000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r7, 0xc0385720, &(0x7f0000000040)={0x0, {}, 0x6}) recvmsg$kcm(r6, &(0x7f0000000740)={&(0x7f0000000140)=@hci, 0x80, &(0x7f0000000680)=[{&(0x7f00000001c0)=""/45, 0x2d}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/226, 0xe2}, {&(0x7f0000000480)=""/162, 0xa2}, {&(0x7f0000000540)=""/78, 0x4e}, {&(0x7f00000005c0)=""/158, 0x9e}], 0x7, &(0x7f0000000700)=""/32, 0x20}, 0x0) 04:10:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000280)={{0x4, 0x0, 0x0, 0x0, 'syz1\x00'}}) 04:10:15 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x11f) 04:10:15 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 270.364332][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5d79, 0xa00) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000100)={0x7, 0x3, 0x4}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KDSETLED(r1, 0x4b32, 0xb08) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0xa6e334d03d274602) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:15 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x40) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)={0x1ff, 0x3, 0x80, 0x3, 0xfffffffffffffff8, 0x8001}) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) [ 270.562652][T14321] device nr0 entered promiscuous mode 04:10:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:15 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:15 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x40041) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) [ 270.610651][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:15 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x2d, 'io'}, {0x0, '\x00\x00\x00\x00'}]}, 0xa) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x6, 0x5, 0x9, 0x275, 0x89a, 0x2671, 0x1, {0x0, @in6={{0xa, 0x4e23, 0x180000000, @rand_addr="8193aa6d831681975d23a942520d1b36", 0xbb12}}, 0x8, 0x8, 0x6, 0x4, 0x7fff}}, &(0x7f0000000100)=0xb0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r2, 0x3}, 0x8) 04:10:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 270.886849][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x11f) 04:10:16 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 271.111562][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:16 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 271.233360][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 271.257044][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 271.321087][T14384] device nr0 entered promiscuous mode 04:10:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(0xffffffffffffffff, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair(0x5, 0x80000, 0x579d3476, &(0x7f0000000040)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x234, r5, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xae0}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff55d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff000000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9d3d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xac34}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0xd0, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x73}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x234}}, 0x20000000) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl(r0, 0x76, &(0x7f0000000500)="31e656a35ec245e8ffe99f3a3483a8608a5b4acc776c306d206b4c43f205f8d1940379ea13d67128c03b5870632b3266c64835ffa005edf5799c4bf9daed19d0144c816801f654ee8e2b0a1f46bfa8abf8dc5e560362056a4472965b272360d20cd3e5ea5f67d5229fb568bb6d12a873d1b5adfface2f470bcb15aecd61053fbcbe7512b49ba9e335890be4584f97c78abdcff9fc6938207768d3670b90abf786da91da6ef8f28bb") sendmsg$nl_netfilter(r6, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="ae7897eb75c63a47000000000000080000000000080815000000000008000800a479fd68f115429451de6f3406d162dec81972c5b1f897872fa248b46e7079ad1ce3e74225a138b87c0d63716f80ab16ee4ef02a51d4b6c22cd10e35441a3f06f8cecc5f23a8de4605cac00de812e129faef1ce889335cc3c4e33bc9c1491e7dea59fc7e771207c9eb483657c4f6f6beb2e898d255b97dd3b421df2163bbee5095f5b8fd5e31c36633df77c7988c6670b1d1cdd198714f1a941f6c"], 0x24}}, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:16 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000040)={0x3000, 0x8000}) ftruncate(r1, 0x1000000) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000080)=""/26) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000000)={0x2, 0x6}) 04:10:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:16 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="8903a1784901000001a0ffffffffc4578ad7026b00576558cd020093dd86dd00008848ba0800451fc40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551516248e07573977c5eff11680107fdf79d1af8f4e56309ac9733d41cc0ff11999dec3740f0853200000000000115a21971dd1feb6c2bf65905e863b7d342ed5293033159b87069ccc2c25b80a1de96ea6221dc9adca6c19c1a979d81f287627b3ac0fe5d5d644dc299c6e5b1bbae122dcae5c4d3470b7ee0b23c466a410c5d885662de4bcfd4d73c0da00789d086dc805524b1df92b3c21d6605f191bed951f20a1560f7adf0c24ee5cb2e8dc126d94c3c5c26c01b572745bf81fb8a9607b6186fc72259d4504dc75ab7c6b51"], 0x11f) 04:10:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(0xffffffffffffffff, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:16 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(0xffffffffffffffff, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 271.895341][T14414] device nr0 entered promiscuous mode 04:10:17 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:17 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x3b2, 0x102) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000140)={0x0, @aes256, 0x7b70b380c216350f, "b5b6e89281a744b7"}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x80800) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000240)={0xc00bb75713c0ac8, @bt={0x6, 0x6, 0x1, 0x3, 0x4, 0x8, 0x7, 0x7fffffff, 0x9, 0xf396, 0x0, 0x7ff, 0x5706, 0x3, 0x11, 0x18}}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r3 = dup2(r1, r2) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000100)='ppp0em0em1\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f0000000080)) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) 04:10:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:17 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0xc) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:17 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000100)={0x6, 0x0, [{0x7, 0x0, 0x6cce2b8d55db8016, 0x10001, 0x1f, 0x4, 0x2}, {0xf, 0x4, 0x1, 0x8, 0x2, 0x5, 0x5}, {0x0, 0x3, 0x4, 0x87, 0x1, 0xe124, 0x3}, {0x40000000, 0x8, 0x4, 0xfffffffffffffffe, 0x5, 0x0, 0x2}, {0x2, 0x2000000000000, 0x1, 0xda, 0x7, 0x3f, 0x6c5a39f2}, {0x40000000, 0x80000000, 0x7, 0x0, 0xb, 0x0, 0x1}, {0xa, 0x10000000000, 0x7, 0x7, 0xff, 0x3, 0x8}, {0x0, 0x61, 0x2, 0x4, 0xad, 0x5}, {0x0, 0x4e, 0x4, 0x3, 0x4, 0x0, 0x81}, {0x80000000, 0x6, 0x5, 0xab1f, 0x3, 0x2, 0xc261}]}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f00000001c0)) keyctl$update(0x2, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 04:10:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:17 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000040)={0x6, 0x424d96a4e17eb6e7, {0x1, 0x2, 0x5, 0x3, 0xfff}}) write$FUSE_WRITE(r2, &(0x7f0000000140)={0x18, 0x63b5a0d4b33fcabb, 0x5, {0x61f}}, 0x18) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x80}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r3, 0x3}, 0x8) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) 04:10:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:18 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x200100, 0x4) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040)=0x100000000, 0x4) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:18 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0xfffffffffffffffa, 0x4) memfd_create(&(0x7f0000000040)='\x00', 0x7) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:18 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') lsetxattr$security_capability(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='security.capability\x00', 0x0, 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:18 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000403010002000270fff8", 0xfffffffffffffea5}], 0x5, 0x0) 04:10:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2000, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0xfff, 0x4, 0xb000}, 0x4) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x6) 04:10:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, 0x0, 0x20008000) 04:10:18 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 273.933461][T14541] Unknown ioctl 44609 [ 273.938873][T14542] Unknown ioctl 44609 04:10:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, 0x0, 0x20008000) [ 274.170380][T14536] FAT-fs (loop3): bogus sectors per cluster 3 [ 274.182238][T14536] FAT-fs (loop3): Can't find a valid FAT filesystem [ 274.322067][T14536] FAT-fs (loop3): bogus sectors per cluster 3 [ 274.328376][T14536] FAT-fs (loop3): Can't find a valid FAT filesystem 04:10:19 executing program 4: socketpair$unix(0x1, 0x511ae164968c93ed, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:19 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, 0x0, 0x20008000) 04:10:19 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x400000000000072, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x8, &(0x7f0000000000), 0x4) 04:10:19 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r0, 0x101) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000000)={@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000040)={0x7}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000000c0)={0x1ff, 0xfff, 0x3, {0x3, @raw_data="67740f2e0ff5b29fcfac265191d414204b9c789fc4d3b1d69eb63069177bac4a32435c85844ddaea98dff7626379f9d6bf02dd74509233e1d66841f30ad400b9928fc6bfd25e4e7721bd0bdfd54ae73ffe09eb20c0ee623c2cf161d38e0171c512e5bcafc3dda34c53935df94d08bdc1b52d65ac15af5ea2cf2761721fe92359a77d6d8cf112e65680fba4703c2068a5b183dcbdae88df36f52dbc22cf2a79f70605c9cea368389adb98d6f3f7c9aab0dd3c92209315a18d49e8c96670994e020bbec2bdf257ae18"}}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000200)={{0x9, 0x0, 0x4, 0x4, '\x00', 0x3f}, 0x4, 0x2, 0x0, r1, 0x4, 0x6, 'syz0\x00', &(0x7f0000000080)=['\xcd&}:trustedself/em1vmnet0\x00', ',\x00', '/dev/vbi#\x00', '^trustedem0]\x00'], 0x33, [], [0x7fffffff, 0x2, 0x8001, 0x100000000]}) 04:10:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:19 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:19 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000040)={0x9, 0x81, [0x19cbe725, 0x100, 0x81, 0x9, 0xfffffffffffffffb], 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 04:10:19 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x1, 0x2) set_thread_area(&(0x7f00000001c0)={0xfffffffffffffffa, 0x100000, 0x400, 0x1, 0x5, 0x7, 0xfffffffffffffff8, 0x6c9c, 0x4, 0xad15}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x20000, 0x0) bind$isdn(r1, &(0x7f00000000c0)={0x22, 0xff, 0xc6, 0x10000, 0x3}, 0x6) arch_prctl$ARCH_SET_GS(0x1001, 0x6) r2 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x100000000, 0x10}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={r3, 0x80000001, 0x30, 0xa5, 0x1}, &(0x7f0000000200)=0x18) ftruncate(r2, 0x1000000) connect$nfc_llcp(r2, &(0x7f0000000000)={0x27, 0x0, 0x1, 0x6, 0x9, 0x80000000, "847825c4469d7ed2af4b2612c0160a39a6341297c97acad4eb3a4633dda167a946f7cd304169a1745d5ba780c6f39858c5a86e9a94a3f4270a5f3def846d3e", 0x18}, 0x60) sendfile(r0, r2, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 274.761010][ C1] net_ratelimit: 24 callbacks suppressed [ 274.761020][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r0, r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xb682, 0x2, 0x0, 0x800e00511) shutdown(r1, 0x0) 04:10:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:20 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r5 = socket$l2tp(0x18, 0x1, 0x1) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$l2tp(r5, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_udp_int(r4, 0x11, 0x65, &(0x7f0000000000)=0x4, 0x4) write$P9_RSYMLINK(r5, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4000, 0x0) fsync(r0) ioctl$VT_GETMODE(r7, 0x5601, &(0x7f0000000080)) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) [ 274.866151][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 275.010038][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 275.024368][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:20 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(0xffffffffffffffff, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 275.176335][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xb682, 0x2, 0x0, 0x800e00511) shutdown(r1, 0x0) 04:10:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x406, r0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xea5}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000400)={r3, 0x2}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x6, 0x7, 0x2, 0x2, 0xcc, 0x6, 0x8, {0x0, @in={{0x2, 0x4e23, @multicast1}}, 0xfff, 0x9, 0x400, 0x6, 0xfffffffffffffffb}}, &(0x7f0000000240)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000280)={r4, 0x1, 0xdb, "3e0ef7e2f9b6da19cbeb5f5d4fd4be5f3b47f30de487d3995804efa96f467c17f469a4629da7c0703834d89456c9fa31759506d734e8d62f1e6642c0157eb3ded8b4700659cf4ef8d7c589bb3e8a60fed54ab648c38410de1db7fc53b83b4a4499dbdca0787c7b232a075f01a39a3ef6148577893521212bcb9c3452eb1594ca5b70de5116c7c88716f886084755274e0131976e9ed09d76c2f21aa2679e397b8a9ead019d7a40a9db08fe5b4ac35148a0b07c770644382bad2bf52d5849ec3a321e80da0ef6e3386fd3dd384419ac8af16be9e603dd1d7b97595f"}, 0xe3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20002, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xa3c1925d3f269489) getsockopt$inet_sctp_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000100)={r8, 0x6}, &(0x7f0000000140)=0x8) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) [ 275.297333][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:20 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) recvfrom$unix(r0, &(0x7f0000000000)=""/98, 0x62, 0x1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) 04:10:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:20 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(0xffffffffffffffff, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:20 executing program 3: shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/136, 0x88}], 0x1) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005b9) shutdown(r2, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000900)=""/146, 0x92}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r3, 0x0) 04:10:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000280)={0x0, 0x1b, "59603566dd5794ce84fee7977e1f3c794d9087d09f6b369a5b1514"}, &(0x7f00000002c0)=0x23) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000380)={r1, 0x74, &(0x7f0000000300)=[@in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x10}}, @in6={0xa, 0x4e22, 0x7, @remote, 0x9}, @in6={0xa, 0x4e21, 0x42a, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}, @in6={0xa, 0x4e23, 0x7, @mcast2, 0xfffffffffffffbff}]}, &(0x7f00000003c0)=0x10) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x100, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000001c0)=0x6, &(0x7f0000000200)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = fcntl$dupfd(r4, 0x406, r5) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="610000009081b42add45da9d9838fe5baec2be7e38485e98903f31baf1c93f39e93abe94d5bba39e9720ec90500e98f0b6f3eec4ea5292de830dfb93e801ce4a65f4e0b33c56dba93f74aafe84ce0ba17a0cc46263871f3054014c5f47a6786de63c675d92e1d63454d41e770e6df0427c269cd7775fea9b0c657df1756d54e156d695d1bdc4eb3433a5f0366c1741164e781cea8cc4e09e750e6fff84dfc36fa5e7858733f5537ef2ac43af5e7711"], &(0x7f0000000080)=0x69) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r7, 0xffff, 0x7}, &(0x7f0000000140)=0xc) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) 04:10:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 275.630266][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 275.633333][T14654] QAT: Invalid ioctl [ 275.650203][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:20 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(0xffffffffffffffff, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 275.738670][T14664] QAT: Invalid ioctl 04:10:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000000)='./file0\x00', 0x400, 0x100) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) [ 275.784960][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000340)=""/199, 0xc7}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00790) shutdown(r0, 0x0) r2 = dup(r1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x8, 0x0, 0x0, 0x800e0054d) shutdown(r2, 0x0) 04:10:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 275.864890][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:21 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000000c0)=0x8, &(0x7f0000000100)=0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) getpeername$ax25(r0, &(0x7f0000000000)={{0x3, @default}, [@default, @default, @bcast, @default, @remote, @netrom, @remote, @rose]}, &(0x7f0000000080)=0x48) 04:10:21 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:21 executing program 4: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="c8e24610df3126378c245e813225f55acc98065b3f6f256074a8876d", 0x1c, 0x3f}], 0x20022, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 04:10:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/144, 0x90}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xc8f4, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup2(r1, r2) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) recvfrom$inet(r3, 0x0, 0xb682, 0x2, 0x0, 0x800e00511) shutdown(r2, 0x0) 04:10:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 04:10:21 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/191, 0xbf}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00790) shutdown(r0, 0x0) r2 = dup(r1) fcntl$lock(r1, 0xf, 0x0) recvfrom$inet(r1, 0x0, 0x8, 0x0, 0x0, 0x800e0054d) shutdown(r2, 0x0) 04:10:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x100) 04:10:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:22 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) socket$isdn_base(0x22, 0x3, 0x0) sendfile(r0, r1, 0x0, 0x4) r2 = msgget$private(0x0, 0x201) msgrcv(r2, &(0x7f0000000040)={0x0, ""/58}, 0x42, 0x3, 0x259c018b491c2824) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:10:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 04:10:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:22 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 04:10:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:22 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x50000}]}) r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) 04:10:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:22 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000880)=@assoc_value={0x0, 0x80000001}, &(0x7f00000008c0)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000900)={r1, @in6={{0xa, 0x4e21, 0x1, @loopback, 0x9}}}, 0x84) r2 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r0, 0x4) sendfile(r0, r2, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) getresuid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) r7 = geteuid() syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="822ab43fe76409ce199b3f5d22d5a9fabd5fd04142a1c4e66b55f506a2b4c933fbc213481c5a341d96dd23fc1ce91d8af61b2fcbe7e82b98c0ddfd1456c2c7bc8cdf0575b09c7566a8e7e7f19cb216a976497ef36ded4dbab09ecbddb7545cb3054a6de811bed971711f73a2acb0f9ae3f5aa6d3bf376130be03307ae92b38384a66b57b66f817c50281d7595aa147bff78f5e38f96d0d025b8fdd11bc390bce2355de6731de", 0xa6, 0x8001}, {&(0x7f0000000140)="0e59a28bde0fd18f369a93ed52adbed95f688ff837bd1e5a3f580d3a12b5c13850810c78bb1e4c7c18fa5b9f624cc44cb5c0d391c818c59c93f74f1315fa8a2d2d66211c9a5980b2b4e165d25aaf56f4ba0a38aed715bb8d64b50eafc4b553b20341208879005f8ef51dba9b95056e60be7bb3", 0x73, 0x2}, {&(0x7f0000000200)="03cf9020237a3f5ac07ba474c399a1bcaff36e028f9c42d5de199207e16c61fa94e31b3db35d290a5b2d1b7c73f64de814b30e83c5d728f25a", 0x39, 0xf52}], 0x102020, &(0x7f0000000700)={[{@uid={'uid', 0x3d, r3}}, {@case_sensitive_no='case_sensitive=no'}, {@gid={'gid', 0x3d, r4}}, {@errors_remount='errors=remount-ro'}, {@errors_recover='errors=recover'}], [{@obj_role={'obj_role', 0x3d, '#cpuset'}}, {@subj_user={'subj_user', 0x3d, '/dev/vbi#\x00'}}, {@dont_measure='dont_measure'}, {@uid_gt={'uid>', r5}}, {@euid_gt={'euid>', r6}}, {@euid_gt={'euid>', r7}}]}) add_key(&(0x7f0000000800)='logon\x00', &(0x7f0000000840)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) 04:10:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendmmsg(r1, &(0x7f0000001e40), 0x330fd9699cd19a7, 0x9fc) 04:10:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:22 executing program 0: mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001300)=[{&(0x7f0000000000)=""/36, 0x24}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xc8f4, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup2(r1, r2) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x1f, 0x0, 0x0) recvfrom$inet(r3, 0x0, 0xfd37, 0x0, 0x0, 0x800e00511) shutdown(r2, 0x0) 04:10:23 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$cgroup_subtree(r1, &(0x7f0000000000), 0x0) 04:10:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, 0x0, 0x20008000) 04:10:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000000)={0x8, {{0x2, 0x4e23, @multicast2}}}, 0x88) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4000000000002) r3 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x0, 0x20200) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x100, 0x70bd2d, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x1) 04:10:23 executing program 0: mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, 0x0, 0x20008000) 04:10:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000040)='syz0\x00', 0x1ff) 04:10:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000)={0x1f}, 0x10) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/37, 0x25}, {0x0}, {0x0}], 0x3) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x100000206, 0x0, 0x0, 0x800e006dd) shutdown(r1, 0x0) ppoll(&(0x7f0000000180)=[{r0}, {r1}], 0x2, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 04:10:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/136, 0x88}], 0x1) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005b9) shutdown(r2, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000900)=""/146, 0x92}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r3, 0x0) 04:10:23 executing program 0: mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, 0x0, 0x20008000) 04:10:23 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:24 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000000)) 04:10:24 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:24 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000002c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x10, 0x0, &(0x7f0000000000)=[@acquire, @acquire], 0x0, 0x0, 0x0}) 04:10:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:24 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f00000000c0), 0x3bb1) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0x0, 0x4000000000000004}) 04:10:24 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x8955, &(0x7f0000000000)=0x2) sendfile(r1, r0, 0x0, 0x80000000) 04:10:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x840126f1597dfa6) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x7c24, 0x4) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x73f, 0x6200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x67f2bf93f069fdba, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x2, 0x1, 0x23, 0x8001}) 04:10:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:24 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:24 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000000)='/dev/vbi#\x00', 0x2) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000000c0)=""/136) ftruncate(r1, 0x200000000000008) sendfile(r0, r1, 0x0, 0xeefffdef) 04:10:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0}, &(0x7f00000006c0)=0xc) sched_setaffinity(r2, 