_acquire+0x170/0x3c0 [ 998.794742] ? inet6_unregister_icmp_sender+0x50/0x50 [ 998.800066] ? icmpv6_push_pending_frames+0x470/0x470 [ 998.805280] ? icmpv6_send+0xde/0x210 [ 998.809099] icmpv6_send+0xde/0x210 14:17:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x202}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 998.812746] ip6_link_failure+0x26/0x4e0 [ 998.816827] ? inet6_rtm_delroute+0x140/0x140 [ 998.821338] ip6_tnl_xmit+0x474/0x3500 [ 998.825244] ? mark_held_locks+0x20/0xf0 [ 998.829319] ? ip6_tnl_parm_from_user+0x4b0/0x4b0 [ 998.834179] ? mark_held_locks+0xf0/0xf0 [ 998.838258] ? mark_held_locks+0xf0/0xf0 [ 998.842333] ? rcu_nmi_exit+0xb3/0x180 [ 998.846236] ? retint_kernel+0x2d/0x2d [ 998.850140] ? trace_hardirqs_on_caller+0x5a/0x210 [ 998.855086] ? map_id_range_down+0x1c4/0x340 [ 998.859506] ? projid_m_show+0x220/0x220 14:17:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 998.863578] ? ipv6_ext_hdr+0x45/0x50 [ 998.867396] ? ip6_tnl_parse_tlv_enc_lim+0x48d/0x5a0 [ 998.872524] ip6_tnl_start_xmit+0x924/0x1dd0 [ 998.876952] ? ip6_tnl_link_config+0x8b0/0x8b0 [ 998.881558] ? validate_xmit_xfrm+0x3dc/0xe30 [ 998.886077] dev_hard_start_xmit+0x1a8/0x920 [ 998.890515] __dev_queue_xmit+0x269d/0x2e00 [ 998.894859] ? lock_downgrade+0x720/0x720 [ 998.899024] ? netdev_pick_tx+0x2f0/0x2f0 [ 998.903186] ? do_raw_spin_lock+0xcb/0x220 [ 998.907437] ? check_preemption_disabled+0x41/0x280 [ 998.912536] ? ctnetlink_dump_table+0x1130/0x1130 [ 998.917396] ? lock_downgrade+0x720/0x720 [ 998.921560] ? lock_acquire+0x170/0x3c0 [ 998.925557] ? lock_acquire+0x170/0x3c0 [ 998.929549] ? ip6_finish_output2+0x1f2/0x2290 [ 998.934153] ip6_finish_output2+0x113d/0x2290 [ 998.938671] ? ip6_forward_finish+0x4b0/0x4b0 [ 998.943187] ? lock_downgrade+0x720/0x720 [ 998.947348] ? lock_acquire+0x170/0x3c0 [ 998.951335] ? ip6_mtu+0x17a/0x480 [ 998.954900] ip6_finish_output+0x7eb/0xc10 [ 998.959155] ip6_output+0x205/0x770 [ 998.962795] ? ip6_finish_output+0xc10/0xc10 [ 998.967217] ? ip6_fragment+0x32a0/0x32a0 [ 998.971381] ? ip_do_fragment+0x2270/0x2270 [ 998.975726] ip6_local_out+0xaf/0x170 [ 998.979543] ip6_send_skb+0xb3/0x300 [ 998.983273] udp_v6_send_skb+0x7d7/0x1610 [ 998.987443] udpv6_sendmsg+0x236b/0x2a90 [ 998.991522] ? ip_do_fragment+0x2270/0x2270 [ 998.995866] ? udp_v6_push_pending_frames+0x360/0x360 [ 999.001072] ? lock_downgrade+0x720/0x720 [ 999.005235] ? lock_acquire+0x170/0x3c0 [ 999.009223] ? process_measurement+0x926/0x1440 [ 999.013907] ? up_write+0x18/0x150 [ 999.017463] ? trace_hardirqs_on_caller+0x5a/0x210 [ 999.022410] ? retint_kernel+0x2d/0x2d [ 999.026315] ? __save_stack_trace+0x72/0x190 [ 999.030737] ? kernel_recvmsg+0x220/0x220 [ 999.034906] inet_sendmsg+0x132/0x5a0 [ 999.038724] ? security_socket_sendmsg+0x83/0xb0 [ 999.043495] ? inet_recvmsg+0x5c0/0x5c0 [ 999.047488] sock_sendmsg+0xc3/0x120 [ 999.051220] ___sys_sendmsg+0x3b3/0x8e0 [ 999.055209] ? mark_held_locks+0xf0/0xf0 [ 999.059290] ? copy_msghdr_from_user+0x440/0x440 [ 999.064070] ? _kstrtoull+0x186/0x420 [ 999.067890] ? _parse_integer+0x180/0x180 [ 999.072061] ? lock_downgrade+0x720/0x720 [ 999.076213] ? lock_acquire+0x170/0x3c0 [ 999.080176] ? __fget+0x94/0x510 [ 999.083531] ? kstrtou8_from_user+0x200/0x200 [ 999.088011] ? __fget+0x356/0x510 [ 999.091502] ? do_dup2+0x450/0x450 [ 999.095032] ? get_pid_task+0xf4/0x190 [ 999.098946] ? __fdget+0x1d0/0x230 [ 999.102529] __sys_sendmmsg+0x195/0x470 [ 999.106488] ? __ia32_sys_sendmsg+0x220/0x220 [ 999.110970] ? lock_downgrade+0x720/0x720 [ 999.115116] ? __mutex_unlock_slowpath+0xea/0x610 [ 999.120064] ? check_preemption_disabled+0x41/0x280 [ 999.125134] ? wait_for_completion_io+0x10/0x10 [ 999.129796] ? vfs_write+0x393/0x540 [ 999.133500] ? ksys_write+0x1c8/0x2a0 [ 999.137294] ? __ia32_sys_read+0xb0/0xb0 [ 999.141353] ? posix_timer_fn+0x3d0/0x3d0 [ 999.145494] ? trace_hardirqs_off_caller+0x69/0x210 [ 999.150501] __x64_sys_sendmmsg+0x99/0x100 [ 999.154722] do_syscall_64+0xf9/0x620 [ 999.158528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.163798] RIP: 0033:0x45c369 [ 999.166972] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 999.185858] RSP: 002b:00007f22a5db9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 999.193571] RAX: ffffffffffffffda RBX: 0000000000026280 RCX: 000000000045c369 [ 999.200833] RDX: 00000000000000c6 RSI: 0000000020006d00 RDI: 0000000000000005 [ 999.208085] RBP: 00007f22a5db9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 999.215338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 999.222591] R13: 00007fffad06ff9f R14: 00007f22a5dba9c0 R15: 000000000078bf0c 14:17:00 executing program 5 (fault-call:8 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:17:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:17:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf0ffff, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:17:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x203}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:17:00 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0x7, 0x0) 14:17:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0xa}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:17:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x300}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:17:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x1000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:17:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 999.381375] FAULT_INJECTION: forcing a failure. [ 999.381375] name failslab, interval 1, probability 0, space 0, times 0 [ 999.443338] CPU: 1 PID: 14593 Comm: syz-executor.5 Not tainted 4.19.134-syzkaller #0 [ 999.451255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.460702] Call Trace: [ 999.463285] dump_stack+0x1fc/0x2fe [ 999.466927] should_fail.cold+0xa/0x14 [ 999.470801] ? setup_fault_attr+0x200/0x200 [ 999.475216] __should_failslab+0x115/0x180 [ 999.479436] should_failslab+0x5/0xf [ 999.483136] kmem_cache_alloc_node+0x245/0x3b0 [ 999.487709] __alloc_skb+0x71/0x560 [ 999.491320] alloc_skb_with_frags+0x92/0x570 [ 999.495733] sock_alloc_send_pskb+0x6e1/0x830 [ 999.500212] ? check_preemption_disabled+0x41/0x280 [ 999.505213] ? sock_kzfree_s+0x60/0x60 [ 999.509085] ? ip6_finish_output2+0x1f2/0x2290 [ 999.513668] ? check_preemption_disabled+0x41/0x280 [ 999.518666] ? trace_hardirqs_on+0x55/0x210 [ 999.522974] ? ip6_finish_output2+0x1176/0x2290 [ 999.527625] ? __local_bh_enable_ip+0x159/0x270 [ 999.532291] ? ip6_finish_output2+0x11ae/0x2290 [ 999.536944] __ip6_append_data.isra.0+0x1ab2/0x2d70 [ 999.541950] ? ip_do_fragment+0x2270/0x2270 [ 999.546258] ? ip6_setup_cork+0x16c0/0x16c0 [ 999.550565] ? ip6_sk_dst_lookup_flow+0xa70/0xa70 [ 999.555387] ? ip6_dst_check+0xe0/0x710 [ 999.559378] ip6_make_skb+0x2e4/0x4de [ 999.563185] ? ip_do_fragment+0x2270/0x2270 [ 999.567498] ? ip_do_fragment+0x2270/0x2270 [ 999.571809] ? ip6_push_pending_frames+0xe0/0xe0 [ 999.576565] ? ip6erspan_newlink+0x7a0/0x9a0 [ 999.580976] ? lock_downgrade+0x720/0x720 [ 999.585118] ? lock_acquire+0x170/0x3c0 [ 999.589112] ? ip6_dst_hoplimit+0xa1/0x3f0 [ 999.593354] udpv6_sendmsg+0x2328/0x2a90 [ 999.597410] ? ip_do_fragment+0x2270/0x2270 [ 999.601744] ? udp_v6_push_pending_frames+0x360/0x360 [ 999.606941] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 999.611681] ? rcu_nmi_exit+0xb3/0x180 [ 999.615575] ? retint_kernel+0x2d/0x2d [ 999.619453] ? __sanitizer_cov_trace_pc+0x34/0x50 [ 999.624286] ? __save_stack_trace+0x72/0x190 [ 999.628684] ? kernel_recvmsg+0x220/0x220 [ 999.632832] inet_sendmsg+0x132/0x5a0 [ 999.636621] ? security_socket_sendmsg+0x83/0xb0 [ 999.641360] ? inet_recvmsg+0x5c0/0x5c0 [ 999.645318] sock_sendmsg+0xc3/0x120 [ 999.649031] ___sys_sendmsg+0x3b3/0x8e0 [ 999.652990] ? mark_held_locks+0xf0/0xf0 [ 999.657036] ? copy_msghdr_from_user+0x440/0x440 [ 999.661777] ? _kstrtoull+0x186/0x420 [ 999.665564] ? _parse_integer+0x180/0x180 [ 999.669695] ? mark_held_locks+0xf0/0xf0 [ 999.673754] ? lock_downgrade+0x720/0x720 [ 999.677883] ? lock_acquire+0x170/0x3c0 [ 999.681839] ? __fget+0x94/0x510 [ 999.685189] ? kstrtou8_from_user+0x200/0x200 [ 999.689667] ? __fget+0x356/0x510 [ 999.693112] ? lock_downgrade+0x720/0x720 [ 999.697244] ? lock_acquire+0x170/0x3c0 [ 999.701202] ? __might_fault+0xef/0x1d0 [ 999.705162] __sys_sendmmsg+0x195/0x470 [ 999.709124] ? __ia32_sys_sendmsg+0x220/0x220 [ 999.713718] ? __mutex_unlock_slowpath+0x2ee/0x610 [ 999.718637] ? ksys_write+0x1c8/0x2a0 [ 999.722422] ? __ia32_sys_read+0xb0/0xb0 [ 999.726466] ? trace_hardirqs_off_caller+0x69/0x210 [ 999.731467] __x64_sys_sendmmsg+0x99/0x100 [ 999.735685] do_syscall_64+0xf9/0x620 [ 999.739471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.744643] RIP: 0033:0x45c369 [ 999.747819] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 999.771488] RSP: 002b:00007f22a5db9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 999.779185] RAX: ffffffffffffffda RBX: 0000000000026280 RCX: 000000000045c369 [ 999.786438] RDX: 00000000000000c6 RSI: 0000000020006d00 RDI: 0000000000000005 14:17:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x2000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 999.793707] RBP: 00007f22a5db9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 999.800957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 999.808210] R13: 00007fffad06ff9f R14: 00007f22a5dba9c0 R15: 000000000078bf0c 14:17:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x301}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:17:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:17:01 executing program 5 (fault-call:8 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:17:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0xb}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:17:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x3000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:17:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x302}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:17:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:17:01 