0x8, &(0x7f0000000700)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x39f000, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000001c0)={@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, {&(0x7f0000000100)=""/177, 0xb1}, &(0x7f0000000040), 0x4}, 0xa0) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r4, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100040}, 0xc, &(0x7f0000000580)={&(0x7f00000002c0)={0x298, r6, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffe00}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe39}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8eb1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}]}, 0x298}, 0x1, 0x0, 0x0, 0x4}, 0x4000) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000600), &(0x7f0000000640)=0x4) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000780)={'team0\x00', &(0x7f0000000740)=@ethtool_sfeatures={0x3b, 0x4, [{0xfffffffffffff8bc, 0x4}, {0xfffffffffffffffd, 0x4}, {0x20, 0x5}, {0x1, 0x7cb}]}}) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) 04:10:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'ip\x8ei0\x00\x00@\x00', 0xc205}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x8000000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8955, &(0x7f0000000000)=0x2) sendfile(r2, r1, 0x0, 0x80000000) 04:10:24 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:24 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x50000}]}) r0 = syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) [ 279.899913][ C1] net_ratelimit: 17 callbacks suppressed [ 279.899922][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:25 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:25 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x1) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2d70696473202d70696473206d61201e696f20"], 0x1c) 04:10:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x10001, 0x14002) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000100)={0x2, 0x0, @pic={0x9, 0xffffffff, 0x77, 0x71d, 0x9, 0x0, 0xcc, 0x159, 0x5, 0x0, 0x8, 0x80, 0x6, 0xffffffff, 0x7, 0x4}}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) capget(&(0x7f0000000080)={0x20080522, r3}, &(0x7f0000000200)={0x6, 0x0, 0x5fa, 0x7, 0xa1, 0x8}) [ 280.116851][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:25 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x50000}]}) r0 = accept(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) 04:10:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 04:10:25 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:25 executing program 2: [ 280.257529][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x40, 0x8000) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup2(r1, r0) ioctl$SNDRV_TIMER_IOCTL_START(r5, 0x54a0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) write$binfmt_elf32(r5, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x7, 0x0, 0x6eeb, 0x6, 0x3, 0x3, 0x53, 0x3a7, 0x38, 0x3, 0x4, 0x6, 0x20, 0x1, 0x8001, 0x0, 0x7}, [{0x60000000, 0x2, 0x7, 0x100, 0x400, 0xfffffffffffffffd, 0x5be, 0x4}, {0x5, 0x7, 0x0, 0x1000, 0x8, 0x3ff, 0x2, 0x200}], "c492c9811c3f7a64e88695e297b9775e2cb8abe100aa934646b9c93ef3cd30c77c66843def4216981394a0a89cf4fd9006e0020e09c4e076e2ef66908b984257dca32f1e7cc94b3dfb29e2ba3d5b43c781773f830a4e3683c7114c8c59d6efee5d0b20accb9ca50d54b8b796434d3cbce950ddedec28e7418c51e3cf5db1ca121ea46b6cf871", [[], [], [], [], [], [], [], []]}, 0x8fe) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a00), 0x1, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) 04:10:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 04:10:25 executing program 2: 04:10:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000000)='mountinfo\x00') openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x111000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f00000001c0)={0xfe9, 0x7, 0x3, 0x10000, 0x2, 0x7ff}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000100)=""/155) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) 04:10:25 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 280.475898][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:25 executing program 2: socket(0x0, 0x0, 0x0) clone(0x20000007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000000)=[{0x30}, {0x6}]}) 04:10:26 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@gettaction={0xf8, 0x32, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x7f}}, {0x10, 0x7, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x18, 0x4, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0xc81}}, @action_gd=@TCA_ACT_TAB={0x6c, 0x1, [{0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x15}}, {0x10, 0x15, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x14, 0x1b, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x14, 0x11, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x80000000}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}]}, 0xf8}, 0x1, 0x0, 0x0, 0xb1eeef84466cf146}, 0x20000800) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r2, r1, 0x0, 0x7fff) write$cgroup_subtree(r1, &(0x7f0000000000), 0x0) 04:10:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 04:10:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000002300)={0x0, 0x0, 0x0}, 0x0) 04:10:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}, 0x8, 0x1ff, 0xcce5, 0x7}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000140)={r3, 0x9, "3dfe57cf0c450feb80"}, &(0x7f0000000180)=0x11) 04:10:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x60a0895aef7f25d7, 0x101, 0x65, 0x4, 0x18, r1, 0xfffffffffffffff9, [], 0x0, r2, 0x4}, 0x3c) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) close(r4) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x50000, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00\xba\x9d\xf5yC\x8a', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x2, 0x417, 0x0, 0x1, 0x81, [], 0x0, r5}, 0xfffffffffffffcb8) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x2, 0x5, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000300)='\x00'}, 0x30) close(r4) [ 280.947469][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x20040002}) 04:10:26 executing program 3: 04:10:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:26 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1040000) sendfile(r0, 0xffffffffffffffff, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001200)={0x0, @broadcast, @loopback}, &(0x7f0000001240)=0xc) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r4 = add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="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", 0x1000, 0xfffffffffffffffd) keyctl$read(0xb, r4, &(0x7f0000001140)=""/185, 0xb9) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2000) 04:10:26 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(0xfffffffffffffffe, 0x12) ftruncate(r1, 0x1000000) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x0, 0x8, 0x100, 0x1, 0x7c3a}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x4002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:26 executing program 3: 04:10:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:26 executing program 5: 04:10:26 executing program 3: 04:10:26 executing program 5: 04:10:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x60a0895aef7f25d7, 0x101, 0x65, 0x4, 0x18, r1, 0xfffffffffffffff9, [], 0x0, r2, 0x4}, 0x3c) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r3) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) close(r4) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x50000, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00\xba\x9d\xf5yC\x8a', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x2, 0x417, 0x0, 0x1, 0x81, [], 0x0, r5}, 0xfffffffffffffcb8) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x2, 0x5, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000300)='\x00'}, 0x30) close(r4) 04:10:26 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=""/91, 0x5b, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r0, 0x10, &(0x7f0000000200)={&(0x7f0000000000)=""/170, 0xaa, r2}}, 0x10) 04:10:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:26 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001d80)={0xffffffffffffffff, 0xffffffffffffffff}) unshare(0x10030000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$cec(&(0x7f0000001780)='/dev/cec#\x00', 0x1, 0x2) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000001dc0)=0x9) accept4$bt_l2cap(r3, &(0x7f0000001bc0), &(0x7f0000001d40)=0xe, 0x800) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = socket$vsock_dgram(0x28, 0x2, 0x0) sendmmsg$sock(r4, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)="a33c0c99d313280f78bee5d2c8e832762c6520334c9e77dadf289a8d527e5c596d62e322604c895fcc9860038a6d89340c84c095b4b871c78ed472fb12790059f6854ab8cf7c058107db17dc9f4b09029d742566bd4ef8c028043f4947b9bd791001707acace054d91b15dc0973d11d9a43db8b0e28f5475d354d24a5c1e412b41cd064f2efa393bdf798ad5a2a79b9b347344c3347ec596055e918acf36a2", 0x9f}, {&(0x7f0000000100)="03532769793174d232a4101fc07d29e9427061c0db7c8e20a2a9d3ded54abc3a23c5c4dabae868b776ae2b38c67ebcb393198477cabe71bf2037df1b60af49e0bf7128a3c54e2a107a2d6e5e9c8a9a607762", 0x52}, {&(0x7f0000000180)="af062807561cc254816ef49264b7d34c94d235abb9c15a594794b300ce2f2bfbf542aa000f893ef9803a617d6340c9a861b1dac162120682b90cc6f9e6bb979f38841030b88f516f65c9a4b747e3adc76366e03839d72e184bfa5137a42714bfaa2a52e548c4197c373661ff5ad8e18315c8b03ee31ff5185db5443280af581c682fd62c47ef48e5c68099d354f11fc9960ec93dd2b6a4ed42e870b7deed5d3dfb9c707278847d9f3b2425efde132e21dc195468dd362126bb30824acd47cab6cef4ef0bea24", 0xc6}], 0x3, &(0x7f00000002c0)=[@txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0xfff}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x2ea6eedc}}], 0xd8}}, {{&(0x7f00000003c0)=@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000440)="99d0625e8231dbac83dde0975b1e9809118c5aead0d19b1e3520406b64ee2ec93839b039f5bd922716069432b7d30600908877aaa3166c23be3907f9475ab9f9ca7083b40f49d369f3b1bc97524a217c1bcebb8706ea0ab8502337691024ad30f690a89d57954bf94fbc623e623e91617b4f85bf996693cd38b7e9008fdab6b4797cf24b412f880d62e7576a81c54f4bb6fde4c73329865af3de45d6b44d12c48e7f3caf4a8cac2c0cee49e0589daf96f39b37bda0fd149c4d18488052b0a32736919e36227c61925bb0d0562a6699f5f75392c17854aaaedc3161b5df264cd400c51b95552f01d3f1d7465ce7003a0de8812f835ab13d13dfd60ad1c0c566f1d4e46da8c223b2d88f8e47a5dd20faa4f4e38c9d8247f5b5666c46980e094ad0cf90490e7eea5512e8f392008c9bce492ae78290f966e536ed6431a4ace442649d1b22d82105df4aea6d402f009d767b4d4cde77467300a7b58883f1420c0b7cd662626f88d41a36b34665e2691fadec2a76ca091abbd515a1b16d3cffc45197e3355c4bb97f222b6c713cf930476a0824df469602881236d4c64d38a3ba9d7d6402f735ffd8509a199d0998bcfc112c40c5b69dafa5648eb022b7fa1f3bbca5af51517bf021ac6db8b5471eac99a0eb0dfd123709766d815cf1bf9993fc1d3de3393c0379564208ecd8ced22858aac9733cea418433432ff4cdf09ac4c4365c34a3b1b2cd27f907c9aecaf9ddaae91feacc4e3827c429edd490e664e2b4d722f5e855911936eaeb38a3c097423a6f74b8f1a1b5dad2159753e749086b63e14f225b3fe1a7a3cc8accecf251fb7df8a9a85c9bd5293ab8f10370a9b756c6bd0f4cb0aa61a9221f84849520df10db161d08304d334123f34f57f4b1c9d198e9e525daafbfc6ade2eb1b36e3251006c5e2205be0ff6226a3e165736a8353ea413479a79355dfd5f106e7905da082c537b84b2089fe200990a1bd510619bc6a2d07bce8620e33fa9fb44b12601939b09d38f43411eae283eee525a1b6d6f9634e1968ff4853679284d068b35c405fe248d33bc7016f2cffb135e731af821f3a1c3949afeb35cd30604f1e3eae4938745a2af76b6152afe2c34620112e1daa80d220b0890370b48957849da4e710cb7ba9ce7588aacee6c4e5c61d9a589fbd8e0f703ad386f7e4dca5066f99433008a670c9d052de9993e4b6ac60d6bdb316626ecc8d15045ef9dc1247804b1686d7516bb1f3d94d2ca89ed886f0cb2d2ee95aace5ad523ecc1d9736dc42eaf43d659fe213cda86ba826ace4cf504cda8f0a526b62fe4333020442708d4ea6a36b21ca668f80571fdac8e07ca68f6b82a0ac8e410d1bae9012d33a4044e7233370396a57577e87f27dc9080f4066b84f60de8a47816e5080ca6905af5a57629be71e636b72f8ae954adc7ac85896b6ec00fbfc60add533fc00487d9acad2f1c96b7f30665cfeff4d9adb32bf1172d539cd84f51a097b48e751735c4f7cfc6730dab64a6be01dc3c10de7220bb3765d3e7a0de8b88c08b18b232528ccd19eeb6c81f8685882ac25150b2a270b9ad4603407f43f02a56d8204abc18ceb805a2bd09b5e00815999db4e2c2222c9e7d866aff83aae73619a496a6663928a1029b1626f6958cf64d74e07199e332e89c38cf260a146ee046e0c89124bf237b0bb439ed50d03fb13be9a185d3cbd3474fdf75ef932dedab23f2bb9c8fce865013caf4a927bc2ab4a3e68e1d136c68a973898ed040923507d322d47b92babf42a774ade5f66a36c67dc4e50e2f00ce614cec2e6efd15f98e41a8b03751fce81afe9f3576fc532b4abcd5f311c0ad81e581bd90b86d6ad382345610d80957ae60a24d2ef727d212e0e3e8c32c9d56142751eb23e2a3d0463d4df6617289f6bf27467d39d9e5d55bcf3530a21b723d65db3034e6e8cbb14a1a132985be23c8b7729d882a96d7c4f6afa10ced4b38e85d30c9289497a1b302131e29c4c02b679a7678cbf777b73e47de9e94517502a4859a7ab825120fe78c809385e45ebf544399e2307bcfb071210bf564da61df6029f988779f6b4377ccf8928c3f811394f05b5bf137e354a9d90cd8b8d576167d46f55cd6add33ed28a8589c7d35fe686ca3cc812dd652a4eb371d259ed66d660f7b457752dae9b1d1066baa10505425619a35bb712d07b938ef183c3965cc569c74101a6c9304fd0640cf595d7105574a1c057b4f4a44f12d05b6aa38dfd689a4bb4dc37332cdfcc5a39d5fbe579ccf84bc99d7ba995c8da9775c8275b0f3a267c4882b53d3989abd039227500a6934bda130a5cdb9edbd2271a0a180323614fb9de9fe114f2e629659e542f81f480fde02cf73c364ffc587113ff4a3a93324c12d1ec4cb3a84632c70869b74693d79f71af7931704498857fb742f4d69701201de0dff570fb13b09b77d415bf967a9e282fac4571554b4b8d6696577f01a340236dd1b6f0cb9e4befe2b16f6f3bbf3f1e4990730da478bbc8d80a7a397d33297f56758748e779993f0a52aafb022609dc037891527e7ecade5c505c36d8d1259d5982d196b60e694ea2e43f50261b5bb9db1c065ff0fc7a8507f383b2fa7cbe1e2559e6854536841aa37e4f2f10a827ecf3297a1d39971692c7febb0a148a8b5998b5bbda96abc258d91e786ead0c12416ae7b82c398cb4f69d0f1586d15425315bc0ab054909af545b702af00c7b1fb05c1bbed83cd5090a5987275c1f4a952532081b1eda104285cf0a50bcc499f173694f1616a97d92020c491bc2c8c13d6ab1e4601a4bf5d2af92d0c8a30a5fc8a2ab790a9c48b00a504c74b160e87ed7cee15830dd23185d6eab906b179a694dc69c39d92ea7f9d62a7e7702e471e034c99901c5850d9c054c6c6deec8f8c186b36186e1570958aa95247f3d1cca724ff3547b07fca5f64bc360e88fdd5a6dc170e94acab4fb6fd766276bb9b56693624116a1b9e99ec376f01edfd6e3a97136fae638275bbf83e9f5fd0d5ba5f571afdc34684728a856b78d4d78f3c05c7a942eb54fd89c563a2ab3ec9ca4d52416c3635311a0f86c19f0c1fc22e635dc5605f58910c54f545bd9fabf0efe1868a6c6c49c934eebb8092f32d0556ca11917866eb2adb1a0e7b4a7b84de6555ff6fb0649f61e7c4fa0455ddb247159c26614ab40750ecffef61e2cfcb9bad3fc144a1997329c8e0d727215a8b46bf6a5e1e65ef4b62d8e70c97b99615df5db0e59e68c1fb2d8fd7174eab0ee9435cda6cc0161e442da720a1d930bbc9f514485da18ef67935707dc6ab9e412694a2ec38768aa7f9f99fc5d47f183a259b8579170aa913f42a04b8653475fca2796daf564a5a1bbd189af6e524a8c4f0a89094416c2e09d607d811ec548b2f458a8086dcc0f5da344c5cac597732503dd99bfdca17207eda186d68e9abf78dda82beccae07fd0ae8f5971a1e4d69ef8c58fe5d0b29a642b4f7fa60a75d8668d78fe2e1eb08083c9fe06a08882deabf7319b5f812ba4712f147e88485cba1d80c6c645025c193c7121be3ab5dc654beada4a083b169b46071110041908a562886cd4aae077240a75a2f174cad28b8c7f2febc815f0870b910cc14c68911c01587baeb29f985b69f55ec8ff96ff16fcbd37a0088677f97c13c8a2f4cdffe032ae8d68044ee592bb8ad09de3408c751a20972aab07326f379bc7d0771f75a5503f32c4dff1face612d791bdef3702961ce413a7b4ce5a97f4abd970ebcfa5796e8bce951f215ad76521441c48a677fede76385b4d2e00bf2b22e5cc260cbe33685ec6d670a4a62e2f1387c4bc1fe7225904961e1535e42c0e750393300655bd6bdd89c638f51f9955a6376cb659e6fce639ad4a42390506cc832352f58df3a5bf960356babfbcfd3266eed0ade82777e0a1d7b9b69192f7c8f82d2a6a6cfcd37381dc07fd4811c80df27d66f6864d2a021876aed03874df89708f1dd3cd401be6cc49c8ce13d86f5ce3ebe72241d48c44f3ec10ea98a9e955003db18afec4ce2112e81626e9b1349e12298a1eadc1cdcec5961542898ff29fe276e9b65c2a21dce9c9dd09cfd9153edc94641408b0f06ae251dc329d886de2406669d43ee311806040ed1375e479dc2153f911c4006042649f16f2c1af50519a92c2e3f445b82572192594c3b8a8b925c1aba0a525f95904e33fee7b4db92359183f29f094e3c4d37146756090ffea2610f97955ae1aad146d1e08a424286f5c7e48590be4164270ba3426022ee03b19dfd0ac6dbf43e398320020d1e03ad84bd357ba59e0b5516260a468be8f9ddfbd904749b7d6ec60cc7f3a1227ef537d04ecde0d530db60292fb579ad841b07e6adb97a600b7ff8e008141da885aea61a3cc6f6ceee3ac99b1573d36ab2c70fc71e4e80e5053827bc5b36cc8909d12a6af136a1aa904e9549c0f441db5ca374dcef9c397de14f114daa64a3c123f92250bf05bee25c8c57825cd7ad5b75427c3cfd060d9c5adafe4fb60c954930ca6b567509fd910c82a4918e4e3054ced68fe5a79c7cbab46e8c1971cca98bab63264362c33a2fafa28ed8551e25f9a626090b51707772c87b1c8d77a2614cff784abc497fbc91fce1da67ba98d3f627c894ab479c7efd009c28c7acb076227c2590221e506dc6ba028a2a96fa3a4c7ff0f4e5f109076a17b3abae88176da4deb9d12e351c04e9f7441c9e992b72f32c144fab570a337f450f3efafdd3e91a0df0e33a2bdd02599a6769691563b0197868c504f737a589465c34e706a0ecfc8a3f469299c4e550b24c70458cdb0b4da59aa04241509f168d40702ca4be07d919453a7dceccc90d7fafabe5da3755d15819b7610f2139dc2b20db86535b8137fa0a92801805a5f9d93cfc2cd1286b206c8aab9dff26f4d9bde97f0e02e266d943f8d4a75442f23f5cc23d18a74269972cff50ef99b403c52eb650b3e628380e80844a0f71eec455b3d081108c58e9bf948d3a6febea9c0c980118145929c4fefb3cd24dc775cbc34882e34a69f5fcb1bcf7b7ec4cc86ab0164fa2c85e95e1ef1802369669e39810a85400d2c2ef6d66a4dd5c422ddca15fdba215637089a5c535a30a079fec9ae1c0a9264aae30340c0801a271272693ee4dd890fc892770de2d15ed824a72dd33849b626af15d3cd5e6583b2fa71e5052bf784938392e0d8a32ed6aef103235dfe1fd69afe22e5b9bf4113bd827492cd48d688fa3f9f7efdb8ffe33f42805e01806f4bbf10a26b643ff09c1b0ce98fabb2200f947539da1750186f5acc490d185185323300244bdb37cb8c5b4338db0e37e7e0fe78d5b139d904f501fe5489650517638ad9b8383bd410cc137057f7b2f30a220371d11922a7a0fe3bf69d97ba88f4c929662997e83d57b2289da34207021c49c65170381a824d34b2abf76f81a62a51807e6849f9805211d8816e166608bc4d18885243c6ceeff8995b1ea6e9e31a609dffc548fdd8dda5e51940ed99b8de970d30b1452b021a833b0c184fd4df0d7f337f6b363e0df120bde8b51ecf4f72039fa725ef20b8fb776603babf847a6dc16e263ac21299e7288c1f953a18adf20f85773cb38698cd74b57b53992b73bf6c1a517ba01583445033b2bcd9f26643bdbc2a1f713407345ac6b75a3f9bcf7924686226edb470fb1d9470d63a75ec5987fd7ee0a2dd708b73684710c9b30832a53ea1ed33c6bb757b06f312f14c1713d0c8c091ccb7db7e38cd94cbb69546c2cdef15f78420eb5259de2d66ea33981fe4a9588c962c27caa1276dcdc638d425eed43b78", 0x1000}, {&(0x7f0000001440)="775c2d4eeb34c26c0c358fe301e83102c4f308f76db471a310cd56dd17ee3d0ea295f65705de7069f49ca5309c1437b0a601815d76fd2121e7133dad8f7c61fb7e99480892c45039d93a051ddd8928bf305b875c223629548f7f2fcd9dfc5a6d8ec09a44cecfbc3e9bc3f876c196166dca88a18be84356224057b9687b7c7307b3f48728e4917e08fdcf35adc98983e7e21c75dae090113c1d6a6dd1fdedd09a8ae654379c606a92540ca7fa42ff91e346aa0f9793333994c3f3861f6499621e8349f5dcd9dd1289912de5dd1febebc59eb4be87521372bb62d2e16b2cf50ba8789944b7237668b65557", 0xea}, {&(0x7f0000001540)="0fd4395aac26283a7e3cb8cb53e4cea368cef8b425e56049dbfe1fb52366a9ecb1e2b0df795b82d75039dad0970e481b3cbd41ced7645fef1fa77cc6143e28f73995de0ddd8c93efbf6664331e02cec785518e62cf9e249f7eff3e6bad65ade6aaffaf2f31444077136b7b8a5ab86d66d70a7bd009dcf572883ee5a2a708821163cb4966271cb8ebb8b3d79e39c3bdbebe6ff312b0a2e27882fb35ba4e876aaea77f8d8aef00a077b9708b88304fa0e4079674079f042af8b0df8440bc1193c11ea6cc12f1ea0ef720dad754c232e2bd5598780bd3c9a4d1abe02ca4486bc2d3ea312f9339c449750551d2f6ac7e617e", 0xf0}, {&(0x7f0000001640)="16d1677b604579b6791ffc01dd60fd3f023e519ff6be46e2dabeb96916a57fcf56ee1cfc62af6b9540c9d2c47180d859", 0x30}, {&(0x7f0000001680)="f52afce431c5f3c554ddb26c572be66c6d7324684caa9957a014d2183b7a9b6b2f1684656a49b52a36ac1725e737ec0af27e22588648dd768f65f4ad1c308a3c6cebd753252c40e8ddb79294770b5d7f2f74398078b01a3dba5598d9ce6ed8004aaae32c4fb2f8851f704e726e", 0x6d}, {&(0x7f0000001700)="21965b22a87343695fd2f66e15f4930d19df9aa3e248f8fc17e710a2fe26d2f79365c8f34ac68d4e2d2a0cc6c7d08efc266022056e04708aae901b8c348cac36b8deb45e769b4c39f479d3c26301ac5eb1e827ce21835db1e63f46f1e5241a61a8daf40e4ea12b5947ea011c514c8bab480b72829720e7f0faeeadfa882656", 0x7f}, {&(0x7f0000001780)}, {&(0x7f00000017c0)="ef82b9fc68a888c5796686b02f9c442e89c6e8365ed39f5ca260f947d33c85755eaad0e43fc8780a0bea6dbf80e6dfcb1e8c048395207b91d5be538fa57f3abbc18bde1b45815080945e144471bada24da2dac1af833ec614215ea8647eaf7084992e9d48f994273f066df5780ad13500fbf6258f712daa7a6d238ef6a515ff263f0207c58062c804b6cf06ee0fdc055c6761231e52484d1e593", 0x9a}], 0x8, &(0x7f0000001900)=[@mark={{0x14, 0x1, 0x24, 0x94}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}], 0x48}}, {{&(0x7f0000001980)=@vsock={0x28, 0x0, 0x2710, @reserved}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001a00)="846eaf9e07a7160cf39b125b65f25ca8652171918bfdaf5e0af8b2e8c6d414a38ed734e45d89700ac8608dbed47cd425bbd8624b7f967ff1cc3d4f817623f151b5a4f8eaf6c253317ab11894790c7910656e0eda39a55d2265765101219499420b575b10c8e877f488bb218f03329566aa6f4c240e7b22dc0c4f19aff88fdc7265ce05fa9c59ea1b8de2e493607dd0265e494eeb6115797bf5f5c0c450a76fb05a76f4dd501bedacf11d9bd08c", 0xad}], 0x1, &(0x7f0000001b00)=[@mark={{0x14, 0x1, 0x24, 0x78691197}}, @timestamping={{0x14, 0x1, 0x25, 0x200}}], 0x30}}, {{&(0x7f0000001b40)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ni\x00'}, 0x80, &(0x7f0000001bc0), 0x0, &(0x7f0000001c00)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}], 0x18}}], 0x4, 0x8080) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:26 executing program 3: 04:10:26 executing program 5: 04:10:26 executing program 3: 04:10:26 executing program 5: 04:10:27 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)=0x3) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = socket(0x2, 0x800, 0x1f) ioctl$IMCLEAR_L2(r4, 0x80044946, &(0x7f0000000080)=0x6) getsockopt$inet_mreqsrc(r4, 0x0, 0x2f, &(0x7f0000000140)={@dev, @dev, @remote}, &(0x7f0000000180)=0xc) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0x3d, 0x7, 0x0, "f29716de4913652241f7f4f47f2a324b", "dac7021375284df70f84635a72b0a77b24f6503500451a87bb71408791bc40db157b8fde1b87d446"}, 0x3d, 0x1) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:27 executing program 5: 04:10:27 executing program 3: 04:10:27 executing program 2: 04:10:27 executing program 5: 04:10:27 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:27 executing program 3: 04:10:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$pptp(0x18, 0x1, 0x2) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x3, 0x70, 0x20, 0x400, 0x8, 0x0, 0x0, 0x6, 0x80108, 0xc, 0x6, 0x10001, 0x8, 0xfff, 0x2800000, 0x4, 0x1, 0x379a, 0x80000001, 0xffffffffffffff16, 0xdc, 0x401, 0x3, 0x0, 0x80000001, 0x2b, 0x7263312a, 0x8, 0x3f, 0x1000, 0x7fffffff, 0xffffffffffffffff, 0x89c1, 0x4, 0x400, 0x40, 0x8000, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x7, 0x9b0e}, 0x2, 0x5, 0x2513, 0x6, 0x2, 0x7fff, 0x5}) socket$nl_route(0x10, 0x3, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000100)={0x14, 0x49, 0x1, {0x8, 0x0, 0x4}}, 0x14) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x200, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0x0, 0x5, {0x106, 0x0, 0x7, 0x8}}, 0xfffffffffffffe17) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000140)=0xffffffffffffa139, 0x4) 04:10:27 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:27 executing program 5: 04:10:27 executing program 3: 04:10:27 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:27 executing program 2: 04:10:28 executing program 3: 04:10:28 executing program 5: 04:10:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x408200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:28 executing program 2: 04:10:28 executing program 5: 04:10:28 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:28 executing program 3: 04:10:28 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x2d, 'io'}, {0x2d, 'io'}, {0x2d, 'cpu'}, {0x2d, 'io'}, {0x2b, 'memory'}]}, 0x19) 04:10:28 executing program 2: 04:10:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) io_setup(0x3, &(0x7f0000000000)=0x0) io_getevents(r3, 0x2, 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f0000000080)) 04:10:28 executing program 5: 04:10:28 executing program 3: 04:10:28 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:28 executing program 5: 04:10:28 executing program 2: 04:10:28 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:28 executing program 3: 04:10:28 executing program 5: 04:10:28 executing program 2: 04:10:29 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000000)={0xffffffff, "cc64d5b503cfd6fc34f0b6e7f48124a36c06e8f874c666591372a9a81318264b", 0x2, 0x666b, 0x3, 0x40, 0x4}) ftruncate(r0, 0x83) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:10:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40200, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000040)={0x11, 0x5}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000080)=0x7) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:29 executing program 3: 04:10:29 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(0x0, 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:29 executing program 5: 04:10:29 executing program 2: 04:10:29 executing program 2: 04:10:29 executing program 3: 04:10:29 executing program 5: 04:10:29 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(0x0, 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:29 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) finit_module(r1, &(0x7f0000000000)='ppp1keyring\'cpuset\x00', 0x1) ftruncate(r0, 0x7fffffff) sendfile(r0, r1, 0x0, 0xeefffdef) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:10:29 executing program 5: 04:10:29 executing program 2: 04:10:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) accept$ax25(r1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x579280, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) 04:10:29 executing program 3: 04:10:29 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(0x0, 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:29 executing program 2: 04:10:29 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x915d) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000000)=""/67) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000001c0)={@initdev, 0x0}, &(0x7f0000000240)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000740)={0x0, @local, @empty}, &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000007c0)={0x0, @initdev, @local}, &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000940)=0xe8) getpeername$packet(r0, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000009c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000cc0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000dc0)=0xe8) accept$packet(r0, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ec0)=0x14) accept4$packet(r0, &(0x7f0000000f80)={0x11, 0x0, 0x0}, &(0x7f0000000fc0)=0x14, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001000)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000001100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001140)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003080)={0x0, @local, @initdev}, &(0x7f00000030c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003140)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000003240)=0xe8) getsockname$packet(r0, &(0x7f0000003280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000032c0)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000003300)={@local, @local, 0x0}, &(0x7f0000003340)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004540)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000004640)=0xe8) getpeername$packet(r0, &(0x7f0000004680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000046c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000047c0)={'veth0_to_hsr\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000048c0)={0x0, @rand_addr, @initdev}, &(0x7f0000004900)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004fc0)={'team0\x00', 0x0}) accept$packet(r0, &(0x7f0000005040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005080)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000050c0)={@mcast1, 0x0}, &(0x7f0000005100)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000005800)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000057c0)={&(0x7f0000005140)={0x664, r2, 0x300, 0x70bd29, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x19f2}}}]}}, {{0x8, 0x1, r9}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x652}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1084bd1a}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r13}, {0x170, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r17}, {0x1a0, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x959}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x446}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}]}}, {{0x8, 0x1, r20}, {0x84, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r22}, {0xec, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x69}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}]}}]}, 0x664}, 0x1, 0x0, 0x0, 0xdbcd3144bf1f768e}, 0x800) 04:10:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000040)={0x6, 0x6, 0x5, 0x8, 0x13, 0x4, 0x0, 0x1ff, 0x5, 0x7fffffff, 0xfffffffffffffffd, 0x2}) 04:10:30 executing program 3: 04:10:30 executing program 2: 04:10:30 executing program 5: 04:10:30 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:30 executing program 3: 04:10:30 executing program 5: 04:10:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x8002, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) acct(&(0x7f0000000140)='./file0\x00') ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000100)={0xfffffffffffffffb, 0x2, 0x1, 0x2, 0x8}) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfffffffffffffffa, 0x40000) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x200, 0x5) r4 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0x3, 0x17, 0x0, r4}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:30 executing program 2: 04:10:30 executing program 3: 04:10:30 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0xfffffffffffffdd4) 04:10:30 executing program 2: 04:10:30 executing program 5: 04:10:30 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:30 executing program 3: 04:10:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000040)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:30 executing program 3: 04:10:30 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:30 executing program 5: 04:10:30 executing program 2: 04:10:30 executing program 3: 04:10:30 executing program 5: 04:10:31 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0xb, 0x6e6380edefc16870, 0x70bd2c, 0x25dfdbfd, {0x5, 0x0, 0xa}, [@typed={0x8, 0x5d, @pid=r2}, @generic="22bad5738a3385937088"]}, 0x28}, 0x1, 0x0, 0x0, 0x48800}, 0x4) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:10:31 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:31 executing program 2: 04:10:31 executing program 5: 04:10:31 executing program 3: 04:10:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x200) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000100)="36656781e6ef1c66b93003000066b86d26071c66badaa995610f30660f3a402a0066b8060000000f23c00f21f8663502000d000f23f80f3236f30fa6c8b800068ec80f4d830500660f3acfa1ed00000f30", 0x51}], 0x1, 0x36, &(0x7f0000000180), 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) 04:10:31 executing program 5: 04:10:31 executing program 2: 04:10:31 executing program 3: r0 = socket$inet6(0xa, 0x20000000000002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080)=0xfffffffffffff800, 0x4) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 04:10:31 executing program 5: 04:10:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x20010, r0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x8e33, 0x30}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000100)={r5, 0x1000, "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"}, &(0x7f0000001140)=0x1008) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:31 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:32 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x2, 0x100, 0x3, 0x7, 0x8, 0x947}}, 0x8) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:32 executing program 5: 04:10:32 executing program 2: 04:10:32 executing program 3: 04:10:32 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x1) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x40) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:32 executing program 3: 04:10:32 executing program 2: 04:10:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 04:10:32 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, 0x0, r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sctp\x00') getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x9}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000140)={r5, 0x81, 0x4, [0x800, 0x80000000, 0x9, 0x7fffffff]}, 0x10) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) accept4$unix(r0, 0x0, &(0x7f0000000000), 0x800) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) 04:10:32 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0x7ffffffffffff00c}, {0x6}]}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10001, 0x0) 04:10:33 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1f) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:10:33 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0xac3, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0xffffffffffffffd9) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000180)={0x0, {0x77359400}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000400)=""/142, &(0x7f0000000200)=0x8e) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e21, @rand_addr=0x4}, {0x2, 0x4e22}, {0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, 0x0, 0x100000001, &(0x7f0000000340)='veth0_to_bridge\x00', 0x0, 0x9, 0x7}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x40, 0x0) connect$tipc(r1, &(0x7f00000002c0)=@name={0x1e, 0x2, 0x2, {{0x2, 0x3}, 0x3}}, 0x10) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000580)=""/151) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1004, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000240)) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/13]) getrandom(&(0x7f00000004c0)=""/89, 0x59, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000380), &(0x7f00000003c0)=0x8) 04:10:33 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, 0x0, r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000200), 0x4) 04:10:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) sched_setaffinity(r2, 0x8, &(0x7f0000000100)=0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x280800, 0x0) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x7f}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f00000001c0)={r7, 0x1, 0x2, 0x7}, &(0x7f0000000200)=0x10) 04:10:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001200)={0x0, @broadcast, @loopback}, &(0x7f0000001240)=0xc) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r4 = add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="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", 0x1000, 0xfffffffffffffffd) keyctl$read(0xb, r4, &(0x7f0000001140)=""/185, 0xb9) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2000) 04:10:33 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, 0x0, r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:33 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000000)=""/248) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000300)={0x53, 0xfffffffffffffffd, 0xf5, 0xc73, @buffer={0x0, 0x9e, &(0x7f0000000100)=""/158}, &(0x7f00000001c0)="59ad6d48efd9810e0ac6663a3b438c3bc97188dfebbff08bcca3efddd6a716974e5dab45a87271109a8e1bb120b01cc19cbaa7c34aab140484782f958c7086ac9db49043501e1602946b3c036edda143d0dee8e5e027367225eb87087b1d18c77f07802445eade6b403030b61c0f507a3b99adee7ae3d510dd1294c505700698b4a2a53ef81837a21acf26f04b3642498f37b3a3fc142157d7631e703c756551a53fb6ea8bcc58454502692bf75e8f5abc0d969553e141561c77523db4ddf4468d0c587758a529827e93c9b31248a7033d6dfe21e74a8a3d5b2c89a2e9889280c8aaf807b2083dd287e759243d504200daa143f901", &(0x7f0000000040)=""/115, 0x200, 0x10000, 0xffffffffffffffff, &(0x7f00000002c0)}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) [ 288.092523][T15347] overlayfs: missing 'lowerdir' 04:10:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:33 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 288.308446][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:33 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:33 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:33 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x800, 0x8000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000100)="1c26dbb5abc14afd8861b7487db4fa1518e126e28a7d805ae9970cc9ceaa51f44a7d51330df455624c42f35468f5a1d22aea0f458161d90d52977eb4b08571721a76939ada3821d6ea1c4a8e5ba8bb1ccb76031ca4e114970f63a4867f18b43f3397a5033910074afe36848aad165b913f319b934d4b5f82a83b8eddca6b4cac6ae9ec5fa605") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x400, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x80) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$TCSETX(r1, 0x5433, &(0x7f0000000040)={0x10000, 0x8000, [0x7, 0x1, 0xa1c, 0x1, 0x20], 0x282beb21}) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) mmap$xdp(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x8010, r0, 0x100000000) 04:10:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:33 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x400) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000080)=0x9) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(authenc(crc32-generic,ctr-camellia-aesni-avx2))\x00'}, 0x58) read$FUSE(r0, &(0x7f0000000500), 0x1000) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="03007772", 0x4) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x80000) bind$isdn(r0, &(0x7f0000000000)={0x22, 0x7f, 0x6, 0x2, 0x1}, 0x6) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000140)=0x2) 04:10:33 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 288.666569][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 288.705691][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 288.926478][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:34 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x7) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0xfffffffffffffd79) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000200)=""/188, &(0x7f00000000c0)=0xbc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000480)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001600)={0x0, 0x0}, &(0x7f0000001640)=0xc) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000018c0)=0x100) stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpid() stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000001800)=[0xffffffffffffffff, 0xee01]) sendmmsg$unix(r0, &(0x7f0000001880)=[{&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000500)="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", 0x1000}, {&(0x7f00000002c0)="22759d5d6142db5e7dac45ee9cd402c66cb6daa9716df6938472eec20368928527b1fb", 0x23}, {&(0x7f0000000300)="c8674fd6db690b323faf82d942064443159dc86f3957978cb1", 0x19}, {&(0x7f0000000340)="381bb635d205e2b453c2b1df6da7137dbcfa4304af517eb66e3a9ccc0b1f142d00f311b6", 0x24}, {&(0x7f0000000380)="a76cc8e714a796f3709688b084810a4aea17974d053d832f3b629d34f8a6b3c709252520c8dba25fa9fdec479fe5190b661577d4a90d487e9e6154f93738f7938e759d287455357ff17a2ea6b9ac789b17e22503944f8809bed24eea13353570ff97", 0x62}, {&(0x7f0000001500)="098c3d27684958d5e5869fc26a0e5915d5c59880349b67d092bbb99b0551ec5d08d583fda0c5ecdd6d38343a5fe14c3dbd8b363972f2f8ee331d3e47c20bad40f299eb5f015d7a6c4dff4056a89eec79351c3c80464dd14588601548f6f9545a3d9bf037affbabfed108969c504df640c46e0bcce62f901e1adcc0e997d4f730e7c3c46a690be1fe790cbe8badf7743323f87970906d5697bb36f3f22fc7415171302c4c6cff15ea975dae0e21e602949b79ec4d53bd0aeeef7c98e4a851f138e60330d929858556cd91de6e6d6d604e54", 0xd1}], 0x6, &(0x7f0000001840)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0x20000000}], 0x1, 0x1) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000080)={0x2, 0x6, 0x5, 0x5, 0x80000001}) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x9b5e, 0x1, 0x100000000, 0x2, 0x0, 0x401, 0x80020, 0xb, 0x5ba, 0xffff, 0x0, 0x401, 0x7ff, 0x6, 0x7ff, 0xbbd5, 0x1, 0x1, 0x1, 0x1cb1, 0x8, 0x1, 0xffffffff, 0x9a, 0x8af, 0x101, 0x8001, 0x1ff000000, 0xffffffff, 0x1, 0x20, 0xfff, 0x800, 0x3f, 0x100, 0x80000001, 0x0, 0x40, 0x2, @perf_config_ext={0x2, 0x6d04}, 0x80, 0xf, 0xfffffffffffff25a, 0x1, 0x100000000, 0x5e87210e, 0x5}, r0, 0x1, r0, 0x5) 04:10:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x404400, 0x0) ioctl$MON_IOCX_GET(r3, 0x40189206, &(0x7f0000000100)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000080)=""/41, 0x29}) 04:10:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:34 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x400) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000080)=0x9) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(authenc(crc32-generic,ctr-camellia-aesni-avx2))\x00'}, 0x58) read$FUSE(r0, &(0x7f0000000500), 0x1000) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="03007772", 0x4) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x80000) bind$isdn(r0, &(0x7f0000000000)={0x22, 0x7f, 0x6, 0x2, 0x1}, 0x6) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000140)=0x2) 04:10:34 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:34 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, 0x0) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:34 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) fsetxattr(r0, &(0x7f0000000000)=@random={'user.', '/dev/vbi#\x00'}, &(0x7f0000000040)='vboxnet1}::\x00', 0xc, 0x3) sendfile(r0, r1, 0x0, 0xeefffdef) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000080)=0x9, 0x4) unlink(&(0x7f00000000c0)='./file0\x00') write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) [ 289.251189][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)={0x0, @aes256, 0x2, "a96539c9242a4c07"}) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x10000, 0x2a, 0x0, 0x1000, 0x1, 0x2, 0x3e, 0x834, 0x7a, 0x38, 0x145, 0xfffffffffffffff7, 0x780272f0000000, 0x20, 0x2, 0x9, 0x7, 0x3f}, [{0x6474e551, 0x426, 0x4, 0x9, 0x8, 0xffffffff80000000, 0x3ff, 0x599}], "69ff5cb25d95c7508ce6627e9e8d1e409c472c92c1f44f36d769c3a2fc6973ed88b9c68760627135d87afe5b66e53175d37a542a268e7559dc63d9239e4038de5b8d2b787c0cce46813599a79c1170cf2d57f78f22ce0db95fe97a5814efed842e7e6f47a25f547ad356a8e01e00e142926af978a6c09f136b3d54966b922285a6600de433e6eecd0f1eaec1095f69736b09d5af0d14d5638d277e1070a69f090ffaeef3a8f20e106639bf8a5200f43500ec3929ef456d9fe1c26ce82beab12cdefa31c7031b835c33613d615bf1f17f56a128eba34cb7ef155abf239ea6fa80d7598e7c374c7719f3d94f2aef0a49bd", [[], [], [], [], [], [], [], []]}, 0x948) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 289.354352][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:34 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, 0x0) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 289.493526][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) [ 289.574552][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x12000, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000100)={0x0, @reserved}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getpeername$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000007c0)=0xe8) bind$bt_hci(r2, &(0x7f0000000800)={0x1f, r4, 0x1}, 0xc) r5 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='md5sum\'^vmnet1\\system\x00', 0xfffffffffffffffe) r6 = add_key(&(0x7f0000000280)='big_key\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000840)="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", 0x1000, 0xfffffffffffffffc) keyctl$link(0x8, r5, r6) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) accept$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000380)={@empty, 0x6b, r7}) 04:10:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 289.710163][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 289.744523][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:34 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, 0x0) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) 04:10:35 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000000)=0x1) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x6, 0x100, 0x3be, 0x7, 0x0, 0x6, 0x44000, 0x2, 0x3, 0x5, 0x674, 0x81, 0xfffffffffffffffa, 0x80000001, 0x1ff, 0xdbf, 0x3655e685, 0x9, 0xcae, 0x3, 0x1, 0x2, 0x8, 0x6, 0x0, 0x400, 0x80000001, 0x8001, 0x3, 0x9, 0xffff, 0x10000, 0x6, 0x1, 0x1, 0x6, 0x0, 0x76e, 0x5, @perf_config_ext={0xffffffffffffffc0}, 0x4904, 0x5, 0x80, 0x0, 0x0, 0x7, 0x8001}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2f) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f00000001c0)={0x800}) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x1e, 0x1, "0f7aa35fec6aa5c26c9b561d88315b963cc98efc3e4bbf2e3b685f853cee8b7fc32815a04f92bb195b2eef3e21c3eed4c2b7407bac9190d3e227a7c36f485c10", "09c1ea24b3ecf6bf5f54789203226d4ecc5e2a933914a0ee1a5ad1ec163041a4", [0x9, 0x7]}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x5, 0x400000) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000100)={0x0, @motion_det}) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x5b) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:35 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x101002, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000100)={&(0x7f0000000080)=[0x3, 0xffffffff, 0xe0, 0x7, 0x2, 0x5, 0xd2, 0x3, 0xd0, 0x3], 0xa, 0xfff, 0x8000, 0xffff, 0x3, 0x0, {0x80000001, 0x6, 0x1, 0x8000, 0x2, 0x0, 0x4, 0x9, 0x40000, 0x7, 0x6, 0x5637, 0x2, 0xd6c0326, "0c89fd90be5b7025459de69e2551759b4ff0253996d946e1903875a9297a1611"}}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r5 = add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r4, r5) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000180)={r0}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:36 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) 04:10:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:36 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x1, 0x69c, 0x3, 0x0, 0x3f, 0xffffffff, 0x4, {0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1, 0x3}}, 0x7, 0x1, 0x7, 0x7ff, 0x80}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r2, 0x8, 0x10}, &(0x7f0000000140)=0xc) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x4000, 0x1}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000200)={'NETMAP\x00'}, &(0x7f0000000240)=0x1e) 04:10:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000000)) 04:10:36 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(0xffffffffffffffff, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x87d, 0x204000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000100)={r3, 0x80000000, 0x2}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) write$cgroup_pid(r2, &(0x7f00000001c0)=r6, 0x12) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) 04:10:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) 04:10:36 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:36 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r1 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x1, 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x16c, r2, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_bridge\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8001}]}, @TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x18}, 0x101}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7f, @loopback, 0x6}}}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xfffffffffffffff7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xeb29, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffffffff}}}}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40080}, 0x20000810) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x10040, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_SET_BOOT_CPU_ID(r5, 0xae78, &(0x7f0000000000)=0x2) r6 = gettid() syz_open_procfs$namespace(r6, &(0x7f0000000500)='ns/ipc\x00') ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x400000, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f0000000080)=0x81) setsockopt$inet6_tcp_buf(r7, 0x6, 0xe, &(0x7f0000000100)="0f4f5cc27aa1bd9cd23e47f1ed1ce29797057a558e72844009c4d1487f4d147d9baee6dd3868f67ce30f4a21de6ee410c42f119108a6c1ec0c8879ea69333dfdab11924959511f6d6c1e46b55fb4171ea2f0814a1d1d3cbfd3ddb58727882bc0ee736012d501bf4c9cc8a8efaecb392ff35091e1dcafb8cec75cec1e3a0494801ccc2c82652a49b2da683430f8e52df48ce73113da1fe7863fec06b53ae6fe1c7c1d7e101fa731dd739fd36378be9f1f5faa223fa67ab7463e3a4b5a0fcdc9359e01df6407017528b4b0a2704afca5fefdef14f067ea543e6c69ed2d23b4", 0xde) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) 04:10:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) 