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0x8, 0x0) 14:17:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x4000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:17:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:17:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x303}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 1000.028944] FAULT_INJECTION: forcing a failure. [ 1000.028944] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.059195] CPU: 1 PID: 14647 Comm: syz-executor.5 Not tainted 4.19.134-syzkaller #0 [ 1000.067109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.076470] Call Trace: 14:17:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x402}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 1000.079093] dump_stack+0x1fc/0x2fe [ 1000.082748] should_fail.cold+0xa/0x14 [ 1000.086658] ? setup_fault_attr+0x200/0x200 [ 1000.091004] ? lock_acquire+0x170/0x3c0 [ 1000.094996] ? lock_downgrade+0x720/0x720 [ 1000.099164] __should_failslab+0x115/0x180 [ 1000.103416] should_failslab+0x5/0xf [ 1000.107148] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1000.112272] __kmalloc_node_track_caller+0x38/0x70 [ 1000.117221] __alloc_skb+0xae/0x560 [ 1000.120861] alloc_skb_with_frags+0x92/0x570 [ 1000.125294] sock_alloc_send_pskb+0x6e1/0x830 [ 1000.129807] ? check_preemption_disabled+0x41/0x280 [ 1000.134848] ? sock_kzfree_s+0x60/0x60 [ 1000.138762] ? ip6_finish_output2+0x1f2/0x2290 [ 1000.143361] ? check_preemption_disabled+0x41/0x280 [ 1000.148390] ? trace_hardirqs_on+0x55/0x210 [ 1000.152727] ? ip6_finish_output2+0x1176/0x2290 [ 1000.157407] ? __local_bh_enable_ip+0x159/0x270 [ 1000.162093] ? ip6_finish_output2+0x11ae/0x2290 [ 1000.166789] __ip6_append_data.isra.0+0x1ab2/0x2d70 [ 1000.171826] ? ip_do_fragment+0x2270/0x2270 14:17:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x8000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:17:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 1000.176165] ? ip6_setup_cork+0x16c0/0x16c0 [ 1000.180502] ? lock_acquire+0x170/0x3c0 [ 1000.184498] ? ip6_sk_dst_lookup_flow+0xa70/0xa70 [ 1000.189385] ip6_make_skb+0x2e4/0x4de [ 1000.193200] ? ip_do_fragment+0x2270/0x2270 [ 1000.197539] ? ip_do_fragment+0x2270/0x2270 [ 1000.201877] ? ip6_push_pending_frames+0xe0/0xe0 [ 1000.206648] ? sk_diag_fill+0x630/0xeb0 [ 1000.210642] ? lock_downgrade+0x720/0x720 [ 1000.214797] ? lock_acquire+0x170/0x3c0 [ 1000.218778] ? ip6_dst_hoplimit+0xa1/0x3f0 [ 1000.223029] udpv6_sendmsg+0x2328/0x2a90 [ 1000.227115] ? ip_do_fragment+0x2270/0x2270 [ 1000.231452] ? udp_v6_push_pending_frames+0x360/0x360 [ 1000.236657] ? lock_downgrade+0x720/0x720 [ 1000.240817] ? lock_acquire+0x170/0x3c0 [ 1000.244803] ? process_measurement+0x926/0x1440 [ 1000.249487] ? up_write+0x18/0x150 [ 1000.253039] ? trace_hardirqs_on_caller+0x5a/0x210 [ 1000.257992] ? retint_kernel+0x2d/0x2d [ 1000.261904] ? kernel_recvmsg+0x220/0x220 [ 1000.266068] inet_sendmsg+0x132/0x5a0 [ 1000.269876] ? security_socket_sendmsg+0x83/0xb0 [ 1000.274647] ? inet_recvmsg+0x5c0/0x5c0 [ 1000.278639] sock_sendmsg+0xc3/0x120 [ 1000.282367] ___sys_sendmsg+0x3b3/0x8e0 [ 1000.286361] ? copy_msghdr_from_user+0x440/0x440 [ 1000.291138] ? rcu_nmi_exit+0xb3/0x180 [ 