04:10:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:37 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x5, 0x4, 0x9}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000000c0)={r2, 0x4}, 0x8) pkey_alloc(0x0, 0x2) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000000)=0x9) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x101000, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2520000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r4, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0xf63945e95b12c7f) 04:10:37 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x1a, "9ea66889670c7fe3f789e237ec9a6376316415982096b87ecb5a"}, &(0x7f0000000080)=0x3e) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001340)=0x0) lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001440), &(0x7f0000001480)=0x0, &(0x7f00000014c0)) r8 = getpgid(0x0) stat(&(0x7f0000001cc0)='./file0/file0\x00', &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f00000015c0)=[0xee01, 0xee01, 0xee00, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) r11 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000001600)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000001700)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001740)={0x0, 0x0, 0x0}, &(0x7f0000001780)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000017c0)=0x0) lstat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000018c0)='./file0\x00', &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f0000001ac0)={&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001300)=[{&(0x7f00000001c0)="b23e7fe2a81a3ef2364bfe96809b5dd914e3b2d762bb6de2dc1a9b027a3b6fc1195d256a07", 0x25}, {&(0x7f0000000200)="da3811b1a210dac1a6927ae6f97c2ab0d8ad37aff1849e3669aa8a68c79a8c92f8764b55416d3598def8a301ba383d477367d46ab16e3df8517ec98d038abfda8e17ab3991ffacc9049e94069af4d945b424768d522c883c85ba8c231ee336132dfdcc9eca185979525a92b4aeb5ab12c488225c177a305ec9696a1008b340c0157a790628faf9a039c1c1679ab39a90a277b3552c684a226c0ad1f1b3bebd27d9f516fd99326699ed3673e32453fa105b44d3361b1e4d714a811cb68c11adf23ac5cf4a7c1619504d6b993704a1a86933468858ce4e1e4e335813aa6ff784ccdc8816101c96", 0xe6}, {&(0x7f0000000300)="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", 0x1000}], 0x3, &(0x7f0000001d00)=ANY=[@ANYBLOB="240000120000000001000000886b52266c793b82ac050e32f40701000000", @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r0, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r4, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB='\x00\x00\x00\x00'], 0x138, 0x10}, 0x8000) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) socket$inet_smc(0x2b, 0x1, 0x0) 04:10:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) 04:10:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:37 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) uselib(&(0x7f0000000040)='./file0\x00') ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x84000) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, &(0x7f0000000100)={0x2, 0x4, 0x4, 0x6, 0x8}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000000)={0x7, 0x4798343f52919c7b}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:37 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:10:37 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(0x0) 04:10:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x2, {0x20, 0x3ff, 0x7, 0x1}}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000180)={{0x7, 0x1f}, {0x3ff, 0xffff}, 0x4, 0x2, 0x2}) r3 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x301002) move_mount(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00', 0x5) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:38 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(0x0) 04:10:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:38 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x87) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e22, 0x7, @remote, 0xcbf}, {0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, [], 0xb}, 0x100000000}, 0x0, [0x2, 0x9, 0x6, 0x5f, 0x7c, 0x10000, 0x8001, 0x2]}, 0x5c) 04:10:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:38 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(0x0) 04:10:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x400000) getsockname$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 293.391877][ C1] net_ratelimit: 22 callbacks suppressed [ 293.391903][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000040)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) [ 293.470854][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0x4000) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@empty, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) [ 293.815906][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:39 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) ftruncate(r1, 0x10000) sendfile(r0, r1, 0x0, 0x4) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:39 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)=0x8) 04:10:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 294.310356][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 294.324560][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x200, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) accept4$x25(r0, &(0x7f0000000300), &(0x7f0000000340)=0x12, 0x80000) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x288080, 0x1) ioctl$VIDIOC_QUERY_EXT_CTRL(r4, 0xc0e85667, &(0x7f0000000100)={0x80000000, 0x2, "145b1ccdab539ffafaa56966de4503a1173731dc5a084fc8393fb8a711b2d86a", 0x0, 0x13f, 0xffffffff, 0x0, 0x5, 0x0, 0xffffffff, 0x400, [0x4, 0x100000000c4, 0xffffffff, 0x7]}) getcwd(&(0x7f0000000200)=""/71, 0xffffffffffffffde) select(0x40, &(0x7f0000000040)={0x0, 0xffff, 0x8, 0x6, 0x1, 0x0, 0x9, 0x9}, &(0x7f0000000080)={0x9, 0x9, 0x7, 0x5, 0x1ff, 0x7fffffff, 0x0, 0x10001}, &(0x7f0000000280)={0x8fa, 0x57b8, 0xd61, 0x1, 0x4, 0xfffffffffffff0c7, 0x7}, &(0x7f00000002c0)={0x0, 0x7530}) 04:10:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) 04:10:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) [ 294.799610][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 294.971248][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 294.978078][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:40 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x1, 'ifb0\x00', 0x3}, 0x18) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000000)={0x8, {0xffff, 0x6, 0x8, 0xa2}, {0x19, 0x0, 0x4f9, 0x8}, {0x8, 0x7}}) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0xa1, 0x8202, 0x7f, 0x7fffffff00, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r2, 0x1}, &(0x7f0000000100)=0x8) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:10:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x20000, 0x0) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000100)={0xfffffffffffffff8, 0x2, 0x0, [{0x4, 0xfffffffffffffff8, 0x0, 0x401, 0x0, 0xc6}, {0x6, 0xd0, 0x7, 0x3, 0x20, 0x9, 0x272}]}) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000080)={0x0, r3}) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) 04:10:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:40 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20001, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000040)={0x1, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x7, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) 04:10:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x40, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 295.570622][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x200000) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) [ 295.671163][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:41 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 04:10:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffff9, 0x200001) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x4f, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffffd, 0x2, 0x2c}, &(0x7f0000000080)=0x10) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000140)={0x3e8, 0x6, 0x100000001, 0x1, 0x1}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r4, 0x8, 0x1, [0x198]}, 0xa) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x80000001, 0x8001, 0x9, 0x0}) socketpair(0x11, 0x2, 0x5, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000340)={'veth1_to_team\x00', 0xe2b, 0x8150}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r4, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) 04:10:41 executing program 2 (fault-call:7 fault-nth:0): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:41 executing program 3 (fault-call:8 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 296.211705][T15828] FAULT_INJECTION: forcing a failure. [ 296.211705][T15828] name failslab, interval 1, probability 0, space 0, times 0 [ 296.272042][T15828] CPU: 0 PID: 15828 Comm: syz-executor.2 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 296.281266][T15828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.291405][T15828] Call Trace: [ 296.294710][T15828] dump_stack+0x172/0x1f0 [ 296.299053][T15828] should_fail.cold+0xa/0x15 [ 296.300669][T15834] debugfs: Directory 'vcpu2' with parent '15834-6' already present! [ 296.303644][T15828] ? __mutex_unlock_slowpath+0xf8/0x6b0 04:10:41 executing program 0 (fault-call:8 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 296.303662][T15828] ? fault_create_debugfs_attr+0x180/0x180 [ 296.303686][T15828] ? page_to_nid.part.0+0x20/0x20 [ 296.327987][T15828] ? ___might_sleep+0x163/0x280 [ 296.332859][T15828] __should_failslab+0x121/0x190 [ 296.337815][T15828] should_failslab+0x9/0x14 [ 296.337829][T15828] kmem_cache_alloc+0x2aa/0x710 [ 296.337844][T15828] ? __ia32_sys_read+0xb0/0xb0 [ 296.337858][T15828] ? switch_fpu_return+0x1fa/0x4f0 [ 296.337876][T15828] getname_flags+0xd6/0x5b0 [ 296.337893][T15828] __x64_sys_unlink+0x35/0x50 [ 296.337909][T15828] do_syscall_64+0xfa/0x760 [ 296.337930][T15828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.352021][T15828] RIP: 0033:0x459829 [ 296.352042][T15828] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.361614][T15828] RSP: 002b:00007f73d9dc8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 296.361628][T15828] RAX: ffffffffffffffda RBX: 00007f73d9dc8c90 RCX: 0000000000459829 04:10:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 296.361636][T15828] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 296.361643][T15828] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 296.361651][T15828] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73d9dc96d4 [ 296.361659][T15828] R13: 00000000004c5b99 R14: 00000000004e00f0 R15: 0000000000000005 04:10:41 executing program 2 (fault-call:7 fault-nth:1): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 296.570273][T15847] debugfs: Directory 'vcpu2' with parent '15834-6' already present! [ 296.681617][T15850] FAULT_INJECTION: forcing a failure. [ 296.681617][T15850] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 296.694887][T15850] CPU: 1 PID: 15850 Comm: syz-executor.2 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 296.704081][T15850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.714228][T15850] Call Trace: [ 296.717534][T15850] dump_stack+0x172/0x1f0 [ 296.721888][T15850] should_fail.cold+0xa/0x15 [ 296.726489][T15850] ? fault_create_debugfs_attr+0x180/0x180 [ 296.732298][T15850] ? __f_unlock_pos+0x19/0x20 [ 296.732313][T15850] ? __kasan_check_read+0x11/0x20 [ 296.732326][T15850] ? refcount_dec_not_one+0x1f0/0x1f0 [ 296.732349][T15850] should_fail_alloc_page+0x50/0x60 [ 296.752669][T15850] __alloc_pages_nodemask+0x1a1/0x900 [ 296.758047][T15850] ? __kasan_check_read+0x11/0x20 [ 296.763079][T15850] ? __alloc_pages_slowpath+0x2530/0x2530 [ 296.768797][T15850] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 296.774426][T15850] ? __kasan_check_read+0x11/0x20 [ 296.779455][T15850] ? fault_create_debugfs_attr+0x180/0x180 [ 296.785257][T15850] cache_grow_begin+0x90/0xd20 [ 296.790012][T15850] ? getname_flags+0xd6/0x5b0 [ 296.794801][T15850] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 296.801108][T15850] kmem_cache_alloc+0x64e/0x710 [ 296.805943][T15850] getname_flags+0xd6/0x5b0 [ 296.810426][T15850] __x64_sys_unlink+0x35/0x50 [ 296.815196][T15850] do_syscall_64+0xfa/0x760 [ 296.819697][T15850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.825567][T15850] RIP: 0033:0x459829 04:10:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x800, 0x1) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0xf0ff7f, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x604000, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) [ 296.829441][T15850] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.849117][T15850] RSP: 002b:00007f73d9dc8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 296.857554][T15850] RAX: ffffffffffffffda RBX: 00007f73d9dc8c90 RCX: 0000000000459829 [ 296.865636][T15850] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 296.873703][T15850] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 296.881673][T15850] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73d9dc96d4 [ 296.889653][T15850] R13: 00000000004c5b99 R14: 00000000004e00f0 R15: 0000000000000005 04:10:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x7ffff000, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10000, 0x0) ioctl$MON_IOCQ_RING_SIZE(r3, 0x9205) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0xf0ff7f, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:42 executing program 2 (fault-call:7 fault-nth:2): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0xffffff7f, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 297.288105][T15890] FAULT_INJECTION: forcing a failure. [ 297.288105][T15890] name failslab, interval 1, probability 0, space 0, times 0 [ 297.334436][T15890] CPU: 0 PID: 15890 Comm: syz-executor.2 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 297.343833][T15890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.353963][T15890] Call Trace: [ 297.357275][T15890] dump_stack+0x172/0x1f0 [ 297.361655][T15890] should_fail.cold+0xa/0x15 [ 297.366266][T15890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 297.372510][T15890] ? fault_create_debugfs_attr+0x180/0x180 [ 297.378332][T15890] ? ___might_sleep+0x163/0x280 [ 297.383191][T15890] __should_failslab+0x121/0x190 [ 297.388127][T15890] should_failslab+0x9/0x14 [ 297.392607][T15890] __kmalloc+0x2e0/0x770 [ 297.396849][T15890] ? mark_held_locks+0xf0/0xf0 [ 297.401613][T15890] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 297.407326][T15890] tomoyo_realpath_from_path+0xcd/0x7b0 [ 297.412862][T15890] ? tomoyo_path_perm+0x1cb/0x430 [ 297.417868][T15890] tomoyo_path_perm+0x230/0x430 [ 297.422707][T15890] ? tomoyo_path_perm+0x1cb/0x430 [ 297.427709][T15890] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 297.433753][T15890] ? _raw_spin_unlock+0x2d/0x50 [ 297.438580][T15890] ? lockref_get_not_dead+0x70/0x90 [ 297.443758][T15890] ? dput+0x1f2/0xde0 [ 297.447720][T15890] ? __kasan_check_read+0x11/0x20 [ 297.452727][T15890] ? __d_lookup+0x42f/0x760 [ 297.457208][T15890] tomoyo_path_unlink+0x9b/0xe0 [ 297.462037][T15890] ? tomoyo_path_rmdir+0xe0/0xe0 [ 297.466977][T15890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.473199][T15890] security_path_unlink+0xfa/0x160 [ 297.478393][T15890] do_unlinkat+0x3b7/0x6d0 [ 297.482815][T15890] ? __ia32_sys_rmdir+0x40/0x40 [ 297.487663][T15890] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.493883][T15890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.500296][T15890] ? getname_flags+0x277/0x5b0 [ 297.505046][T15890] __x64_sys_unlink+0x42/0x50 [ 297.509701][T15890] do_syscall_64+0xfa/0x760 [ 297.514266][T15890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.520149][T15890] RIP: 0033:0x459829 [ 297.524117][T15890] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.544258][T15890] RSP: 002b:00007f73d9dc8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 297.552676][T15890] RAX: ffffffffffffffda RBX: 00007f73d9dc8c90 RCX: 0000000000459829 [ 297.560639][T15890] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 297.568622][T15890] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 297.576576][T15890] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73d9dc96d4 [ 297.584526][T15890] R13: 00000000004c5b99 R14: 00000000004e00f0 R15: 0000000000000005 [ 297.610393][T15890] ERROR: Out of memory at tomoyo_realpath_from_path. 04:10:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x7ffff000, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:42 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = socket(0x0, 0x3, 0x5) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r3, 0x10f, 0x84, &(0x7f0000000080), &(0x7f0000000100)=0x4) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7, 0x10000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x3) 04:10:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x7ffffffff000, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r0, 0x7) sendfile(r0, r1, 0x0, 0xeefffdef) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000000)) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000040)={0x0, {0x5, 0x81}}) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:42 executing program 2 (fault-call:7 fault-nth:3): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0xffffff7f, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0xf0ff7f00000000, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:43 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) connect$pptp(r0, &(0x7f0000000100)={0x18, 0x2, {0x2, @rand_addr=0xffff}}, 0x1e) write$cgroup_subtree(r0, &(0x7f0000000140)={[{0x2b, 'memory'}]}, 0x8) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, [], [{0x0, 0x80, 0x0, 0x1, 0x7ff, 0x100000000}, {0x2, 0x92ce, 0x0, 0x9, 0x1187, 0x2}], [[]]}) 04:10:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000, r2}) r5 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000280)={r4, 0x80000, r5}) r6 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3fb, 0x8042) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r6, 0xc1205531, &(0x7f0000000100)={0x8, 0x1, 0x3ff, 0x2, [], [], [], 0x0, 0x1, 0x140000000000, 0x8, "1c83918c59a043996f6f2c04d867b61d"}) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r6, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="5b00000044fe30b014e34faef24979ac1ef0f244fed9946bee994f79952c12350a86aa237103af7806b55d4d694debd361f6847e6dac30cc2bdacc145631c60ea06b1929e29e39af407b542c13d5e20adba3aefb9eb5eb78031dd8e9315c31"], &(0x7f0000000340)=0x63) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={r7, 0x7}, &(0x7f00000003c0)=0x8) 04:10:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x7ffffffff000, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0xf0ffffff7f0000, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000340)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x5, 0x7, &(0x7f00000007c0)=[{&(0x7f00000003c0)="44636180a1e7b7b35e67cac7f7eecd35447ee48336ed3b8361fe69e7ec598224abc4edb896820234ace8dad9be15a03dac3d4debb2618019866e680c6619eac534cda3cd5092e335dc4d68ca1b320b141f24c12d34851c9d9313975bb8ce60d1d972000fca439a", 0x67, 0x2}, {&(0x7f0000000440)="823fc701f82cfbd97ea64cd578298b54a84db5bd36ef11bbf36af4a540c97a8cf9d755b86d5e8e05f67bfafb0b867cc4ad4f01aff11783d5e1a3d392b497d1b0fd818fd6da33f47ef144b842a3c70b157d9aa5bb46389fdfcd3382aa520e9121988ba57bcf9aebb2e15194f5a64d7aefdfad1f9540f90647fcaf91a005746cc556a1d314c54018c9815aa322115d278ad456a8063dbc862b0d5b48df4a0362", 0x9f, 0x1}, {&(0x7f0000000500)="9c8f9c6f23cbbb67b0ba0e94a96fae5893ed992ac27142d666400e5dba722e7e5afe18d59d0740a2a4955e7798f13b7e9cc744cfc778b8e1b98409dd0933a637383f2b33ae72797a0025b9b637902771a63b3b79ebfc61832f1ac50350471f31dbf51e66db20d63afbf10a9b68aa9f32dc3b54d3d35fab5a3367f857485372216714d8cc53260272", 0x88, 0xf53}, {&(0x7f00000005c0)="d10f62c0478a8fab340849e0d706f01f3d2ba93fb8d7453ba6482449ae7624786324b6d852a7929c3e7276075c7db8475a9b7b19b9ee462b5ce6a3ae5e5068c19fd72aaed26d67393ab4ee775626ab0265a4a4bf10594e6b2d5fc9132e0461c164406cded3879728c02071dccdb5d39c95488a63", 0x74, 0x8}, {&(0x7f0000000640)="d24cbd564471bbffd897229f96c10ad074e17fcaf511775a05ca56fc82759ad96f4035a2bbbb8d56a35d78994e856a5e2580220a6a2a7530a7379aeb4e", 0x3d, 0x10000}, {&(0x7f0000000680)="783a7068cd5afd351c145e5fe1be9c7754e44ddcb13f71c83dffb6b3de2aca4fb6fa944f9b2eb7d8b59652935c54da413b6c11741e2d2d25eb21c3b34b49b519bcf01da54823e62ed2941bbbe8116423fa1b0059ef7d0d7a4aefa14a8be607d01d2c0877c87a6e4a1c75a950a31eb0fa2f01defc3be9f32fadf66d38acb24f40bbe2347a3f03b29e110dec555e3d9ad336344e3214883b64df8f", 0x9a, 0x7}, {&(0x7f0000000740)="57e10a4bedbc35a446238352051c820fa5df9c14c365dbb7156d94a0d018f3dd71af2a73d62bd206f829842e0feb3918097ac877cfbf2c0203d6bcde2f5c9617ecc7ca21f7d0973adaf238c28f45decdeb7e2e32cf4155c3", 0x58, 0x9f9faf}], 0x8, &(0x7f0000000880)={[{@nouser_xattr='nouser_xattr'}, {@nomblk_io_submit='nomblk_io_submit'}, {@minixdf='minixdf'}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x100000}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@permit_directio='permit_directio'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x400) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f00000001c0)={r2, &(0x7f0000000100)=""/136}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000240)=""/229, &(0x7f0000000080)=0xe5) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0xfffffffffffffffc) 04:10:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:43 executing program 2: mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x102, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x80, 0x0) fanotify_mark(r0, 0x3, 0xcd3bf25b0a70d750, r1, &(0x7f00000009c0)='./file0\x00') r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x20000) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f0000000200)) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000180)={0xc8, 0x8001, 0xefa}) mknodat(r2, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x9, 0x7, &(0x7f0000000880)=[{&(0x7f00000003c0)="d55955b0cc23fb21e412ef470c093f06141a50e04f7524f2af5db25c7f27a842c47cb8186e6ddcf7536fdefc79318e90d566fe3c9999d73cde6be326ea69a63c3e30dc869a67ed30e4b84fea3939f9c9c64d6b40d0fb116aa0c1a669e8dbb58bb8da4cbccc760a5bc7327cdf1d4aa1a112438b3e695f50b727aabab52e5c6c5cb8356d1be68365f385ea212b3289f05461d6883f83895b255a10fc11a72cc962439dba7ab6fa75456a5af4e7b6d30ca61f7b", 0xb2, 0x8}, {&(0x7f0000000480)="56bc87d4ae3c551b44e3ec80795aeebfd96271239268ecb861f42786c795ffc02f211e21c2819a6d2e6b9458a75a5de25f14dcde096d7c4edde03df8658649f97f779662cde06cf78a333799c589a2f39a32f394db3f791933d2e867b84052bb94b5aedaf3e2bb14af6e84d143c827542324f324745e1ae981505a1d1728532c31bad5f0edb516495fdd7240d5a03f1b94a950aae8c8d98bd5bcaa8757909d29b9b45eb9e617221637aa6602", 0xac, 0xffff}, {&(0x7f0000000540)="af07be2b1b025ded6ea979806bb4f786743f1f87605a1866d0c1b1bea032c3966bd22dbc78c130151552191831f82e100802cc0f06ac4234e14170bf9fbc9709bf5621f29ca89dde87c9f37b6c1e3c51f9b8a1c6e5da7d5516af00f51a4634a5d43783da05f0861e", 0x68, 0x2a91}, {&(0x7f00000006c0)="b664d01c6506b1832a95ad950670f118143f405bf56a95f7d5bf2f79543a8fa533b7524d130523133e8c2a246916c808402188afeab3f5ebaac058886eabf6b47e49e9d4c8fcaa0d389203a30b0e8d368a2a4f3fea49dc6b2cb41fa4", 0x5c, 0x9}, {&(0x7f0000000740)="7e1d00a9b0d91d5e137ed522a1e726f4f1575eed6899655d464b9a9e33e18589ce837875b01900c168f8ed2b3c6718fadc2745c2612e92300d6cab748476438a6f3ae5c118587de5e586174aa61ec4f9f4efa2ae2c95e48b9c69d3a902094213291e45f90a68026a32", 0x69, 0x60e}, {&(0x7f00000007c0)="8203172988984c9477316dae691ea8394efc705a8968ddf20bfb2d044e3ace0d3d59bbaa49a2a0028c6df1f5eb74eb111cc619f031b15ef210eae4f6e85a778b61c2803b3cda5e69b38fd28ef53bd03bd4f0ebbc760385fa590a3e663b48c65ab27ad0c560d960be320cec2da2020ad873cf4e1ce3ebf05a6357a8a5d0b169c8bdd92f57b4c525a67cbba11f82f699472c3c7f08922911999b8235a19ace04", 0x9f, 0x1}, {&(0x7f00000002c0)="f3ebcdacd51fc0b97afa51879a8cfa3885c5b4d106c9ed420ed5340965c8dbb54bb402dbabece93da54e9a", 0x2b, 0x6}], 0x310024, &(0x7f0000000940)={[{@fmask={'fmask', 0x3d, 0x1f}}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x61, 0x66, 0x0, 0x39, 0x36, 0x61, 0x61], 0x2d, [0x64, 0x38, 0x63, 0x36], 0x2d, [0x66, 0x34, 0x64, 0x62], 0x2d, [0x61, 0x0, 0x64, 0x32], 0x2d, [0x32, 0x39, 0x34, 0x65, 0x31, 0x66, 0x63, 0x62]}}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@dont_measure='dont_measure'}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r3, 0x8e33d001c8982322, 0x1}, 0x14) renameat(r2, &(0x7f0000000a00)='./file2\x00', r2, &(0x7f0000000080)='./file0\x00') getdents(r2, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0xf0ff7f00000000, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 298.365589][T15958] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:10:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0xffffff7f00000000, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:43 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x3) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0xbadfb3a54e74f35e}, 0x10) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000000)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x10203, 0x2, 0x6000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) [ 298.497097][T15970] tmpfs: Unknown parameter 'fmask' [ 298.522183][ C0] net_ratelimit: 22 callbacks suppressed [ 298.522194][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 298.549619][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 298.579950][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 298.623621][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:43 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 04:10:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount(&(0x7f00000001c0)=@sg0='/dev/sg0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x80000, &(0x7f0000000280)='tmpfs\x00') open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r1 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x3, 0x40) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000340)={0x3, "48d179825c2d819757a8332cda0e0376400548824de22f6d89b3812fb43e7585", 0x1, 0xd6c9557dd72ba521}) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0xf0ffffff7f0000, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x80800) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x1f}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0xffffffff7fffffff, 0x20002000000000, 0x0, 0x8, 0x4}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0xab70a5f8658f380c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) [ 298.883672][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 298.922232][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 298.945805][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0xffffff7f00000000, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x4000, 0x0) read$eventfd(r1, &(0x7f00000001c0), 0x8) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:crond_unit_file_t:s0\x00', 0x27, 0x2) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'bond0\x00'}, 0x18) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x8000) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000180)=0x200080a4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) personality(0x200000) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) 04:10:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$describe(0x6, r0, &(0x7f00000003c0)=""/234, 0xea) r1 = open$dir(&(0x7f0000000340)='./file1\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000140)='./file0/file0\x00', 0x9) open$dir(&(0x7f00000001c0)='./file0/file0\x00', 0x101000, 0x0) renameat(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00') getdents(r1, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000200), &(0x7f0000000240)=0x4) [ 299.120673][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 299.161918][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 299.185768][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:44 executing program 2: mkdir(&(0x7f00000001c0)='./file1\x00', 0x10) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') socket$unix(0x1, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xe6bb0cb3f80dacde, 0x0) r2 = getuid() mount$9p_fd(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000200)='9p\x00', 0x1000, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_fscache='cache=fscache'}, {@cache_loose='cache=loose'}, {@loose='loose'}, {@version_u='version=9p2000.u'}, {@cache_mmap='cache=mmap'}, {@access_uid={'access', 0x3d, r2}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}, {@context={'context', 0x3d, 'root'}}]}}) 04:10:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:44 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) ioctl$FICLONE(r1, 0x40049409, r0) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000240)=0x9, 0x4) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa830}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r4, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x2a}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x40) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) r5 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x5, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r5, 0x4010640d, &(0x7f00000001c0)={0x3, 0x7}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r5, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x7fff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000000300)={0x1, 0x4, 0x5, 0x1}, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x2}}, 0x10) 04:10:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x6, 0x88946150b2312115) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000200)) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00') getdents(r1, &(0x7f0000000600)=""/177, 0xaa) mkdir(&(0x7f00000002c0)='./file0/file0\x00', 0x126) renameat(r0, &(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000280)='./file0/file0\x00') unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 300.104254][T16080] debugfs: Directory 'vcpu2' with parent '16080-6' already present! 04:10:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:45 executing program 1: r0 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, 0x0, 0xeefffdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000140)={@mcast2, 0x32, r2}) 04:10:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) socketpair(0xb, 0x0, 0x2, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000006c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x660, 0x340, 0x488, 0x0, 0x0, 0x340, 0x590, 0x590, 0x590, 0x590, 0x590, 0x6, &(0x7f0000000200), {[{{@ipv6={@dev={0xfe, 0x80, [], 0xd}, @remote, [0xff, 0xff000000, 0xff000000, 0xffffffff], [0xff000000, 0x0, 0x398fc6117a73539f, 0xff], 'ifb0\x00', 'hwsim0\x00', {0xff}, {}, 0x2, 0x7, 0x7, 0x20}, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x3}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc8, 0x110}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@broadcast, @ipv4=@loopback, 0x27, 0xc}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x0, 0x400, 0x1}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x1, 0x1, 0x1}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x2, 0x6}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x0, 0xd70, 0x8, 0xff, 0x71, 0x0, 0x80}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xc8, 0x108}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x2, 0xa4be, @ipv6=@mcast1, 0x4e21}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6c0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) syz_mount_image$ceph(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0)='./file0\x00', 0x7, 0x5, &(0x7f0000000580)=[{&(0x7f0000000340)="d47c89be2a4aecebc819b91538526f7ba7c963b4d0a3c143ba5291d36ca4c5664907f290513d7d70a446c76d40e9878b", 0x30, 0x8}, {&(0x7f00000003c0)="113b6171a01fbf561c9278da4df89c0a47a9277691cd2c4cced61d77b8fcf3ebce504a17feb3784f8e977080837210e4c36b455e24922205408b5d6bfd2b3aa765d77bcdafcf8429de17cd63e7a8e566a720d2f07e833161a88ef3b8804803daeacda7cbfa7982151c922414921e81d9108f03af6a3c3f0ed38d2323f91671336ed1e171ff9608aca6fa304d4dddf07f8c72b5891487732d9b59f5f1252993456b", 0xa1, 0x7fff}, {&(0x7f0000000480)="2213baaec0a7d20fbe80ae73927d0300ce96003accdb0db028c7dc1847266a4d033be6df7ae11d36fa6b60ba9f29b508410a1dd0c47cf93fafb4237c93e3ccb0803fcdc83834f44011d09a0550473118e8cac70d5c300801c75d00409278be0511325445abb8d331036bd5e189c0e19474a98cfb94e582c08074b8cf07e76d744ca54900bd5110de8d5e1390ede8487db081b7b76167485a6cfc942bee15b8ce1a6bfba9c1fc9959bd514321e0bb04fc8cfc191b104752ce4793d07d472e57f782bf54159a46cd480f0663c37d43d3e4a05e987d05a9d7ec6c029a0e38864fb5d857eed9", 0xe4, 0x10000}, {&(0x7f0000000d80)="ff9ef8fbe0dd1fe93c436c59990f90bd2a664aa073cfc0c1ae4e9a694b995610c94ec1700d93956db0d8ccce1198bd1f362b7c0b49f890d564fc66d3f3acdd08f732cff54f0d744ea1e3702b561f1ba2f13de881ed68ec6a4e5cdbbb11884237825d6ca24dc3043a6f6f95ae504beb2a4a52804601beb77a04dad24bcee1d67c4feeb9586400ab711d968bd3843cd2c7ba945e1d32d3d6e880ad9b7995ac0b3e", 0xa0, 0x8}, {&(0x7f0000000e40)="c2010b626f61cbb85554314f7041d3f435d10b8e21da3d7eb379beaad12ed1ab4ad237faca5e710378fc4e7cd6d9f5b52558f17944d860fdca1505746f3abc48016897175f0eb9dc120bda436423d0a862c8151d4b9195bc147811ad21d6832880a8916f4b746d2f677e166c5ce388c286905d165dd71c40f265b95a0320bbd29aac7bf56664c41c6b2c5c73d6022c156e7e40dc7b394ed8cbf3c34fa0055f69c34336ded7d38ab48aaef2621d422cfdf3db1498f93fde92483d4b32d9a617fb32d68d4544dabf59751f67807f5cfc84ac0c7f2e155cc4dd682d4a2117473b8b9388b5039928e628fde79df2", 0xec, 0x5}], 0x841008, &(0x7f0000000f40)='NFQUEUE\x00') renameat(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00') getdents(r1, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x22100, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000040)={0x8, 0x3f, 0x1, 0x8000000000}, 0x6) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:46 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@gettaction={0x138, 0x32, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0x64c}}, {0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8}}, {0x14, 0x1d, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x80, 0x1, [{0x10, 0xa, @TCA_ACT_INDEX={0x8, 0x3, 0xa7}}, {0x10, 0x11, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x14, 0x10, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x18, 0x18, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8}}]}, @action_gd=@TCA_ACT_TAB={0x44, 0x1, [{0x10, 0x1a, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x1b, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0xd, @TCA_ACT_INDEX={0x8, 0x3, 0xcf5}}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) 04:10:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000080)={0x0, 0xb5, 0xe1ff29cebd75edc9}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x600002, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) prctl$PR_GET_SECCOMP(0x15) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:46 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x99, 0x500) accept$unix(r1, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:46 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)='tmpfs\x00', 0x110, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0/file0\x00', 0xe, 0x2) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0x800) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000280)=&(0x7f0000000240)) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xf0ff7f}}, 0x20008000) 04:10:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x84000, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000100)=0x63, 0x2) 04:10:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x7ffff000}}, 0x20008000) 04:10:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:47 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000240)='./file0/file0\x00', 0x800, 0x2) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') mknodat(r1, &(0x7f0000000400)='./file0\x00', 0x1, 0x2) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x28, r3, 0xc1057c10eefcc342, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000200)) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$pptp(0x18, 0x1, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e24, 0x4c9, @loopback, 0x5}, @in6={0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, [], 0x25}, 0x9a}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0x4, @ipv4={[], [], @local}, 0x100}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e21, 0x0, @mcast2, 0xffe0000000000000}, @in6={0xa, 0x4e20, 0xf3, @rand_addr="7d3b78a103783c4bfa5f3628eaa63e41", 0x800}], 0xcc) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40, 0x0) write$P9_RSTATFS(r4, &(0x7f0000000040)={0x43, 0x9, 0x2, {0x100000000, 0x7, 0x14, 0x5, 0x386f, 0x9, 0x0, 0x2b, 0x5}}, 0x43) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) 04:10:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:47 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0xe, 0xb, 0x409, 0x70bd29, 0x25dfdbfb, {0x3, 0x0, 0x6}, [@nested={0x3c, 0x3f, [@generic="5a5c0bc87afb72079fef8f81080cca6fdc952a46d574ad430980879ff6e505efad92a4", @generic="07b0b284500fb9de1ffa", @typed={0x8, 0x49, @fd=r1}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x40000) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xf0ff7f}}, 0x20008000) 04:10:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xffffff7f}}, 0x20008000) 04:10:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x7ffff000}}, 0x20008000) 04:10:47 executing program 2: getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clock_gettime(0x4, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x4, 0x100000) getdents(r1, &(0x7f00000003c0)=""/177, 0xb1) r2 = dup3(r1, r1, 0x80000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000540)) unlink(&(0x7f0000000500)='./file0/file0\x00') 04:10:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x7ffffffff000}}, 0x20008000) [ 301.962012][T16201] debugfs: Directory 'vcpu0' with parent '16201-8' already present! [ 302.077917][T16201] debugfs: Directory 'vcpu0' with parent '16218-8' already present! 04:10:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xffffff7f}}, 0x20008000) 04:10:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xf0ff7f00000000}}, 0x20008000) 04:10:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x48000, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f0000000040), &(0x7f0000000080)) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:47 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) dup3(r0, r0, 0x80000) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x4, 0x920c0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000200)={0x6, 0x5, 0x7ff, {0x0, 0x989680}, 0x3, 0x6}) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:47 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000000)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @remote}, &(0x7f0000000080)=0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@local, @loopback, @dev={0xfe, 0x80, [], 0x13}, 0x1, 0x2, 0x7, 0x400, 0x100000000, 0x2020080, r2}) fcntl$getown(r0, 0x9) sendfile(r0, r1, 0x0, 0xeefffdef) ioctl$KDSETLED(r0, 0x4b32, 0x400) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) ioctl$TIOCSTI(r0, 0x5412, 0x0) 04:10:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x7ffffffff000}}, 0x20008000) 04:10:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xf0ffffff7f0000}}, 0x20008000) 04:10:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:47 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x20000, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000200)={0x6}, 0x1) getdents(r1, &(0x7f0000000600)=""/177, 0xb1) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) ptrace$poke(0x4, r3, &(0x7f0000000280), 0x37cb) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:47 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) 04:10:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xf0ff7f00000000}}, 0x20008000) 04:10:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xffffff7f00000000}}, 0x20008000) 04:10:48 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='G\x91\xfc\xd4\'\x8e\x1dV\x7f\x96\xfa\xf6\xa5)F\x9c\xe2\xe7\xf2n\xddyM\x05\xe8\x9b\x048\x9c\xe5$m\xfdy\xcfd\xc7\xc0\x05=\xf9\xd4\x9a\xb2\xb8\v^\xb2$\xe3B\xb7\x93iy\xb1r\xa1\x83\x97Z\xdb\x0e|\b%[\xec\xe8\xa8S!?k\xcf\x14\xe6\x01\x80s\x8a\xda;m\x9dR\x15!\xeaHn\xac\xaf\xbaE\x00\xd5\xd07\x84:\xe0\xb5\x9e;\x01\x8fbgG\xa8\x05\x12\xe9R\xb4v\xda\xb4k\x86\xdf\x87\xfdU\x19K\x02[\n%\xc4\xf3\xdb\xe8\xec\xfe\x11g\x14o\xf0i\a\xdf.\xd4iT\x11As\xfa', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0/file0/file0\x00', 0x14, 0x1) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x81, 0x101000) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000200)={0x100000000, 0x80000001, 0x5, 0x100000001, 0x101, 0x8}) 04:10:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) timerfd_create(0x5, 0x80800) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000000)={0xfffffff7, 0x3, 0x5, 0x1}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0xfffffffffffffffc) 04:10:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000600)=[&(0x7f0000000040)='/dev/vbi#\x00', &(0x7f0000000080)=').vmnet1[%$[\x00', &(0x7f00000000c0)='/dev/vbi#\x00', &(0x7f0000000100)='/dev/vbi#\x00', &(0x7f0000000140)='/dev/vbi#\x00', &(0x7f0000000180)='/useruser\x00', &(0x7f0000000200)='/dev/vbi#\x00', &(0x7f0000000240)='em1selfmime_type\x00'], &(0x7f0000000580)=[&(0x7f00000002c0)='\x00', &(0x7f0000000300)='/dev/vbi#\x00', &(0x7f0000000340)='+{-,\x00', &(0x7f0000000380)='/dev/vbi#\x00', &(0x7f00000003c0)='lonodev\'\x00', &(0x7f0000000400)='keyring\x00', &(0x7f0000000440)='security)\x00', &(0x7f0000000480)='\xbc^cgroupbdev\x00', &(0x7f0000000500)='/dev/vbi#\x00', &(0x7f0000000540)='!\x00'], 0x1000) sendfile(r0, r0, 0x0, 0x200000004) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:10:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:48 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000200)={0x80000000, 0x5}) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000700)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0xa8000552}, 0xc, &(0x7f00000006c0)={&(0x7f00000004c0)={0x11c, r2, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe3da}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xa0}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x5, @remote, 0xfffffffffffff800}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r3 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r3, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000240)='./file0/file0\x00') getdents(r1, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0x54, r4, 0x100, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2e9}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) 04:10:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x2}, 0x20008000) 04:10:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xf0ffffff7f0000}}, 0x20008000) 04:10:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000ff9000/0x4000)=nil}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) [ 303.700974][ C1] net_ratelimit: 47 callbacks suppressed [ 303.700985][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 303.707301][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 303.738414][T16325] Unknown ioctl 1074310753 04:10:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 303.748942][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x8}, 0x20008000) [ 303.820934][T16330] Unknown ioctl 1074310753 [ 303.832791][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:49 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mknodat(r0, &(0x7f0000000200)='./file1\x00', 0x40, 0xfffffffc) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x3, 0x1) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000240)=""/93) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000540)=""/177, 0x77) unlink(&(0x7f00000000c0)='./file0/file0\x00') ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f00000003c0)={&(0x7f00000002c0)=[0x6, 0xffffffff9c1449d2, 0x0, 0x1000, 0x3, 0x3, 0x9], 0x7, 0x1, 0x3f, 0x3, 0x5, 0x3, {0xff, 0x5f, 0x1ff, 0x400, 0x0, 0xc0a, 0x6, 0x0, 0x6, 0x2, 0x2, 0x154e, 0x5, 0x0, "31c6559c2ddfa2a22490a50fb9a4c5e2283c43845ac4292aac7b360339932a28"}}) 04:10:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 303.884635][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xffffff7f00000000}}, 0x20008000) 04:10:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x181000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:49 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0x6) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bcsf0\x00', 0x0}) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000080)) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000040)=r2) [ 303.997866][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 304.021057][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 304.043272][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0xf0ff7f}, 0x20008000) 04:10:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) [ 304.157184][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:49 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x2}, 0x20008000) 04:10:49 executing program 1: r0 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r0, 0x1000000) sendfile(r0, r0, 0x0, 0xeefffdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) 04:10:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2040, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000100)={0x10000, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}}}, 0x88) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, 0x5, {0x7, 0x1f, 0x157, 0x20000, 0x0, 0xea3, 0x7, 0x101}}, 0x50) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) [ 304.272570][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) 04:10:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x7ffff000}, 0x20008000) 04:10:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x8}, 0x20008000) 04:10:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) 04:10:49 executing program 2: mkdir(&(0x7f00000001c0)='./file1\x00', 0x4) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x20) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0xffffff7f}, 0x20008000) 04:10:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0xf0ff7f}, 0x20008000) 04:10:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x402, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x8000) ioctl$TCSETSW(r4, 0x5403, &(0x7f0000000040)={0xb5, 0x6, 0xfffffffffffffffa, 0x4, 0x1a, 0x4, 0x5, 0x4, 0x10000, 0x5, 0x8, 0x6}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x9) 04:10:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:50 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) r1 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x2, 0x2) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000200)=0x400) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:50 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) bind$bt_rfcomm(r4, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$P9_RWALK(r4, &(0x7f0000000040)={0x9}, 0x9) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0xfffffffffffffffd, 0xd8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r5, 0x9}, &(0x7f0000000180)=0x8) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x7ffffffff000}, 0x20008000) 04:10:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x7ffff000}, 0x20008000) 04:10:50 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x4000, 0x0) sendto(r0, &(0x7f0000000200)="b5d518b6a0132139cf9a3af52c3d4a257d14e9a4fa2e6a79372f838a289cb90d01a88cdf7c9a784dbbd295e91f97154639c9d01aa8839ed3aa3821505e9e11b15f36d75cde7a795dadd0347f2aafe46ca62a33d472b472ac90aa140b8a614f4d3b500c8dbe9ef5edf303f0669b07ad43", 0x70, 0x80, &(0x7f0000000280)=@sco={0x1f, {0x1, 0xffffffffffffff8a, 0x1, 0x1cb, 0x49cba554, 0x8}}, 0x80) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f00000003c0)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00') getdents(r1, &(0x7f0000000600)=""/177, 0xaa) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getuid() r3 = add_key(0x0, 0x0, &(0x7f0000000300)="1318da84b6a633608d3b9bc0a1e83ef79bbc50b109b615b2af447fa201e0acf5b5279e03ef1b0c9dca4fae8159a4f6e7450f384d817d95bb8d2c496a3d52b0ac2a214ca90ec8948f79fee815f6de15dfcddf0606b9de72aad32740f7", 0x5c, 0xffffffffffffffff) r4 = getgid() keyctl$chown(0x4, r3, 0x0, r4) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0/file0\x00') sendmmsg$sock(r0, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000006c0)="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", 