1000.295045] ? mark_held_locks+0xf0/0xf0 [ 1000.299130] ? lock_downgrade+0x720/0x720 [ 1000.303301] ? __fget+0x1f4/0x510 [ 1000.306772] ? __fget+0x356/0x510 [ 1000.310245] ? lock_downgrade+0x720/0x720 [ 1000.314407] ? lock_acquire+0x170/0x3c0 [ 1000.318396] ? __might_fault+0xef/0x1d0 [ 1000.322389] __sys_sendmmsg+0x195/0x470 [ 1000.326375] ? __ia32_sys_sendmsg+0x220/0x220 [ 1000.330884] ? __fget+0x94/0x510 [ 1000.334265] ? lock_downgrade+0x720/0x720 [ 1000.338432] ? __mutex_unlock_slowpath+0xea/0x610 [ 1000.343287] ? check_preemption_disabled+0x41/0x280 [ 1000.348315] ? wait_for_completion_io+0x10/0x10 [ 1000.354126] ? vfs_write+0x393/0x540 [ 1000.357853] ? ksys_write+0x1c8/0x2a0 [ 1000.361671] ? __ia32_sys_read+0xb0/0xb0 [ 1000.361683] ? posix_timer_fn+0x3d0/0x3d0 [ 1000.361696] ? trace_hardirqs_off_caller+0x69/0x210 [ 1000.361711] __x64_sys_sendmmsg+0x99/0x100 [ 1000.361727] do_syscall_64+0xf9/0x620 [ 1000.361746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1000.361755] RIP: 0033:0x45c369 [ 1000.361769] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1000.361775] RSP: 002b:00007f22a5db9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1000.418015] RAX: ffffffffffffffda RBX: 0000000000026280 RCX: 000000000045c369 14:17:01 executing program 5 (fault-call:8 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) [ 1000.425267] RDX: 00000000000000c6 RSI: 0000000020006d00 RDI: 0000000000000005 [ 1000.432516] RBP: 00007f22a5db9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1000.439903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1000.447153] R13: 00007fffad06ff9f R14: 00007f22a5dba9c0 R15: 000000000078bf0c 14:17:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0xc}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 14:17:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:17:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x403}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:17:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xa000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:17:01 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0x9, 0x0) [ 1000.547741] FAULT_INJECTION: forcing a failure. [ 1000.547741] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.559069] CPU: 1 PID: 14697 Comm: syz-executor.5 Not tainted 4.19.134-syzkaller #0 [ 1000.566955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.576320] Call Trace: [ 1000.578925] dump_stack+0x1fc/0x2fe [ 1000.582580] should_fail.cold+0xa/0x14 [ 1000.586492] ? setup_fault_attr+0x200/0x200 [ 1000.590828] ? ip6_pol_route+0x32d/0x1270 14:17:01 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xa, 0x0) 14:17:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x500}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 1000.594996] __should_failslab+0x115/0x180 [ 1000.599247] should_failslab+0x5/0xf [ 1000.602981] kmem_cache_alloc_node+0x54/0x3b0 [ 1000.607502] __alloc_skb+0x71/0x560 [ 1000.611157] alloc_skb_with_frags+0x92/0x570 [ 1000.615589] ? trace_hardirqs_on_caller+0x5a/0x210 [ 1000.620541] sock_alloc_send_pskb+0x6e1/0x830 [ 1000.625052] ? trace_hardirqs_on_caller+0x5a/0x210 [ 1000.630005] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1000.634867] ? sock_kzfree_s+0x60/0x60 [ 1000.638772] ? retint_kernel+0x2d/0x2d [ 1000.642677] ? __ip6_append_data.isra.0+0x14ea/0x2d70 [ 1000.647892] __ip6_append_data.isra.0+0x1ab2/0x2d70 [ 1000.652929] ? mark_held_locks+0xf0/0xf0 [ 1000.657001] ? rawv6_rcv.cold+0x3e/0x3e [ 1000.660997] ? ip6_setup_cork+0x16c0/0x16c0 [ 1000.665327] ? icmp6_iif+0x290/0x290 [ 1000.669059] ? ip6_sk_dst_lookup_flow+0xa70/0xa70 [ 1000.673925] ip6_append_data+0x1e7/0x330 [ 1000.677999] ? rawv6_rcv.cold+0x3e/0x3e [ 1000.681986] ? rawv6_rcv.cold+0x3e/0x3e [ 1000.685976] icmp6_send+0x17c4/0x2230 [ 1000.689801] ? icmpv6_push_pending_frames+0x470/0x470 14:17:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x501}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 1000.695011] ? trace_hardirqs_on_caller+0x5a/0x210 [ 1000.699955] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1000.704727] ? rcu_nmi_exit+0xb3/0x180 [ 1000.708636] ? lock_acquire+0x170/0x3c0 [ 1000.712621] ? inet6_unregister_icmp_sender+0x50/0x50 [ 1000.717829] ? icmpv6_push_pending_frames+0x470/0x470 [ 1000.723032] ? icmpv6_send+0xde/0x210 [ 1000.726842] icmpv6_send+0xde/0x210 [ 1000.730488] ip6_link_failure+0x26/0x4e0 [ 1000.734572] ? inet6_rtm_delroute+0x140/0x140 [ 1000.739086] ip6_tnl_xmit+0x474/0x3500 [ 1000.742997] ? orc_sort_cmp+0x140/0x140 14:17:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xe000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:17:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x502}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) [ 1000.746987] ? ip6_tnl_parm_from_user+0x4b0/0x4b0 [ 1000.751844] ? kasan_kmalloc+0x139/0x160 [ 1000.755917] ? map_id_range_down+0x1c4/0x340 [ 1000.760348] ? projid_m_show+0x220/0x220 [ 1000.764424] ? ipv6_ext_hdr+0x45/0x50 [ 1000.768238] ? ip6_tnl_parse_tlv_enc_lim+0x48d/0x5a0 [ 1000.773364] ip6_tnl_start_xmit+0x924/0x1dd0 [ 1000.777796] ? ip6_tnl_link_config+0x8b0/0x8b0 [ 1000.782395] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1000.787179] dev_hard_start_xmit+0x1a8/0x920 [ 1000.791610] __dev_queue_xmit+0x269d/0x2e00 14:17:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0xf000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 1000.795957] ? rcu_nmi_exit+0xb3/0x180 [ 1000.799863] ? netdev_pick_tx+0x2f0/0x2f0 [ 1000.804028] ? lock_downgrade+0x720/0x720 [ 1000.808199] ? lock_acquire+0x170/0x3c0 [ 1000.812189] ? lock_acquire+0x170/0x3c0 [ 1000.816183] ? ip6_finish_output2+0x1f2/0x2290 [ 1000.820790] ip6_finish_output2+0x113d/0x2290 [ 1000.825309] ? ip6_forward_finish+0x4b0/0x4b0 [ 1000.829822] ? lock_downgrade+0x720/0x720 [ 1000.833988] ? lock_acquire+0x170/0x3c0 [ 1000.837976] ? ip6_mtu+0x17a/0x480 [ 1000.841534] ip6_finish_output+0x7eb/0xc10 [ 1000.845787] ip6_output+0x205/0x770 [ 1000.849425] ? ip6_finish_output+0xc10/0xc10 [ 1000.853857] ? ip6_fragment+0x32a0/0x32a0 [ 1000.858020] ? ip_do_fragment+0x2270/0x2270 [ 1000.862356] ip6_local_out+0xaf/0x170 [ 1000.866174] ip6_send_skb+0xb3/0x300 [ 1000.869900] udp_v6_send_skb+0x7d7/0x1610 [ 1000.874064] udpv6_sendmsg+0x236b/0x2a90 [ 1000.878140] ? ip_do_fragment+0x2270/0x2270 [ 1000.882482] ? udp_v6_push_pending_frames+0x360/0x360 [ 1000.887687] ? lock_downgrade+0x720/0x720 [ 1000.891851] ? lock_acquire+0x170/0x3c0 [ 1000.895840] ? process_measurement+0x926/0x1440 [ 1000.900524] ? up_write+0x18/0x150 [ 1000.904098] ? __save_stack_trace+0x72/0x190 [ 1000.908524] ? kernel_recvmsg+0x220/0x220 [ 1000.912689] inet_sendmsg+0x132/0x5a0 [ 1000.916502] ? security_socket_sendmsg+0x83/0xb0 [ 1000.921274] ? inet_recvmsg+0x5c0/0x5c0 [ 1000.925265] sock_sendmsg+0xc3/0x120 [ 1000.928994] ___sys_sendmsg+0x3b3/0x8e0 [ 1000.932984] ? mark_held_locks+0xf0/0xf0 [ 1000.937063] ? copy_msghdr_from_user+0x440/0x440 [ 1000.941833] ? _kstrtoull+0x186/0x420 [ 1000.945648] ? _parse_integer+0x180/0x180 [ 1000.949813] ? mark_held_locks+0xf0/0xf0 [ 1000.953891] ? lock_downgrade+0x720/0x720 [ 1000.958051] ? lock_acquire+0x170/0x3c0 [ 1000.962044] ? __fget+0x94/0x510 [ 1000.965435] ? kstrtou8_from_user+0x200/0x200 [ 1000.969943] ? trace_hardirqs_on_caller+0x5a/0x210 [ 1000.974888] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1000.979658] ? rcu_nmi_exit+0xb3/0x180 [ 1000.983560] ? retint_kernel+0x2d/0x2d [ 1000.987469] ? __sys_sendmmsg+0x1c2/0x470 [ 1000.991633] __sys_sendmmsg+0x195/0x470 [ 1000.995624] ? __ia32_sys_sendmsg+0x220/0x220 [ 1001.000130] ? __fget+0x94/0x510 [ 1001.003511] ? lock_downgrade+0x720/0x720 [ 1001.007675] ? __mutex_unlock_slowpath+0xea/0x610 [ 1001.012530] ? check_preemption_disabled+0x41/0x280 [ 1001.017563] ? wait_for_completion_io+0x10/0x10 [ 1001.022250] ? vfs_write+0x393/0x540 [ 1001.025977] ? ksys_write+0x1c8/0x2a0 [ 1001.029794] ? __ia32_sys_read+0xb0/0xb0 [ 1001.033860] ? posix_timer_fn+0x3d0/0x3d0 [ 1001.037997] ? trace_hardirqs_off_caller+0x69/0x210 [ 1001.043020] __x64_sys_sendmmsg+0x99/0x100 [ 1001.047240] do_syscall_64+0xf9/0x620 [ 1001.051025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1001.056195] RIP: 0033:0x45c369 [ 1001.059446] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1001.078375] RSP: 002b:00007f22a5db9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1001.086073] RAX: ffffffffffffffda RBX: 0000000000026280 RCX: 000000000045c369 [ 1001.093335] RDX: 00000000000000c6 RSI: 0000000020006d00 RDI: 0000000000000005 [ 1001.100601] RBP: 00007f22a5db9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1001.107864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 1001.115129] R13: 00007fffad06ff9f R14: 00007f22a5dba9c0 R15: 000000000078bf0c 14:17:02 executing program 5 (fault-call:8 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x10, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 14:17:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x148, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0xe}}, @TCA_RED_STAB={0x104, 0x2, "ed177cfacca6123a10d69990d399cc81d350c65b8c9602d84bb479ed6888738621ff6608e2b7c9f3fcd26711bcf9ed807502b386809181bc9ec5ccff7ca371483e699bee51c01246eb8d21b6528301bfd435eb6a13bc8af5f140d213591855593f548aa8f77912aeb97d66a58e2a4fd8803f6fb0d1b2cee7c7fb7290f5d02aebf834a9d7325d1c52b23ae13c41452aae65123b6ac5c806e8a031e0a38edbd04bd22e4b9e28523244f948431844e49d9dd0552a37551d873bb559b8667cc75bb74372d2fdebc5d94b1bfabb05bda55c32ff707853cd20b929d0f5673f67532a36378b88708c3cf757ba6d147d2215d4bd7a50dd6a91dcd47dc6aad3a05d2d780d"}]}}]}, 0x148}}, 0x0) 14:17:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x3f000000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 14:17:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "400600", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:17:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5, 0x503}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}]}, 