0x1000}, {&(0x7f0000000400)="be3e6e682cd6f1e7440e7ed762557685e9c2aa2e30881f81c1983eb6cc34ab9d02010ba93d76b71c195a5751425c0579171e0faa0ca9c1589f07f075eea3bc3f11d019817723c7c923d2c3bd67b1e2cff6d66622d6d3ad3d80c7290e9a60c9e668a0139f1837588ab6e97a83ba3dae33529893831746256e890369cbf8a86a4f6c8670e781355820be7475823592ab5a0cf581f84480a148", 0x98}, {&(0x7f00000004c0)="39ee9505f65a9e2193c6f9daa7e3b062b980545b9a534911cdfbce9b2ccca8b1a0d3b81ef5e162fcd3c8a9a825be01406dd54418d1c925368abc82f14dcb222c7ae2fa196a62aa0060669d8cdb5e1f3b18b08adff4d7c43cbb682384882c64b633b7f319533847abebe0c381e608230ee3", 0x71}], 0x3}}, {{&(0x7f0000000540)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x2, 0x1, 0x3}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000016c0)="74694773cc7bcdb2b4db50d84121f752b4cc670dd919e0a573a93ea57c70211a8dad7c06ce6583a663343a60eeffc72e34f1e84cf44582a67362a793d0f3ee978c6b7699f93fd378d280fc7569a3aeeca3d587ad118fb2cd4cfefdcdfaa5c34b03cdb7c5e7fad4555dbd7b4bb8e92fdc7f00ca03f8fd3068dea70e9970963ff62b8e536bdd1385a137a12217cd3fc05f9cf389c37df5b588973fe66d949a62e367bc1f6d473855e094", 0xa9}, {&(0x7f0000001780)="b0d5c0fe58ddc2dbe316de2401586d6e8fed58a7b3d49ccbed82a1ce3ebe7b923868ebe929c275fe661dc5de0b1b789903e418323f8ac506c59c40e74f1f85b98c1e1394432e52136a955f55d8a4f41a35e183adcbaae2a0d1d1c20236243594edbdfa7b5c7f39d3a1a77a7a43eca8a465b6e4f52c98", 0x76}, {&(0x7f0000000340)}], 0x3, &(0x7f0000001800)=[@txtime={{0x18, 0x1, 0x3d, 0x1000}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0x30}}, {{&(0x7f0000001840)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x80, &(0x7f0000001c80)=[{&(0x7f00000018c0)="31a563c116139cfb4a7cb54838188fc3fa002fffda01c4309e5ddaf5bf556c0195393aa789f7d6b81455cc8185446e8aadec4331e39af9cf64533eb1544b1937c04e918b5839d37d2625ba6efaadceb7ba4319d9a1bd15168939a0dd6554f697032edb0f276edacd", 0x68}, {&(0x7f0000001940)="cad87234254a4233eb881de7d898d66882f9b6e6175f919549da93268ca4359438992276e9caa5697e1e0f51af2e92d9d9b6a566ab96b906f7a9bae7289913b0f8c8ab788d5f8069874623dd90ccea125b9641e5580dfe8fc5c44d027cd22369d3b0", 0x62}, {&(0x7f00000019c0)="f8122be75e2daa65e336e367", 0xc}, {&(0x7f0000001a00)="ca6c18ac1fb1f43847212d2d9f95dca969440963db2784984a6d9a7ea222f07f8add63d30c0a4d223464f4a8bccfd49ba612a60eab34e28f69adfe580520793a8715aecc970cb41aa4d61206199a3bc68d1b23e7b6ae585c5a5e788a06e1734436b9e1de2b7ed7df7b75d7b5e645253f08ce4dba07255179a6f5f9a6b7e463507da45e18a187b34cc8e3d5379daa60fabae307fb93d40e69af2206fadd15915c6402ca43feee811a1841767e761b6a4c260e8a20e9b4b7a6ac2edcd7b750676236496698f2419b050738c6d2c0474a3f", 0xd0}, {&(0x7f0000001b00)="752565f0f33d082e93036e7980388cb75e2c632a3abbb4ce4280ca262f3e00c1d22c91b1cfa44a10e1e465e979def521d5a0e5c44b6f44ef515b007516e8fcaca272257791792f714db25921fabcfd8737b5ef921af8a0463f72bd58d20237a80eb6acdb1ee5369b18de50bd9196216f26487ed68a09e4f1eb00a9862f1e7c42466d970d2a5cf1b226fcb9e072eb516751b2cb72662f4632b2af288670c2d4496b4699b48ece2c4cd3380f9a8e71ad320ed01bc14dc322aa41decf74264a7dd45df3a24be4eb26becaf7f3176190f41dae858aabc67e05ef877f22841b095045fb2798e7507f6b7f28d3c235a20c759f1678228835cdd1e84bd1641e1e", 0xfd}, {&(0x7f0000001c00)="403aaf57b18e40d8a438143ee143f66b0c9c943fbe9b7a6bf86c76a39eca7bc0a2e7494a02d2921c503c36b03d8ecf960aadbfb73d74d9df487a07dcd344835f9ff4b037737a021dc907016621aca202a44c2c0d9f2b8ddf6a155dd1af5a3d670e7e", 0x62}], 0x6, &(0x7f0000001d00)=[@mark={{0x14, 0x1, 0x24, 0x10000}}, @mark={{0x14, 0x1, 0x24, 0x1f}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0xff}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0xc7d}}, @mark={{0x14, 0x1, 0x24, 0x80000000}}], 0xa8}}, {{&(0x7f0000001dc0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @local}, 0x1, 0x0, 0x2, 0x1}}, 0x80, &(0x7f0000003200)=[{&(0x7f0000001e40)="fac27bb061580afb3bf94a6b6aa7bcf0bafd2dd76533baa57db3dbd45ddee60525f78ff668f266bad5eb2f", 0x2b}, {&(0x7f0000001e80)="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", 0xff}, {&(0x7f0000001f80)="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", 0x1000}, {&(0x7f0000002f80)="810fa4ccec20f092c64b22bedf62422037", 0x11}, {&(0x7f0000002fc0)="fffd6b2b8c55b95ccfac7242c87f7ac7714ae8d8be8129d974932cbd8dbcc89cbc1f5bee5446ef0803c5baae9172293781677264f12a85e1aad88dd3610f7ac0b6b6fdf18a48fd9ae67f01122ca813ee98ee0b568f43afddcadf3ae5df0e7d4b0b5b2b05b5d4a33cc8dc38ab70615fddf056943332e31945fbbaae08b64cd5b82daf0e725a37999dedcc8ade689d6cfab6", 0x91}, {&(0x7f0000003080)="333d3d81d806235dd605201d8d890b6deff4f57e2791d61ad294bae013deecf6f3fce18d2d2b423d2c819d3ff34ec81e7261430867de8a60ff702da9caf887af22b6123862a0e88f24c3b6c054deb3144f1a6b75fe7dde4e286fbf07c1b354947172376684ac8d80663b4b4bf6180788b911400d76c18bb9538d13163a09496468490c70a29c31060d780a10cb0e5c13ab3d0fca69f100b74b31700bc080ae581a7e30985b3ffaaafac6082bcda7db2e82a17104a6edcc0c9a7e1b763324fd46938a3d4e7480a556c384", 0xca}, {&(0x7f0000003180)="38d826abae890050e8883f87835ba0a9ba0eff21e8090c40d15db68413dff11ac70f25e615be15fd6b47561a09bbd9b1295ab5eb081c25ecc1d7d54fc1c9bbf48f35d22f01e42dced729cddcff82a11aa8318e5512c7039969d503d7e23310eedcc5c1a2afe3e59a397de831608165cd4131", 0x72}], 0x7, &(0x7f0000003280)=[@txtime={{0x18, 0x1, 0x3d, 0x80}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0xb}}], 0x48}}, {{&(0x7f0000003300)=@ethernet={0x306}, 0x80, &(0x7f0000003440)=[{&(0x7f0000003380)="78e13559620c3ff5d0cb3039931f8de8a61fe569c30806476201e09f40291121646c556589dbac2faff7bfed00b93a98f2a3cd46ac5952abc5165e803b2cd48c5e1905b13a19aa7a3bbb4570c3e80a74f7ebb2a3507cba9f93f44cbd39a17aa5605066e80e046a45101a749e4f8a9b4de70cfae6c36dd63e4b49d85a1096a8d587fd937da515fb4f1f18bf04a8634511f00cd1fa7fee28ae4b61588d2c01506bf668ed8b3ea96694ca7290af1ae5fde9a202a5eed4037e63b062aaff", 0xbc}], 0x1, &(0x7f0000003480)}}], 0x5, 0x1) 04:10:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000040)={0x2, 0x0, [{0x80000007, 0x3ff, 0xfffffffffffffffc, 0x100000000, 0x4}, {0x80000007, 0x5e7, 0x1870, 0x29, 0x401}]}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) fcntl$getown(r2, 0x9) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f0000000080)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = add_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="31e04e74abe96a1d01eda970c23abd7726af2452eb626ade32b8b8d178d9e625baa4a409fc2009c7a47ee42613830edf186049e862ff04f6ed8674282a70bfe11c52bad18b351eca823d604206a4dbb98f6978467753a010ec98d7e7ea2c3eb9d5a5a6342458d351e95be4d2733d238e3780b4751513eae19b9c737ff31b175f745c9babcb27431685deea7092c74ed12e18c13338bd6a7c7e18752151e3d24a1a7ef12cad24d3619643cc23b87c7f2d9c77267710024010092ddd5e2be72d9444f41a366fb1e53edd44a786153748f357f0c497", 0xd4, 0xfffffffffffffffd) stat(&(0x7f0000000280)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r4, r5, r6) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0xf0ff7f00000000}, 0x20008000) [ 305.326990][T16448] overlayfs: workdir and upperdir must reside under the same mount 04:10:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0xffffff7f}, 0x20008000) [ 305.459879][T16448] overlayfs: workdir and upperdir must reside under the same mount 04:10:50 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x200000) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000200)=0x100004, 0x4) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x7ffffffff000}, 0x20008000) 04:10:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:51 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x4e22, @multicast1}, {0x8ef8c402148f8ce6, @dev={[], 0xf}}, 0x42, {0x2, 0x4e24, @broadcast}, 'bridge_slave_0\x00'}) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x400088) 04:10:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0xf0ffffff7f0000}, 0x20008000) 04:10:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0xf0ff7f00000000}, 0x20008000) 04:10:51 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x800}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0x1c}, 0x542}}}, &(0x7f00000001c0)=0x84) 04:10:51 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) fcntl$setlease(r0, 0x400, 0x0) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:51 executing program 5: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 04:10:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0xffffff7f00000000}, 0x20008000) 04:10:51 executing program 2: mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0/file0\x00', 0x40, 0x0) getdents(r0, &(0x7f0000000240)=""/211, 0xd3) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0xf0ffffff7f0000}, 0x20008000) 04:10:51 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x8) sendfile(r0, r1, 0x0, 0xffffffff) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3f, 0x80000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x0, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) 04:10:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0xf0ff7f}, 0x20008000) 04:10:51 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x400, 0x0) r1 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x3, 0xfffffffffffff100, 0x8, 0x0, 0xc1e, 0x2cd8c0fd1d8b7209, 0xb, 0x4, 0x5, 0xffff, 0x3, 0x7, 0xff, 0x0, 0x0, 0x200, 0xff, 0x0, 0x4, 0xffff, 0x1, 0x4, 0x5, 0xffffffffffffff81, 0x3, 0x0, 0x3ff, 0x40, 0x7, 0x40, 0x7, 0x1000, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0xae2dbd1ef3241841}, 0x4000, 0x6, 0xffffffffffff42a7, 0x6, 0x1f, 0x900000000000, 0x1}, r1, 0xe, r0, 0xb) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000200)={0x3ff, 0x0, 'client1\x00', 0x1, "f411948a4640025d", "63886982fd6e9a05355b41da7c983f23b6b806eb890d5445f3b3bab2d612f2a2", 0x200, 0x1f}) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f00000002c0)) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mknodat(r2, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r2, &(0x7f0000000000)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00') getdents(r2, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:51 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x10020006004, 0x0) mount(&(0x7f0000000280)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='vfat\x00', 0x0, 0x0) ftruncate(r1, 0x1000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e21, @loopback}}, [0x1, 0x400, 0x5, 0xfffffffffffffffb, 0x101, 0xffffffffffffffff, 0xfffffffffffff001, 0x3, 0x1, 0x4, 0x8000, 0x4, 0x8, 0x824, 0xffff]}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r2, 0x3}, 0x8) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 04:10:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000200)={'NETMAP\x00'}, &(0x7f0000000240)=0x1e) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x3, 0x103000) ioctl$KDSETLED(r4, 0x4b32, 0x80) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) uselib(&(0x7f0000000140)='./file0\x00') r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10001, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r5, 0x800443d2, &(0x7f0000000100)={0x4, &(0x7f0000000040)=[{}, {}, {}, {}]}) write$smack_current(r5, &(0x7f0000000280)='/dev/kvm\x00', 0x9) openat(r5, &(0x7f0000000180)='./file0\x00', 0xc0, 0x20) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) 04:10:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0xffffff7f00000000}, 0x20008000) 04:10:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x7ffff000}, 0x20008000) [ 306.742423][ T2485] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 306.755582][T16558] FAT-fs (loop2): unable to read boot sector 04:10:52 executing program 5 (fault-call:4 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="8903a1784901000001a0ffffffffc4578ad7026b00576558cd020093dd86dd00008848ba0800451fc40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551516248e07573977c5eff11680107fdf79d1af8f4e56309ac9733d41cc0ff11999dec3740f0853200000000000115a21971dd1feb6c2bf65905e863b7d342ed5293033159b87069ccc2c25b80a1de96ea6221dc9adca6c19c1a979d81f287627b3ac0fe5d5d644dc299c6e5b1bbae122dcae5c4d3470b7ee0b23c466a410c5d885662de4bcfd4d73c0da00789d086dc805524b1df92b3c21d6605f191bed951f20a1560f7adf0c24ee5cb2e8dc126d94c3c5c26c01b572745bf81fb8a9607b6186fc72259d4504dc75ab7c6b5112"], 0x7ffff) 04:10:52 executing program 4 (fault-call:6 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0xf0ff7f}, 0x20008000) 04:10:52 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x48081, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000200)=0x4) creat(&(0x7f0000000240)='./file0\x00', 0x10) 04:10:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0xffffff7f}, 0x20008000) [ 307.183385][T16573] FAULT_INJECTION: forcing a failure. [ 307.183385][T16573] name failslab, interval 1, probability 0, space 0, times 0 [ 307.204337][T16573] CPU: 0 PID: 16573 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 307.213542][T16573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.213549][T16573] Call Trace: [ 307.213573][T16573] dump_stack+0x172/0x1f0 [ 307.213598][T16573] should_fail.cold+0xa/0x15 [ 307.213617][T16573] ? fault_create_debugfs_attr+0x180/0x180 [ 307.213637][T16573] ? page_to_nid.part.0+0x20/0x20 [ 307.213654][T16573] ? ___might_sleep+0x163/0x280 [ 307.213673][T16573] __should_failslab+0x121/0x190 [ 307.213689][T16573] should_failslab+0x9/0x14 [ 307.213702][T16573] kmem_cache_alloc_trace+0x2d3/0x790 [ 307.213716][T16573] ? __might_fault+0xfb/0x1e0 [ 307.213736][T16573] tls_set_device_offload+0xc5/0xec0 [ 307.213754][T16573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.213770][T16573] tls_setsockopt+0x4ad/0x8d0 [ 307.213805][T16573] sock_common_setsockopt+0x94/0xd0 [ 307.241916][T16573] __sys_setsockopt+0x261/0x4c0 [ 307.241932][T16573] ? sock_create_kern+0x50/0x50 [ 307.241947][T16573] ? fput+0x1b/0x20 [ 307.241970][T16573] ? switch_fpu_return+0x1fa/0x4f0 [ 307.266968][T16573] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 307.266986][T16573] __x64_sys_setsockopt+0xbe/0x150 [ 307.267008][T16573] do_syscall_64+0xfa/0x760 [ 307.283362][T16573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.283373][T16573] RIP: 0033:0x459829 [ 307.283389][T16573] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.283396][T16573] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 307.283409][T16573] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 [ 307.283417][T16573] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 04:10:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x7ffffffff000}, 0x20008000) 04:10:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0xf0ff7f00000000}, 0x20008000) 04:10:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x7ffff000}, 0x20008000) [ 307.283425][T16573] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 307.283440][T16573] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 [ 307.302974][T16573] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 [ 307.470594][T16582] FAULT_INJECTION: forcing a failure. [ 307.470594][T16582] name failslab, interval 1, probability 0, space 0, times 0 [ 307.483325][T16582] CPU: 1 PID: 16582 Comm: syz-executor.5 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 307.492544][T16582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.502599][T16582] Call Trace: [ 307.505900][T16582] dump_stack+0x172/0x1f0 [ 307.510260][T16582] should_fail.cold+0xa/0x15 [ 307.514872][T16582] ? fault_create_debugfs_attr+0x180/0x180 [ 307.520686][T16582] ? __mutex_lock+0x45d/0x13c0 [ 307.525450][T16582] ? __kasan_check_read+0x11/0x20 [ 307.530477][T16582] __should_failslab+0x121/0x190 [ 307.535419][T16582] should_failslab+0x9/0x14 [ 307.540312][T16582] kmem_cache_alloc+0x47/0x710 [ 307.545081][T16582] __build_skb+0x26/0x70 [ 307.549329][T16582] __napi_alloc_skb+0x1d2/0x300 [ 307.554196][T16582] napi_get_frags+0x65/0x140 [ 307.555554][T16590] device nr0 entered promiscuous mode [ 307.558787][T16582] tun_get_user+0x16bd/0x3fa0 [ 307.558811][T16582] ? tun_build_skb.isra.0+0x1390/0x1390 [ 307.558834][T16582] ? lock_downgrade+0x920/0x920 [ 307.574495][T16582] ? tun_chr_close+0x180/0x180 [ 307.584093][T16582] ? _kstrtoul+0x170/0x170 [ 307.584124][T16582] tun_chr_write_iter+0xbd/0x156 [ 307.584144][T16582] new_sync_write+0x4d3/0x770 [ 307.598137][T16582] ? new_sync_read+0x800/0x800 [ 307.602929][T16582] ? __fget+0xa3/0x560 [ 307.607030][T16582] ? common_file_perm+0x238/0x720 [ 307.612059][T16582] ? __fget+0x384/0x560 [ 307.616223][T16582] ? apparmor_file_permission+0x25/0x30 [ 307.621775][T16582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.628026][T16582] ? security_file_permission+0x8f/0x380 [ 307.633666][T16582] __vfs_write+0xe1/0x110 [ 307.638012][T16582] vfs_write+0x268/0x5d0 [ 307.642273][T16582] ksys_write+0x14f/0x290 [ 307.646867][ T2484] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 307.647119][T16582] ? __ia32_sys_read+0xb0/0xb0 [ 307.658080][T16601] FAT-fs (loop2): unable to read boot sector [ 307.662716][T16582] ? switch_fpu_return+0x1fa/0x4f0 [ 307.662735][T16582] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 307.662755][T16582] __x64_sys_write+0x73/0xb0 [ 307.684452][T16582] do_syscall_64+0xfa/0x760 [ 307.688947][T16582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.694826][T16582] RIP: 0033:0x459829 [ 307.698735][T16582] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.718593][T16582] RSP: 002b:00007f40f7cf6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 307.727011][T16582] RAX: ffffffffffffffda RBX: 00007f40f7cf6c90 RCX: 0000000000459829 [ 307.735068][T16582] RDX: 000000000007ffff RSI: 0000000020000340 RDI: 0000000000000003 [ 307.743025][T16582] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 307.750982][T16582] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7cf76d4 [ 307.759039][T16582] R13: 00000000004c9992 R14: 00000000004e1008 R15: 0000000000000005 04:10:52 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000000)='/dev/vbi#\x00', 0x16) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000040)) 04:10:52 executing program 4 (fault-call:6 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0xffffff7f}, 0x20008000) 04:10:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0xf0ffffff7f0000}, 0x20008000) [ 307.893600][T16609] FAULT_INJECTION: forcing a failure. [ 307.893600][T16609] name failslab, interval 1, probability 0, space 0, times 0 [ 307.908285][T16609] CPU: 0 PID: 16609 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 307.917638][T16609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.927709][T16609] Call Trace: [ 307.931016][T16609] dump_stack+0x172/0x1f0 [ 307.935362][T16609] should_fail.cold+0xa/0x15 [ 307.939964][T16609] ? fault_create_debugfs_attr+0x180/0x180 [ 307.945801][T16609] ? page_to_nid.part.0+0x20/0x20 [ 307.950828][T16609] ? ___might_sleep+0x163/0x280 [ 307.955723][T16609] __should_failslab+0x121/0x190 [ 307.960664][T16609] should_failslab+0x9/0x14 [ 307.965165][T16609] kmem_cache_alloc_trace+0x2d3/0x790 [ 307.970538][T16609] ? __might_fault+0xfb/0x1e0 [ 307.975223][T16609] tls_set_device_offload+0x10b/0xec0 [ 307.980598][T16609] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.986839][T16609] tls_setsockopt+0x4ad/0x8d0 [ 307.991520][T16609] sock_common_setsockopt+0x94/0xd0 [ 307.991535][T16609] __sys_setsockopt+0x261/0x4c0 [ 307.991550][T16609] ? sock_create_kern+0x50/0x50 [ 307.991570][T16609] ? fput+0x1b/0x20 [ 308.010228][T16609] ? switch_fpu_return+0x1fa/0x4f0 [ 308.015344][T16609] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 308.021440][T16609] __x64_sys_setsockopt+0xbe/0x150 [ 308.026565][T16609] do_syscall_64+0xfa/0x760 [ 308.031071][T16609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.036958][T16609] RIP: 0033:0x459829 [ 308.036974][T16609] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.036981][T16609] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 308.037002][T16609] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 [ 308.068973][T16609] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 308.068981][T16609] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 308.068990][T16609] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 [ 308.068998][T16609] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 04:10:53 executing program 5 (fault-call:4 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="8903a1784901000001a0ffffffffc4578ad7026b00576558cd020093dd86dd00008848ba0800451fc40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551516248e07573977c5eff11680107fdf79d1af8f4e56309ac9733d41cc0ff11999dec3740f0853200000000000115a21971dd1feb6c2bf65905e863b7d342ed5293033159b87069ccc2c25b80a1de96ea6221dc9adca6c19c1a979d81f287627b3ac0fe5d5d644dc299c6e5b1bbae122dcae5c4d3470b7ee0b23c466a410c5d885662de4bcfd4d73c0da00789d086dc805524b1df92b3c21d6605f191bed951f20a1560f7adf0c24ee5cb2e8dc126d94c3c5c26c01b572745bf81fb8a9607b6186fc72259d4504dc75ab7c6b5112"], 0x7ffff) 04:10:53 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0xc0c40, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000200)={0x100000000, 0x95}) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f0000000280)='./file0/file0\x00') 04:10:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) write$P9_RLOPEN(r0, &(0x7f0000000000)={0x18, 0xd, 0x1, {{0x0, 0x0, 0x2}, 0x86d}}, 0x18) ftruncate(r0, 0x1100000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x114, r2, 0xc8473bce9b5c17a3, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x12}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x39}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x37}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1d}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9bd29bb}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x2a}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x64180}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0xef6f6994e3b5a51c}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xe}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x114}, 0x1, 0x0, 0x0, 0x4000804}, 0x4000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) ioctl$VT_RELDISP(r0, 0x5605) 04:10:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x7ffffffff000}, 0x20008000) 04:10:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0xffffff7f00000000}, 0x20008000) 04:10:53 executing program 4 (fault-call:6 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) pread64(r0, &(0x7f0000000000)=""/216, 0xd8, 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:10:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0xf0ff7f00000000}, 0x20008000) 04:10:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0xf0ff7f}, 0x20008000) [ 308.321773][T16634] FAULT_INJECTION: forcing a failure. [ 308.321773][T16634] name failslab, interval 1, probability 0, space 0, times 0 [ 308.382722][T16634] CPU: 1 PID: 16634 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 308.391966][T16634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.391973][T16634] Call Trace: [ 308.391997][T16634] dump_stack+0x172/0x1f0 [ 308.392023][T16634] should_fail.cold+0xa/0x15 [ 308.414241][T16634] ? fault_create_debugfs_attr+0x180/0x180 [ 308.420069][T16634] ? page_to_nid.part.0+0x20/0x20 [ 308.425107][T16634] ? ___might_sleep+0x163/0x280 [ 308.425126][T16634] __should_failslab+0x121/0x190 [ 308.425147][T16634] should_failslab+0x9/0x14 [ 308.439414][T16634] kmem_cache_alloc_trace+0x2d3/0x790 [ 308.444805][T16634] ? __might_fault+0xfb/0x1e0 [ 308.449582][T16634] tls_set_device_offload+0x3b9/0xec0 [ 308.454991][T16634] tls_setsockopt+0x4ad/0x8d0 [ 308.459680][T16634] sock_common_setsockopt+0x94/0xd0 [ 308.465064][T16634] __sys_setsockopt+0x261/0x4c0 [ 308.465196][T16640] device nr0 entered promiscuous mode [ 308.469914][T16634] ? sock_create_kern+0x50/0x50 [ 308.469930][T16634] ? fput+0x1b/0x20 [ 308.469948][T16634] ? switch_fpu_return+0x1fa/0x4f0 [ 308.469972][T16634] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 308.495298][T16634] __x64_sys_setsockopt+0xbe/0x150 [ 308.500423][T16634] do_syscall_64+0xfa/0x760 [ 308.504937][T16634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.510850][T16634] RIP: 0033:0x459829 [ 308.510865][T16634] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.510882][T16634] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 308.542757][T16634] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 [ 308.542765][T16634] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 308.542774][T16634] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 308.542783][T16634] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 [ 308.542790][T16634] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 04:10:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x7ffff000}, 