0x50}}, 0x0) 14:17:02 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000001c0)=@fragment, 0x8) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x3000)=nil) socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}}}, 0x78) socket(0x0, 0x803, 0x0) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xb, 0x0) 14:17:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x40140000, &(0x7f00000044c0)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x801, 0x0, 0xa0020000, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) [ 1001.260861] net_ratelimit: 9 callbacks suppressed [ 1001.260871] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1001.289258] FAULT_INJECTION: forcing a failure. [ 1001.289258] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.300586] CPU: 0 PID: 14757 Comm: syz-executor.5 Not tainted 4.19.134-syzkaller #0 [ 1001.308479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.317836] Call Trace: [ 1001.320437] dump_stack+0x1fc/0x2fe [ 1001.324085] should_fail.cold+0xa/0x14 [ 1001.327990] ? setup_fault_attr+0x200/0x200 [ 1001.332331] ? retint_kernel+0x2d/0x2d [ 1001.336230] __should_failslab+0x115/0x180 [ 1001.340484] should_failslab+0x5/0xf [ 1001.344204] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 1001.349234] __kmalloc_node_track_caller+0x38/0x70 [ 1001.354186] __alloc_skb+0xae/0x560 [ 1001.357822] alloc_skb_with_frags+0x92/0x570 [ 1001.357852] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1001.362224] ? fib6_rule_lookup+0x195/0x4e0 [ 1001.362242] sock_alloc_send_pskb+0x6e1/0x830 [ 1001.362258] ? lock_downgrade+0x720/0x720 [ 1001.362274] ? sock_kzfree_s+0x60/0x60 [ 1001.389401] ? ip6_dst_lookup_tail+0xdb8/0x19b0 [ 1001.394090] ? dst_release+0x54/0xb0 [ 1001.397823] ? xfrm_lookup_with_ifid+0x519/0x1cb0 [ 1001.402688] __ip6_append_data.isra.0+0x1ab2/0x2d70 [ 1001.407751] ? mark_held_locks+0xf0/0xf0 [ 1001.411829] ? rawv6_rcv.cold+0x3e/0x3e [ 1001.415827] ? ip6_setup_cork+0x16c0/0x16c0 [ 1001.420165] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1001.424937] ? ip6_sk_dst_lookup_flow+0xa70/0xa70 [ 1001.429800] ip6_append_data+0x1e7/0x330 [ 1001.430738] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1001.433888] ? rawv6_rcv.cold+0x3e/0x3e [ 1001.433907] ? rawv6_rcv.cold+0x3e/0x3e [ 1001.452165] icmp6_send+0x17c4/0x2230 [ 1001.455990] ? icmpv6_push_pending_frames+0x470/0x470 [ 1001.461196] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1001.465968] ? rcu_nmi_exit+0xb3/0x180 [ 1001.469875] ? mark_held_locks+0xf0/0xf0 [ 1001.473955] ? deref_stack_reg+0x134/0x1d0 [ 1001.478205] ? mark_held_locks+0xf0/0xf0 [ 1001.482282] ? trace_hardirqs_on_caller+0x5a/0x210 [ 1001.487229] ? lock_acquire+0x170/0x3c0 [ 1001.491216] ? inet6_unregister_icmp_sender+0x50/0x50 [ 1001.496422] ? icmpv6_push_pending_frames+0x470/0x470 [ 1001.501625] ? icmpv6_send+0xde/0x210 [ 1001.505435] icmpv6_send+0xde/0x210 [ 1001.509073] ip6_link_failure+0x26/0x4e0 [ 1001.513145] ? inet6_rtm_delroute+0x140/0x140 [ 1001.517653] ip6_tnl_xmit+0x474/0x3500 [ 1001.521558] ? orc_sort_cmp+0x140/0x140 [ 1001.525545] ? ip6_tnl_parm_from_user+0x4b0/0x4b0 [ 1001.530404] ? kasan_kmalloc+0x139/0x160 [ 1001.534475] ? map_id_range_down+0x1c4/0x340 [ 1001.538900] ? projid_m_show+0x220/0x220 [ 1001.542968] ? ipv6_ext_hdr+0x45/0x50 [ 1001.546774] ? ip6_tnl_pars