0x20008000) 04:10:53 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x10100) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x2, 0x2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000300)='./file1\x00', 0xffffffffffffffff) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) r2 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x2, 0x10100) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000200)={0x6620, 0x0, 0x6, 0x1, 0x1000}) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 308.544315][T16641] FAULT_INJECTION: forcing a failure. [ 308.544315][T16641] name failslab, interval 1, probability 0, space 0, times 0 04:10:53 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r1, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1a800, 0x0) setsockopt$inet_dccp_buf(r2, 0x21, 0xc0, &(0x7f00000003c0)="bf2c1ea8834b906989a18d3747ed80963a5791b2a81255f99c1352016605d133791b3588f006da24c828c651807a83bf3c9f9fed38b8e1f15feb179ffd25ebf7ffec67ed8706ec8b08e12ef2b0ef8de82954b551018a0dc5a32f5ce0e120bdadb523c71abad0a124791461b988fb04faff6ea0c4cac24eb5dbb2ead31c7c7f29836935b20bb281118e86292b73aff5c24cb8e0771dfd6414192db7e9b9aab2e5e7f0c574e85f1c27dcfaaa3836c034938dc3eca1c59bb797b2cbc86237e56cae611f29109cc4a162b3324b966c3802655b2b0274f2905767de5475476541f4fd4cac39bfd557a3e273f7659c", 0xec) [ 308.724313][T16641] CPU: 1 PID: 16641 Comm: syz-executor.5 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 308.733536][T16641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.743587][T16641] Call Trace: [ 308.746879][T16641] dump_stack+0x172/0x1f0 [ 308.751213][T16641] should_fail.cold+0xa/0x15 [ 308.751230][T16641] ? fault_create_debugfs_attr+0x180/0x180 [ 308.751251][T16641] ? lock_acquire+0x190/0x410 [ 308.766289][T16641] ? tun_get_user+0x1645/0x3fa0 [ 308.771141][T16641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.777393][T16641] __should_failslab+0x121/0x190 [ 308.782338][T16641] should_failslab+0x9/0x14 [ 308.786870][T16641] kmem_cache_alloc_node_trace+0x5a/0x750 [ 308.792600][T16641] ? kasan_unpoison_shadow+0x35/0x50 [ 308.797888][T16641] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 308.803716][T16641] __kmalloc_node_track_caller+0x3d/0x70 [ 308.809357][T16641] __kmalloc_reserve.isra.0+0x40/0xf0 [ 308.814738][T16641] pskb_expand_head+0x151/0xe00 [ 308.819688][T16641] ? tun_get_user+0x1694/0x3fa0 [ 308.824687][T16641] ? trace_hardirqs_on+0x67/0x240 [ 308.829721][T16641] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 308.835986][T16641] tun_get_user+0x1dd2/0x3fa0 [ 308.840694][T16641] ? tun_build_skb.isra.0+0x1390/0x1390 [ 308.846440][T16641] ? lock_downgrade+0x920/0x920 [ 308.851316][T16641] ? tun_chr_close+0x180/0x180 [ 308.856081][T16641] ? _kstrtoul+0x170/0x170 [ 308.860518][T16641] tun_chr_write_iter+0xbd/0x156 [ 308.865456][T16641] new_sync_write+0x4d3/0x770 [ 308.870143][T16641] ? new_sync_read+0x800/0x800 [ 308.874901][T16641] ? __fget+0xa3/0x560 [ 308.878995][T16641] ? common_file_perm+0x238/0x720 [ 308.883999][T16641] ? __fget+0x384/0x560 [ 308.888151][T16641] ? apparmor_file_permission+0x25/0x30 [ 308.893709][T16641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.899954][T16641] ? security_file_permission+0x8f/0x380 [ 308.905593][T16641] __vfs_write+0xe1/0x110 [ 308.909920][T16641] vfs_write+0x268/0x5d0 [ 308.914421][T16641] ksys_write+0x14f/0x290 [ 308.918731][T16641] ? __ia32_sys_read+0xb0/0xb0 [ 308.923493][T16641] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 308.929559][T16641] __x64_sys_write+0x73/0xb0 [ 308.934167][T16641] do_syscall_64+0xfa/0x760 [ 308.938653][T16641] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.944521][T16641] RIP: 0033:0x459829 [ 308.948415][T16641] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.967998][T16641] RSP: 002b:00007f40f7cd5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 308.976392][T16641] RAX: ffffffffffffffda RBX: 00007f40f7cd5c90 RCX: 0000000000459829 [ 308.984357][T16641] RDX: 000000000007ffff RSI: 0000000020000340 RDI: 0000000000000003 [ 308.992307][T16641] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 309.000258][T16641] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7cd66d4 [ 309.008318][T16641] R13: 00000000004c9992 R14: 00000000004e1008 R15: 0000000000000005 04:10:54 executing program 5 (fault-call:4 fault-nth:2): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:10:54 executing program 4 (fault-call:6 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0xf0ffffff7f0000}, 0x20008000) 04:10:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x20008000) 04:10:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000002c0)='dax\x00', 0x10000, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000240)=0x80) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000280)={0x33, @loopback, 0x4e21, 0x0, 'ovf\x00', 0x27, 0xffffffffffffffff, 0x3f}, 0x2c) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 309.183158][ C0] net_ratelimit: 57 callbacks suppressed [ 309.183166][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 309.191834][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 309.200842][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 309.220558][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 309.224269][T16674] FAULT_INJECTION: forcing a failure. [ 309.224269][T16674] name failslab, interval 1, probability 0, space 0, times 0 [ 309.283554][T16674] CPU: 0 PID: 16674 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 309.292813][T16674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.302866][T16674] Call Trace: [ 309.302888][T16674] dump_stack+0x172/0x1f0 [ 309.302915][T16674] should_fail.cold+0xa/0x15 [ 309.310512][T16674] ? fault_create_debugfs_attr+0x180/0x180 [ 309.310531][T16674] ? page_to_nid.part.0+0x20/0x20 [ 309.310552][T16674] ? ___might_sleep+0x163/0x280 [ 309.330994][T16674] __should_failslab+0x121/0x190 [ 309.335942][T16674] should_failslab+0x9/0x14 [ 309.340467][T16674] __kmalloc_track_caller+0x2dc/0x760 [ 309.345845][T16674] ? kasan_kmalloc+0x9/0x10 [ 309.350348][T16674] ? kmem_cache_alloc_trace+0x346/0x790 [ 309.355901][T16674] ? tls_set_device_offload+0x508/0xec0 [ 309.361444][T16674] kmemdup+0x27/0x60 [ 309.361461][T16674] tls_set_device_offload+0x508/0xec0 [ 309.361483][T16674] tls_setsockopt+0x4ad/0x8d0 [ 309.375423][T16674] sock_common_setsockopt+0x94/0xd0 [ 309.380630][T16674] __sys_setsockopt+0x261/0x4c0 [ 309.385568][T16674] ? sock_create_kern+0x50/0x50 [ 309.390447][T16674] ? fput+0x1b/0x20 [ 309.394267][T16674] ? switch_fpu_return+0x1fa/0x4f0 [ 309.399386][T16674] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.405456][T16674] __x64_sys_setsockopt+0xbe/0x150 [ 309.410578][T16674] do_syscall_64+0xfa/0x760 [ 309.415089][T16674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.420982][T16674] RIP: 0033:0x459829 04:10:54 executing program 2: timer_create(0x1, &(0x7f00000002c0)={0x0, 0x18}, &(0x7f0000000340)=0x0) timer_getoverrun(r0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00') r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000280), 0x10) getdents(r1, &(0x7f0000000600)=""/177, 0xaa) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) unlink(&(0x7f00000000c0)='./file0/file0\x00') setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000240)={0x10000, 0x0, 0x8000}, 0x4) [ 309.424965][T16674] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.444601][T16674] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 309.453009][T16674] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 [ 309.460973][T16674] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 309.460981][T16674] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 309.460989][T16674] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 [ 309.460997][T16674] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 [ 309.466172][T16690] FAULT_INJECTION: forcing a failure. [ 309.466172][T16690] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 309.506218][T16690] CPU: 0 PID: 16690 Comm: syz-executor.5 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 309.515405][T16690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.525456][T16690] Call Trace: [ 309.528833][T16690] dump_stack+0x172/0x1f0 [ 309.528852][T16690] should_fail.cold+0xa/0x15 [ 309.528869][T16690] ? fault_create_debugfs_attr+0x180/0x180 [ 309.528883][T16690] ? save_stack+0x5c/0x90 [ 309.528894][T16690] ? save_stack+0x23/0x90 [ 309.528908][T16690] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 309.528919][T16690] ? kasan_slab_alloc+0xf/0x20 [ 309.528931][T16690] ? kmem_cache_alloc+0x121/0x710 [ 309.528951][T16690] ? __build_skb+0x26/0x70 [ 309.573751][T16690] should_fail_alloc_page+0x50/0x60 [ 309.578968][T16690] __alloc_pages_nodemask+0x1a1/0x900 04:10:54 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000080)={r2, 0x1, "ef"}, &(0x7f00000000c0)=0x9) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 04:10:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0xffffff7f00000000}, 0x20008000) 04:10:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x7ffffffff000}, 0x20008000) [ 309.584345][T16690] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.590444][T16690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.596689][T16690] ? __alloc_pages_slowpath+0x2530/0x2530 [ 309.601663][T16683] device nr0 entered promiscuous mode [ 309.602411][T16690] ? mark_held_locks+0xf0/0xf0 [ 309.612614][T16690] ? fault_create_debugfs_attr+0x180/0x180 [ 309.618428][T16690] cache_grow_begin+0x90/0xd20 [ 309.623193][T16690] ? __kmalloc_node_track_caller+0x3d/0x70 04:10:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f00000001c0)=""/177, 0xfffffffffffffe44) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:54 executing program 4 (fault-call:6 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 309.629262][T16690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.635590][T16690] kmem_cache_alloc_node_trace+0x689/0x750 [ 309.641397][T16690] ? kasan_unpoison_shadow+0x35/0x50 [ 309.647058][T16690] __kmalloc_node_track_caller+0x3d/0x70 [ 309.652720][T16690] __kmalloc_reserve.isra.0+0x40/0xf0 [ 309.658126][T16690] pskb_expand_head+0x151/0xe00 [ 309.662417][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 309.662977][T16690] ? tun_get_user+0x1694/0x3fa0 [ 309.662993][T16690] ? trace_hardirqs_on+0x67/0x240 [ 309.663016][T16690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.690097][T16690] tun_get_user+0x1dd2/0x3fa0 [ 309.695232][T16690] ? tun_build_skb.isra.0+0x1390/0x1390 [ 309.700780][T16690] ? lock_downgrade+0x920/0x920 [ 309.705669][T16690] ? tun_chr_close+0x180/0x180 [ 309.710434][T16690] ? _kstrtoul+0x170/0x170 [ 309.714867][T16690] tun_chr_write_iter+0xbd/0x156 [ 309.719820][T16690] new_sync_write+0x4d3/0x770 [ 309.724514][T16690] ? new_sync_read+0x800/0x800 [ 309.729295][T16690] ? __fget+0xa3/0x560 [ 309.733406][T16690] ? common_file_perm+0x238/0x720 [ 309.738432][T16690] ? __fget+0x384/0x560 [ 309.742600][T16690] ? apparmor_file_permission+0x25/0x30 [ 309.748153][T16690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.754396][T16690] ? security_file_permission+0x8f/0x380 [ 309.760030][T16690] __vfs_write+0xe1/0x110 [ 309.764366][T16690] vfs_write+0x268/0x5d0 [ 309.768619][T16690] ksys_write+0x14f/0x290 [ 309.772669][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 309.772953][T16690] ? __ia32_sys_read+0xb0/0xb0 [ 309.786091][T16705] FAULT_INJECTION: forcing a failure. [ 309.786091][T16705] name failslab, interval 1, probability 0, space 0, times 0 [ 309.788800][T16690] ? switch_fpu_return+0x1fa/0x4f0 [ 309.788818][T16690] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.788834][T16690] __x64_sys_write+0x73/0xb0 [ 309.788851][T16690] do_syscall_64+0xfa/0x760 [ 309.788867][T16690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.788878][T16690] RIP: 0033:0x459829 [ 309.788893][T16690] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.788909][T16690] RSP: 002b:00007f40f7cd5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 309.859433][T16690] RAX: ffffffffffffffda RBX: 00007f40f7cd5c90 RCX: 0000000000459829 [ 309.867399][T16690] RDX: 000000000007ffff RSI: 0000000020000340 RDI: 0000000000000003 [ 309.875368][T16690] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 309.883336][T16690] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40f7cd66d4 [ 309.891313][T16690] R13: 00000000004c9992 R14: 00000000004e1008 R15: 0000000000000005 [ 309.908713][T16705] CPU: 1 PID: 16705 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 309.917918][T16705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.927961][T16705] Call Trace: [ 309.931245][T16705] dump_stack+0x172/0x1f0 [ 309.935587][T16705] should_fail.cold+0xa/0x15 [ 309.940354][T16705] ? refcount_inc_not_zero_checked+0x144/0x200 [ 309.946504][T16705] ? fault_create_debugfs_attr+0x180/0x180 [ 309.952310][T16705] ? page_to_nid.part.0+0x20/0x20 [ 309.957328][T16705] ? ___might_sleep+0x163/0x280 [ 309.962184][T16705] __should_failslab+0x121/0x190 [ 309.967117][T16705] should_failslab+0x9/0x14 [ 309.971610][T16705] __kmalloc+0x2e0/0x770 [ 309.975841][T16705] ? __crypto_alg_lookup+0x2fa/0x370 [ 309.981121][T16705] ? crypto_create_tfm+0x82/0x300 [ 309.986136][T16705] crypto_create_tfm+0x82/0x300 [ 309.990979][T16705] ? crypto_alg_mod_lookup+0xff/0x550 [ 309.996343][T16705] crypto_alloc_tfm+0x105/0x2e0 [ 310.001184][T16705] ? __kmalloc_track_caller+0x34d/0x760 [ 310.006722][T16705] crypto_alloc_aead+0x2d/0x40 [ 310.011480][T16705] tls_sw_fallback_init+0x29/0x194 [ 310.016582][T16705] tls_set_device_offload+0x54c/0xec0 [ 310.022049][T16705] tls_setsockopt+0x4ad/0x8d0 [ 310.026728][T16705] sock_common_setsockopt+0x94/0xd0 [ 310.031918][T16705] __sys_setsockopt+0x261/0x4c0 [ 310.036764][T16705] ? sock_create_kern+0x50/0x50 [ 310.041618][T16705] ? fput+0x1b/0x20 [ 310.045421][T16705] ? switch_fpu_return+0x1fa/0x4f0 [ 310.050709][T16705] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 310.056781][T16705] __x64_sys_setsockopt+0xbe/0x150 [ 310.061887][T16705] do_syscall_64+0xfa/0x760 [ 310.066386][T16705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.072298][T16705] RIP: 0033:0x459829 [ 310.076188][T16705] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.096042][T16705] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 310.104442][T16705] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 [ 310.112402][T16705] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 310.120389][T16705] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 310.128347][T16705] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 04:10:55 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x4240, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x6c, r1, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xffff}]}, 0x6c}, 0x1, 0x0, 0x0, 0x10}, 0x4) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x1, 0x0) read(r2, &(0x7f0000000040)=""/217, 0xd9) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="2d6d656d6f72792064dc031b96"], 0xffffffffffffff79) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000240)) syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x40, 0x30000) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000540)) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) [ 310.136354][T16705] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 [ 310.282141][T16705] crypto_alloc_aead failed rc=-12 04:10:55 executing program 5 (fault-call:4 fault-nth:3): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:10:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0xf0ff7f}, 0x20008000) 04:10:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0xf0ff7f00000000}, 0x20008000) 04:10:55 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x8, 0xfffffffffffffffe, 0x0, 0x2, 0x7}, &(0x7f0000000240)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000280)={r2, 0x9}, 0x8) 04:10:55 executing program 4 (fault-call:6 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 310.484163][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 310.487733][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 310.513999][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 310.527127][T16729] FAULT_INJECTION: forcing a failure. [ 310.527127][T16729] name failslab, interval 1, probability 0, space 0, times 0 [ 310.554025][T16729] CPU: 1 PID: 16729 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 310.563234][T16729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.573292][T16729] Call Trace: [ 310.576594][T16729] dump_stack+0x172/0x1f0 [ 310.580942][T16729] should_fail.cold+0xa/0x15 [ 310.584978][T16737] device nr0 entered promiscuous mode [ 310.591616][T16729] ? fault_create_debugfs_attr+0x180/0x180 [ 310.591635][T16729] ? page_to_nid.part.0+0x20/0x20 [ 310.591650][T16729] ? ___might_sleep+0x163/0x280 [ 310.591672][T16729] __should_failslab+0x121/0x190 [ 310.617951][T16729] should_failslab+0x9/0x14 [ 310.622477][T16729] __kmalloc+0x2e0/0x770 [ 310.626713][T16729] ? down_read_non_owner+0x490/0x490 [ 310.632084][T16729] ? crypto_create_tfm+0x82/0x300 [ 310.637194][T16729] crypto_create_tfm+0x82/0x300 [ 310.642025][T16729] crypto_spawn_tfm2+0x61/0xc0 [ 310.646803][T16729] crypto_gcm_init_tfm+0x43/0x260 [ 310.651830][T16729] ? crypto_rfc4106_init_tfm+0x1c0/0x1c0 [ 310.657467][T16729] crypto_aead_init_tfm+0x143/0x1a0 [ 310.662674][T16729] crypto_create_tfm+0xe0/0x300 [ 310.667514][T16729] ? crypto_alg_mod_lookup+0xff/0x550 [ 310.672881][T16729] crypto_alloc_tfm+0x105/0x2e0 [ 310.677910][T16729] ? __kmalloc_track_caller+0x34d/0x760 [ 310.683435][T16729] crypto_alloc_aead+0x2d/0x40 [ 310.688224][T16729] tls_sw_fallback_init+0x29/0x194 [ 310.693320][T16729] tls_set_device_offload+0x54c/0xec0 [ 310.698778][T16729] tls_setsockopt+0x4ad/0x8d0 [ 310.703478][T16729] sock_common_setsockopt+0x94/0xd0 [ 310.708673][T16729] __sys_setsockopt+0x261/0x4c0 [ 310.713504][T16729] ? sock_create_kern+0x50/0x50 [ 310.718334][T16729] ? fput+0x1b/0x20 [ 310.722128][T16729] ? switch_fpu_return+0x1fa/0x4f0 [ 310.727220][T16729] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 310.733298][T16729] __x64_sys_setsockopt+0xbe/0x150 [ 310.738694][T16729] do_syscall_64+0xfa/0x760 [ 310.743219][T16729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.749102][T16729] RIP: 0033:0x459829 [ 310.752975][T16729] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.772903][T16729] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 310.781300][T16729] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 04:10:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0xf0ffffff7f0000}, 0x20008000) 04:10:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x7ffff000}, 0x20008000) [ 310.789251][T16729] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 310.797201][T16729] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 310.805233][T16729] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 [ 310.813194][T16729] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 [ 310.821772][T16729] crypto_alloc_aead failed rc=-12 04:10:56 executing program 4 (fault-call:6 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x20008000) [ 310.900077][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:56 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) openat(r0, &(0x7f0000000280)='./file0\x00', 0x8040, 0x100) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00') getdents(r1, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') symlink(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00') 04:10:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x20008000) [ 311.001847][T16751] FAULT_INJECTION: forcing a failure. [ 311.001847][T16751] name failslab, interval 1, probability 0, space 0, times 0 [ 311.027997][T16751] CPU: 0 PID: 16751 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 311.037209][T16751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.047263][T16751] Call Trace: [ 311.050572][T16751] dump_stack+0x172/0x1f0 [ 311.055028][T16751] should_fail.cold+0xa/0x15 [ 311.059623][T16751] ? crypto_create_tfm+0x82/0x300 [ 311.064668][T16751] ? fault_create_debugfs_attr+0x180/0x180 [ 311.070483][T16751] ? page_to_nid.part.0+0x20/0x20 [ 311.075514][T16751] ? ___might_sleep+0x163/0x280 [ 311.080371][T16751] __should_failslab+0x121/0x190 [ 311.085317][T16751] should_failslab+0x9/0x14 [ 311.089906][T16751] __kmalloc+0x2e0/0x770 [ 311.094149][T16751] ? kasan_unpoison_shadow+0x35/0x50 [ 311.099440][T16751] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 311.105243][T16751] ? crypto_create_tfm+0x82/0x300 [ 311.110270][T16751] crypto_create_tfm+0x82/0x300 [ 311.115125][T16751] crypto_init_shash_ops_async+0x59/0x398 [ 311.120851][T16751] crypto_ahash_init_tfm+0x363/0x440 [ 311.126138][T16751] crypto_create_tfm+0xe0/0x300 [ 311.130992][T16751] crypto_spawn_tfm2+0x61/0xc0 [ 311.135757][T16751] crypto_gcm_init_tfm+0x43/0x260 [ 311.140802][T16751] ? crypto_rfc4106_init_tfm+0x1c0/0x1c0 [ 311.146435][T16751] crypto_aead_init_tfm+0x143/0x1a0 [ 311.151642][T16751] crypto_create_tfm+0xe0/0x300 [ 311.156497][T16751] ? crypto_alg_mod_lookup+0xff/0x550 [ 311.161873][T16751] crypto_alloc_tfm+0x105/0x2e0 [ 311.166725][T16751] ? __kmalloc_track_caller+0x34d/0x760 [ 311.172305][T16751] crypto_alloc_aead+0x2d/0x40 [ 311.177072][T16751] tls_sw_fallback_init+0x29/0x194 [ 311.182184][T16751] tls_set_device_offload+0x54c/0xec0 [ 311.187651][T16751] tls_setsockopt+0x4ad/0x8d0 [ 311.192338][T16751] sock_common_setsockopt+0x94/0xd0 [ 311.197544][T16751] __sys_setsockopt+0x261/0x4c0 [ 311.202395][T16751] ? sock_create_kern+0x50/0x50 [ 311.207250][T16751] ? fput+0x1b/0x20 [ 311.211070][T16751] ? switch_fpu_return+0x1fa/0x4f0 [ 311.216185][T16751] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 311.222263][T16751] __x64_sys_setsockopt+0xbe/0x150 [ 311.227385][T16751] do_syscall_64+0xfa/0x760 [ 311.231987][T16751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.237882][T16751] RIP: 0033:0x459829 [ 311.241795][T16751] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.261494][T16751] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 311.269906][T16751] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 [ 311.277873][T16751] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 311.285838][T16751] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 311.293813][T16751] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 [ 311.301791][T16751] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 04:10:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) [ 311.348728][T16751] crypto_alloc_aead failed rc=-12 04:10:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:10:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x7ffffffff000}, 0x20008000) 04:10:56 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x90000, 0x0) ioctl$TIOCSBRK(r0, 0x5427) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$cgroup_subtree(r1, &(0x7f0000000000), 0x0) 04:10:56 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) statfs(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)=""/17) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:56 executing program 4 (fault-call:6 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) 04:10:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0xf0ff7f00000000}, 0x20008000) 04:10:56 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) lstat(&(0x7f00000051c0)='./file0/file0\x00', &(0x7f0000005200)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000340)='./file2\x00', 0x401, 0x3, &(0x7f0000005140)=[{&(0x7f0000004fc0)="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", 0xfd, 0x1}, {&(0x7f00000050c0)="05f6b50867859d09d292d98cfdb753fca6db77b25be7cc32a415c2157026ccc18684d4edc6159acec2d6db4020846e2482", 0x31, 0x7fffffff}, {&(0x7f0000005100), 0x0, 0x1}], 0x180000, &(0x7f0000005280)={[{@subvol={'subvol', 0x3d, 'tmpfs\x00'}}, {@subvolid={'subvolid', 0x3d, 0x7ff}}, {@compress_force_algo={'compress-force', 0x3d, 'zstd'}}, {@device={'device', 0x3d, './file1'}}, {@nodatasum='nodatasum'}, {@nossd_spread='nossd_spread'}, {@nodatacow='nodatacow'}, {@noacl='noacl'}], [{@euid_eq={'euid', 0x3d, r2}}, {@subj_type={'subj_type', 0x3d, 'drbg_pr_hmac_sha1\x00'}}]}) sendmmsg(r1, &(0x7f0000004e40)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="43ed0788f56fca36d73364ff805c8410b4eef57bfa3abfaf25134922f7f170504f8997fa74e3b73f81053853fd045537", 0x30}], 0x1, &(0x7f0000000240)}}, {{&(0x7f0000000280)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000000340), 0x0, &(0x7f00000003c0)=[{0x58, 0x11, 0x8, "5c781d5224bf1f4d0de03dc578a4f71bd997ad112889964495311d26a71d3926ac08d6d4d0add03ef16a18875397afe3264a66717de1ae8da8c52e567af9f9aeb8862a3c57"}, {0x18, 0x10e, 0x27, "db29f8dba872"}], 0x70}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000440)="88561d9613c2a01258d168967d14968f41c1915d6d0f66cb2b4629c5554e0f1fc8f9e8402b191de7da70590bcba71a58e1a044e66b28b12d3d96e6ad929f41", 0x3f}], 0x1, &(0x7f00000006c0)=[{0x80, 0x102, 0x6, "6e7dee4b85796ca5725dccdd515a74ca812b48c8750f6f5880f726af102a7e8428ac08bf2086e66dd2bbb2694f050a634df4bbb7236fb560310db207c7a71c8e9030c76b1c70b9bd96ae4c3b63a67fc2b8153fa617ebaa194f29e9e4cf17a1553e43f114fd5638a83342be65"}, {0xd8, 0x19f, 0x6, "921aad11e4774a1cc2c3302f72a89da595776a173bc5075023013fd5117584322f54a4187a5d817317b290cd9daeca083be6e3ceeb41f816b9a2ce459f8b97fa76e80d37e9b26720b6614d49bbfdbf316617984e45cfb5228ba3d74e3cb562d4cac32ca23bcb51ec1a129e553db187e8dff9ce0c47995b4b21cb5491e49c98ee72442fdeb7e585d33308e0d5af7bbd1f8e0d5e1fe4e21f7052357801a6de61b7421d64bd65489ccfcef934934968b8ba28424bde96cb2a8a0ec86f228c8353215dd99529"}, {0x38, 0x3a, 0x6, "2496b968686bea8ac2f206848287d31a05bbc3d7218ea54ac5e9afcae85adb845a2dd2d79f96c509"}, {0x58, 0x107, 0x7ff, "48012590227fe0028d620e93b2595b8c8e91c823f8505415c03584aabbd1727b0a1e5d24019110c69c730320f2b0aeddb950acbcc78fb963f8ec46bb00efc75b33f1af29"}, {0xb0, 0x110, 0x8, "c0830c2ca26806d90f3def87f95191d190df37568ab85e5708ba3b86fe98a326dfb57951d5676a21cbe513c157dc67edde6c81cb12a6732c846448d12fbadc774061777f5c6384250e29509ef4974f8e16f0f6a4db347a726032e492e6110da98cfe6ce2b90b756764c8b7395fac6750932b814d1785b1240c2b52aedb4a3db191b8448728c8d686651c09d26bb1ae307a48d5d7e9d8d6486c732af4e5"}, {0x78, 0x11d, 0xd2f8, "5201346b58505bc743cec89a4e2ed02875b721a3785d06913cbdddb4913441349b14165a5976ea1dbf583440690912ac6f81c00d625035341f5d043ced3b2915c65de8f00951031bfd41c1ba1ec861973aabab68c93d8ec014ee1ac0e7062a4f000bac112fda311d"}, {0x100, 0x115, 0xff, "376708494e9250bfaf7a0af91097731cd556345a92cb32e9dd387e76e15f05a77029c54f4fb7539e89e626328e70bb52d7ed296eae690fcaa5db6f779a5af15781f42d8944eaaae99dfe030a32cf9b73e174502b0e1d845c618177660c7710334f2f8df98e94b1e1fc46d77fe49377e22b23d5e7223e0e4ea9b96dfdde82e66fcdbf88a6f4bcccf8479ba2ec2c9bc300af9a339c5f08028ae20af253b5b1bbbaef939a9c395e0ff953a8179ef2b4f80a430052f32f2611fa95f78a6f2b5cc0abcfc3c2e2d4a8824b3bc5eb91e5c6753c83e583dfda7fe546b307d596059a218abbc7a9e8c9257709091c7481664f8e"}, {0xa8, 0x112, 0x7fffffff8, "8d5e93be066dbc69c2e635110278b193a3a3a55dc0aae21267acb65150bf41a76d14b865cd8434edaa3e87f978969b7662271a06963884f841fee05a0f4397e4db6bbd58125bfa56101770e8dae3caf771ebecc3e7612b8413fd4802f257398a08cb72c25297eea1007587a528479539bde9defe11bbb1580c3407de65608fa8af9e70ef238d9b554485c3335cd3090cf176d174"}, {0x90, 0x118, 0xfffffffffffffff9, "7f34d23da96d8dae0615556a7d69efabc12bb362180b4e1a14e7b4bf0f34057efbc57a3cf2aa9bfb44d91bf8fc975fb1005ddadd0bf125189899cbad7ecbb8aff0e07685becc52bc872599c892213fd2293de806cf8ce20c22712c97ed115738ec9df61e7031965c129fc14dc359a2cfe31e30a174ee187c57"}, {0x70, 0x10a, 0x8, "032463b2bf11df1632c5b0f33f8ce9576dcbfda96f1e8750eaeb00411841f833b10dd282d0d3c6450d2f19a041166ee7e5e718cf88ec8c186729c99383ac51e9f113da232af0ab7a1663bcf77cfc514a227be7481987f2806c335e65de"}], 0x5b8}}, {{&(0x7f00000004c0)=@ipx={0x4, 0x2, 0x5, "91c48c931d19", 0x100}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000540)="0ecc4ba366e2ce5369b348fa172d12d43d5c83b2036eb18ae2ded91433d9c7dfeb6612cea2c495683adb14a37b65a00c7adcfddf59f21f1ecd71e366182a47a551cdafdfdfc14cd9b0aebf8d5598a5c5665a9b1c7c3a866d668658e72d9b52752b3126dfefa3c1be1f", 0x69}, {&(0x7f0000000c80)="cf3b9040ba6ed6de51ef28b432e84f41c5d24759512d3e0e7bf04c44b1da5e2c82ab67563b659d70247861e79842f1b996170b63fa1422eef18f55b9701807507561f4095d8cc25f82402cd18edd58562bb340b3412cabfb4578a5", 0x5b}, {&(0x7f0000000d00)="554ffe9d3acc0b3540f48c97719bcd0c021326cdb50db7bea4be5fdbe1b5cc4d749cbff42dd7fb7a1d209eb2ca2687abd04cfff0bae3d55c706f89d7c303a2d7a30b612f", 0x44}, {&(0x7f0000000d80)="d9c3bc8f52a5b5b495375bf8602f042b76e78c7d76300422d080da8abb7ff02780a0d0b781c2a724ec3420d88343066d0985ac7ec9e143ab69c727ecdc5da3795bdaa056b036d19766db41b6", 0x4c}, {&(0x7f0000000e00)="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", 0xfe}, {&(0x7f0000000f00)="c4ff40832404a084df60f36ec860145bc39892db0baf8bf2f582cf881a8bf0a832bbff9dd770e9eaeed7dfc2bbebea72bc958d433b62673593dddb958167bb74ba3169da395f92201bd7c9c37fc6dd7aa047c24e7b50ab3afc079627d49d647c5d0441aeb67f3bb46eee596e78a32dbb", 0x70}], 0x6, &(0x7f0000001000)=[{0xd8, 0x139, 0xfffffffffffffffa, "33c5cce9fe1898f9c0a02ad1704e1b7506b7bb7bd7e2749e66b94de43abb08bc8e07a0df16f469daa512c17cc893d2db522f0e5a42c37853a41d91bdccd328a63f89cefcc1e38f457eeea86ff8cef418924e4c410644dca973361c74c20e6aa53b20e5e91a8a9700b110e13bc11cd7b50496eb5d6e58964e7cec343a8fe9640370b175da72b29634b214b6b567914533808e9329dab835bc3b59539ecd8c8b424f15080c0fd25b72d00c8b070ab27148027281607f94d51f0faf6206c158f4f768"}, {0x1010, 0x100, 0x8, "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"}, {0xd8, 0x1, 0x5299a1f8, "bc9b9660da4faaa4f90a0187a656e99b13045d794a940013d186914315dd50c55c5091f98d16dc6a5d806f1cfdd0d5eb645047b16a940d7b7e467dc5d55be2ead5fbf53765c8a7dfed703f9bb3bcae69c64aef0c685cbb3f1e0f5e10e240d446170506642bfa65c721a2c0ac649d40cfa342effc0a0dec23900bdc68f2661e1474fde68a1e20fbc4355811fc22cc34301194c0898e3614b675815b0a489d3cc22dea094f1783af1c043d68aa14b33dde1f697477e180d6a8c7769e658387bc848dfbe03f09464818"}, {0xf8, 0x6, 0x1, "328dc10198926730529a98bc2aaf4f8c4dc98bccf15ec3959b3547821e2c08295b75175f262fa83ee1bc877d50658ffb657318209424ec019b3a1a5f8436ae7e2a867184ebb9b912da407a6d55ee3b36e6003595cf1cea792ee7a87279a978dccf6ae957d25d2bb40d2cd1f4e9b4177585af2628dd646da78fd20c7e362fb5e114db77cdc9b31b8037cb1ec147431f5bb36918f552a1d65ccc1d4bb964655f17c914cbbe51bcf2e367aed7b3a7984a40216072fa3fa74bfb240faf1808f9896302f02d9d42c39181bb3f98c967a47c22b1668dd19a11533f42afa6ea5e53bb9af33ec4332dc3"}, {0x98, 0x1ff, 0x1, "e74fa60d5b2ce3f8bf4285ad2cc5674ff41886b47a5a5ea76cf317162f1eb08f44dffc327b38d9fa592d3d63b77e5e8d5842b35d93cab5aec111d16452bff540af051d28413f99cb35cb9b620dccae3ff9ce272060d097da6543f137f465cee78795a63e5c62afe3aa90a0ea17f5061f9fef7f416943a94362eaab1c945bb62bcc4e3507aad2217c"}, {0xd8, 0x111, 0x1000, "9ecd6b67b610bc13a6ffeb517774b6c7786ead2582be7175aae25723b82db4adf566725ced1032280a29c1b0a9c3a1e29bbc19735384aca78993fc9a88d2ca0608bb259178eae40bfbf2cf84593a56f64521b102c057f35577d16ac712bdcee98dd92f629e5391e7bfa56ac0a1576abf99f4e458f719446229a4c496a384f25d9330ec37bf61b1a9a4c1a0c34dd912398279afb36fa48ec04c4741b27118d31510e9f0b93405a1ca7a25e56967dd6fc6637998081d58d5c40e4372286ab89186f3d109b53730"}, {0x1010, 0x1, 0xa000000000000000, "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"}, {0xa0, 0x10c, 0x1, "6f5b358c62253b9f14a3ebc55d7743afe39c82fffa57b97e7c74f25955b05d2925bf8005998f78311f1a2ce1c94f0a29de8d302237928c88db5b39264d183f9224621c26cae0de82198dcfae91f273a8a2861a64b2ea951b8ec296ca747b9244273fc4ac95b050648722b37ae2dc42e36b27668c83bff26ba3a29d0fa7c70bc531957eefedec5ad74d2485fc"}, {0x80, 0x10c, 0x4, "a817261a398ba7d067ae0f4383746b749470916d65f511852271cdf091f1f2085243f0d8e67794b5603bd661713940fccab824bf873dbeffc7e2c6eb1808976d56260658dacb3806d7b183b575a21315787bbd844e82e27ac375cf0fc75b21aabc18b288d2d404d69ce7a9120b"}], 0x2558}}, {{&(0x7f0000003580)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000003600)="143122d936f2d07b4d3c20ded24c9cc61fc086a9e654c72e6484d25961be5130beb88cf6066faa853d785860d0b88b057e8c2087f8e6f3fa7e39be796a13d006a898a56b059312e5d4b4d1014db16bdf02ca9bc7cb14c522f470dff6fc796958d2cfbab7616d4228cb2fa30609afd91c2e7558670b7d79a4a21e709b86843a4d6ed5ca7b47a5fb037aa9d89b395fdfd090d3d40ad022f972ee522edf6bfcc4b6245d85442f4a4ce024ac6fa8f261b5f519f4b0c5eaffd88b8806390ba315bfe23cbadb679fbd575ca40ad7eca7880badd1d4a0260dc26122d852f433174b6fb2f81b114ca5214f1b531c7d1e592cfff7917c073f", 0xf4}], 0x1, &(0x7f0000003700)=[{0xc0, 0x10a, 0x9, "7b56f2bc9b728561e22d7025bfe0d8f589aef7eccd3fe8d060132d979f124b714d3b010318a118f37039b427994f306e61742fc312fe5a22fa2384823c48de1e5eb0d6fc4bf7c55ef05bb596c7a393ea9c340800a191f5382173c975ec130ee323b2ae384acb0e1cdc72ec53e956cf19b6fbf47a376707d2a1fc4ebe33ea7829275854e6982db40c312af9ccd5add2528c00fa2d986e6fdce1fcc3666ae7f1d24338755a2435d4e408"}, {0x78, 0x113, 0x0, "84c509dbdffc318933915b6c449137fc60d82c7782987ef3aadba9b2bc87ed01eb71e68eaa44b67b58fc71a484c6582a77b23d812f0a39ff6c2dbebf1bd661085f95c11095e48be489e2146ab221695f6c9931e3b77960b40a7b2c6d9e2ce452b863f6db6f501907"}, {0xb0, 0x10e, 0x4, "10f465ad3ef7666c0862d7182323d0f176a52bb6906e2dbd02a97bc9f4e33183f71f34a8163bacab5656411f7a0608c2e1173e1a376a75dab13ab498a71bbe0d3ef3710c427441519bc288d92ea4a95b948d12f973a1afcb4d123a868dd243f2fbeae2ec454bf95d1f77bfeff7b547df4ccc8c283346efa464e0a5b37aea326cffc0aa534490b3fe1017d6c6f39ddf00416ee957c954e700de6a"}], 0x1e8}}, {{0x0, 0x0, &(0x7f0000003ac0)=[{&(0x7f0000003900)="e6334b03aa2cd48f3d413589720790646b55a61c25b6ee8f3160e3ff2b5db8", 0x1f}, {&(0x7f0000003940)="e29125ed8f17915c5174159a2c3448d536f41e5d68df", 0x16}, {&(0x7f0000003980)="763f34e64c8edf0ef0ba90fb8c7c43ca5fcb1519245799096f3f8099bfae91ec4fdbe7c0ba58204d37135af1f394816e2cb1747976a7d256878691eb998454d28a113f341d9698f5470aadec4c172fa8735b70ea7075a547516c48d062843f23ea9bd0f8c45e549d9ffd65da9a9a9112aa215613aadb7ddb426d56a2d9f1ae0efa276a", 0x83}, {&(0x7f0000003a40)="36a5056aac56d6649d42a8e802010704f94404e668cf7c9a6755dd4ea88b442b4491eb188ffc856c08738f50aef3320e90b5e274b85928ea2426b9e9a54b184b0c7d06343b413aea3439f9453f047e574d3a1ea4a77a93c227ba5fb0ca5b77fc980ab24d4fb0ba64de32368c2b57e515a186be73", 0x74}], 0x4, &(0x7f0000003b00)=ANY=[@ANYBLOB="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"], 0x1308}}], 0x6, 0x1) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000006640)='/dev/vcs#\x00', 0x100, 0x10000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000005100)) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000006680)=0x1, &(0x7f00000066c0)=0x4) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 311.583831][T16788] FAULT_INJECTION: forcing a failure. [ 311.583831][T16788] name failslab, interval 1, probability 0, space 0, times 0 [ 311.633373][T16788] CPU: 0 PID: 16788 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 311.642608][T16788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.653382][T16788] Call Trace: [ 311.656685][T16788] dump_stack+0x172/0x1f0 [ 311.661034][T16788] should_fail.cold+0xa/0x15 [ 311.663500][T16783] device nr0 entered promiscuous mode [ 311.665627][T16788] ? fault_create_debugfs_attr+0x180/0x180 [ 311.665647][T16788] ? page_to_nid.part.0+0x20/0x20 04:10:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0xf0ffffff7f0000}, 0x20008000) [ 311.665662][T16788] ? ___might_sleep+0x163/0x280 [ 311.665685][T16788] __should_failslab+0x121/0x190 [ 311.691739][T16788] should_failslab+0x9/0x14 [ 311.696256][T16788] __kmalloc+0x2e0/0x770 [ 311.700505][T16788] ? down_read_non_owner+0x490/0x490 [ 311.706054][T16788] ? crypto_create_tfm+0x82/0x300 [ 311.711093][T16788] crypto_create_tfm+0x82/0x300 [ 311.715952][T16788] crypto_spawn_tfm2+0x61/0xc0 [ 311.720724][T16788] crypto_gcm_init_tfm+0x74/0x260 [ 311.725751][T16788] ? crypto_rfc4106_init_tfm+0x1c0/0x1c0 04:10:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x20008000) [ 311.731397][T16788] crypto_aead_init_tfm+0x143/0x1a0 [ 311.736601][T16788] crypto_create_tfm+0xe0/0x300 [ 311.741456][T16788] ? crypto_alg_mod_lookup+0xff/0x550 [ 311.746839][T16788] crypto_alloc_tfm+0x105/0x2e0 [ 311.751802][T16788] ? __kmalloc_track_caller+0x34d/0x760 [ 311.757365][T16788] crypto_alloc_aead+0x2d/0x40 [ 311.762137][T16788] tls_sw_fallback_init+0x29/0x194 [ 311.767253][T16788] tls_set_device_offload+0x54c/0xec0 [ 311.772670][T16788] tls_setsockopt+0x4ad/0x8d0 [ 311.777449][T16788] sock_common_setsockopt+0x94/0xd0 [ 311.782654][T16788] __sys_setsockopt+0x261/0x4c0 [ 311.787507][T16788] ? sock_create_kern+0x50/0x50 [ 311.787524][T16788] ? fput+0x1b/0x20 [ 311.787543][T16788] ? switch_fpu_return+0x1fa/0x4f0 [ 311.787558][T16788] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 311.787583][T16788] __x64_sys_setsockopt+0xbe/0x150 [ 311.807367][T16788] do_syscall_64+0xfa/0x760 [ 311.807385][T16788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.807396][T16788] RIP: 0033:0x459829 [ 311.807416][T16788] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.847157][T16788] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 311.855569][T16788] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 [ 311.863536][T16788] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 311.863544][T16788] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 04:10:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) 04:10:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) [ 311.863551][T16788] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 [ 311.863559][T16788] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 [ 311.884774][T16788] crypto_alloc_aead failed rc=-12 04:10:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:10:57 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:57 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x1, @broadcast}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="e40d03e06adde45945909265441ffa218612904eb861fcebfab058cf1f6b3e5af0f732bff1fabdc79a6831c3205bd51b54bda37c50e150c41b6034c35b577fec46cc64dd3f16f977605baf0ce9f29c3afee4b26ebc9251a8ff6b8e98974dfb7d3d3cf362254cbc37e86b3c5f219500b3f06afd9f6e663227293c88cab268e5cf538cad36286ac7cf5abfae0ff3053807bbb79f31500150966eaad134c02f452062c3c65a31f40f9213553b029d93609b4234ad0cf3eaada49352b4c98d0a00326684d20e24137bc590943dec978865de8229c412ca8398", 0xd7}], 0x1, &(0x7f0000000200)=[{0x58, 0x11, 0xfffffffffffffffe, "47ed8de6355fe312a19ec5ea7c245c3471fdce631a128cbac6e5a5390cbec30d74c72ba9005441a9dfcb6bbeddb9e70b55da110374ea8fb03b94bab085b478b717eb1e58a0"}, {0xe0, 0x11f, 0xffffffffffff588e, "9a50e466e59cd09cde81a5bc49bac1ccf36ee9b556b3dc12a3d195468f775ad66a0df0f072658bd710b7b8d8a31e7baf73aafb54d299d34e2145eb75e6caeb0a7c3853aa742b7a5ed244c54e7b9058e7cffab150efccb1887883dcd5a9d429e784d738a24a10e538a810f2de971de76482506752638bc5abd17a5c6b0b24652330631063be1f9548479fb76b7430bf3c5ddb62c41d17d048a30aefcdcdde23220433501adf6a195a72b0d58c0bbd9bb5494b10ef2246192d37f857ca76439b16b7dce6b5babfcffddca5901d15"}], 0x138}, 0x4) r1 = memfd_create(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) splice(r1, &(0x7f0000000380), r1, &(0x7f00000003c0), 0xffffffff, 0x4) 04:10:57 executing program 4 (fault-call:6 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) 04:10:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) 04:10:57 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000340)='./file0/file0\x00', 0xeeb9271ba31a3252) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00') open$dir(&(0x7f00000002c0)='./file0\x00', 0x10000, 0x44) r2 = openat$ubi_ctrl(0xffffffffffffff9c, 0xfffffffffffffffd, 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f00000001c0)=0x1f) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) getdents(r1, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000003c0), &(0x7f0000000400)=0x95) setxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x3) [ 312.297244][T16832] device nr0 entered promiscuous mode [ 312.350371][T16843] FAULT_INJECTION: forcing a failure. [ 312.350371][T16843] name failslab, interval 1, probability 0, space 0, times 0 04:10:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) 04:10:57 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000200)='./file0/file0/file0\x00', 0x1000, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000240)="3410739184a37b1f4a39a18900e9cb5d06f36e1fd716f10cd663fc", 0x1b, 0x52}, {&(0x7f00000006c0)="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", 0x1000, 0x49ac0d82}, {&(0x7f0000000280)="4a67b195e076fbcf5dc7e36ecaf885ebd764", 0x12, 0x1}], 0x400, &(0x7f0000000440)={[{@sbsector={'sbsector', 0x3d, 0xff7}}, {@map_off='map=off'}, {@hide='hide'}, {@overriderock='overriderockperm'}, {@hide='hide'}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}]}) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc6, &(0x7f0000000000)) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getresgid(&(0x7f00000005c0), &(0x7f00000016c0)=0x0, &(0x7f0000001700)) fchownat(r0, &(0x7f00000002c0)='./file0/file0\x00', r2, r3, 0x1400) [ 312.439816][T16843] CPU: 0 PID: 16843 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 312.449044][T16843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.459191][T16843] Call Trace: [ 312.462493][T16843] dump_stack+0x172/0x1f0 [ 312.466843][T16843] should_fail.cold+0xa/0x15 [ 312.471441][T16843] ? fault_create_debugfs_attr+0x180/0x180 [ 312.477275][T16843] ? page_to_nid.part.0+0x20/0x20 [ 312.482301][T16843] ? ___might_sleep+0x163/0x280 04:10:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) [ 312.487178][T16843] __should_failslab+0x121/0x190 [ 312.492115][T16843] should_failslab+0x9/0x14 [ 312.496646][T16843] __kmalloc+0x2e0/0x770 [ 312.500891][T16843] ? down_read_non_owner+0x490/0x490 [ 312.506174][T16843] ? __crypto_alloc_tfm+0xd1/0x530 [ 312.511306][T16843] __crypto_alloc_tfm+0xd1/0x530 [ 312.516251][T16843] crypto_spawn_tfm+0x94/0xf0 [ 312.520929][T16843] ? skcipher_register_instance+0x230/0x230 [ 312.526856][T16843] skcipher_init_tfm_simple+0x4a/0xd0 [ 312.532249][T16843] ? skcipher_register_instance+0x230/0x230 [ 312.538401][T16843] crypto_skcipher_init_tfm+0x296/0x8c0 [ 312.543950][T16843] crypto_create_tfm+0xe0/0x300 [ 312.548812][T16843] crypto_spawn_tfm2+0x61/0xc0 [ 312.553581][T16843] crypto_gcm_init_tfm+0x74/0x260 [ 312.558605][T16843] ? crypto_rfc4106_init_tfm+0x1c0/0x1c0 [ 312.558621][T16843] crypto_aead_init_tfm+0x143/0x1a0 [ 312.558635][T16843] crypto_create_tfm+0xe0/0x300 [ 312.558647][T16843] ? crypto_alg_mod_lookup+0xff/0x550 [ 312.558666][T16843] crypto_alloc_tfm+0x105/0x2e0 [ 312.585526][T16843] ? __kmalloc_track_caller+0x34d/0x760 [ 312.591077][T16843] crypto_alloc_aead+0x2d/0x40 [ 312.595968][T16843] tls_sw_fallback_init+0x29/0x194 [ 312.601113][T16843] tls_set_device_offload+0x54c/0xec0 [ 312.606492][T16843] tls_setsockopt+0x4ad/0x8d0 [ 312.611208][T16843] sock_common_setsockopt+0x94/0xd0 [ 312.616448][T16843] __sys_setsockopt+0x261/0x4c0 [ 312.621311][T16843] ? sock_create_kern+0x50/0x50 [ 312.626166][T16843] ? fput+0x1b/0x20 [ 312.629992][T16843] ? switch_fpu_return+0x1fa/0x4f0 04:10:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) 04:10:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) [ 312.635107][T16843] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 312.641180][T16843] __x64_sys_setsockopt+0xbe/0x150 [ 312.646314][T16843] do_syscall_64+0xfa/0x760 [ 312.650828][T16843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.656744][T16843] RIP: 0033:0x459829 [ 312.660659][T16843] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.680263][T16843] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 312.688670][T16843] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 [ 312.688679][T16843] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 312.688686][T16843] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 312.688694][T16843] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 [ 312.688701][T16843] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 [ 312.705243][T16843] crypto_alloc_aead failed rc=-12 04:10:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:10:58 executing program 4 (fault-call:6 fault-nth:9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 312.901269][T16883] FAULT_INJECTION: forcing a failure. [ 312.901269][T16883] name failslab, interval 1, probability 0, space 0, times 0 [ 312.938508][T16883] CPU: 0 PID: 16883 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 312.947725][T16883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.957781][T16883] Call Trace: [ 312.961105][T16883] dump_stack+0x172/0x1f0 [ 312.965467][T16883] should_fail.cold+0xa/0x15 [ 312.965493][T16883] ? fault_create_debugfs_attr+0x180/0x180 [ 312.975893][T16883] ? page_to_nid.part.0+0x20/0x20 [ 312.975918][T16883] ? ___might_sleep+0x163/0x280 [ 312.985858][T16883] __should_failslab+0x121/0x190 [ 312.985880][T16883] should_failslab+0x9/0x14 [ 312.995295][T16883] __kmalloc+0x2e0/0x770 [ 312.995314][T16883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.995336][T16883] ? skcipher_setkey+0x1ac/0x350 [ 313.005843][T16883] ? crypto_gcm_setkey+0x1b8/0x6b0 [ 313.005860][T16883] crypto_gcm_setkey+0x1b8/0x6b0 [ 313.005878][T16883] ? crypto_alloc_tfm+0x129/0x2e0 [ 313.015900][T16883] crypto_aead_setkey+0xc7/0x2a0 [ 313.015927][T16883] tls_sw_fallback_init+0x7d/0x194 [ 313.026044][T16883] tls_set_device_offload+0x54c/0xec0 [ 313.026067][T16883] tls_setsockopt+0x4ad/0x8d0 [ 313.036285][T16883] sock_common_setsockopt+0x94/0xd0 [ 313.036302][T16883] __sys_setsockopt+0x261/0x4c0 [ 313.036321][T16883] ? sock_create_kern+0x50/0x50 [ 313.046343][T16883] ? fput+0x1b/0x20 [ 313.046368][T16883] ? switch_fpu_return+0x1fa/0x4f0 [ 313.056484][T16883] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 313.056509][T16883] __x64_sys_setsockopt+0xbe/0x150 [ 313.070349][T16883] do_syscall_64+0xfa/0x760 [ 313.070366][T16883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.070377][T16883] RIP: 0033:0x459829 [ 313.070399][T16883] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.081562][T16883] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 313.081576][T16883] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 [ 313.081584][T16883] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 313.081599][T16883] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 313.091960][T16883] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 [ 313.091969][T16883] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 04:10:58 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x48081, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000200)=0x4) creat(&(0x7f0000000240)='./file0\x00', 0x10) 04:10:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) 04:10:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) 04:10:58 executing program 4 (fault-call:6 fault-nth:10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:58 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f00000003c0)='tW\xa4S;m\b\x92\x00\x00\x10y\n\x8c#\xc7\xb1j\'\f\xd0\xf7\xa4-\x9bC\xd2\t7\x8f\xf8C\"\xf7\x13\xdb\x8e\x0e\x17\xe2\xf3]\x01M\x10\x18\xbd^\xcb_\xd7\x82\xc7\xea\"jw\xa0\xd8t\xb1_\xb6\xb1s\xff\x95u\x80\xbaq1\xdd\xb1\xe9\x11\r\xb9T\x0eb5\xa2\x18\xbc\x13\xa2\xde\xffO\xf8\n\xd3\xc5\xf7\x9d\xcfX\t\xe7t)_\xc0\xc6\x99z\xf5e\xcfRW-\x80.,\xf8\xc3\xc6\x89\x88\xf8_G\x1bh\xea\xb7\x1c\xba\xdf\xe9T\xbd.\x00\xa3G\xe3a0\xa0\xd2\xf3\x9e\x12\x05\x00\xdd\xeb\x1f \x0f\x83\x92~\x85%\xae\xdb\xc9\v\x01a\xa2x5\b\xaa\x14;\x00\xd78)\xc2a*\xd3\xdc\xc8N\xfcFF\xdc\x1f\a_\x16\xae\x05\xe1\x80\x80\xb0\xdb\xf7\xd3\xb3\x1f\x82\x887\xc7\\', 0x10000, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x47, 0x100) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="890303a04901000001a0ffffffffc4578ad7026b00576558cd020093dd86dd00008848ba0800451fc40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551516248e07573977c5eff11680107fdf79d1af8f4e56309ac9733d41cc0ff11999dec3740f0853200000000000115a21971dd1feb6c2bf65905e863b7d342ed5293033159b87069ccc2c25b80a1de96ea6221dc9adca6c19c1a979d81f287627b3ac0fe5d5d644dc299c6e5b1bbae122dcae5c4d3470b7ee0b23c466a410c5d885662de4bcfd4d73c0da00789d086dc805524b1df92b3c21d6605f191bed951f20a1560f7adf0c24ee5cb2e8dc126d94c3c5c26c01b572745bf81fb8a9607b6186fc72259d4504dc75ab7c6b5112"], 0x7ffff) [ 313.337709][T16904] FAULT_INJECTION: forcing a failure. [ 313.337709][T16904] name failslab, interval 1, probability 0, space 0, times 0 [ 313.401234][T16904] CPU: 1 PID: 16904 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 313.410457][T16904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.420603][T16904] Call Trace: [ 313.423901][T16904] dump_stack+0x172/0x1f0 [ 313.428241][T16904] should_fail.cold+0xa/0x15 [ 313.432838][T16904] ? fault_create_debugfs_attr+0x180/0x180 [ 313.438680][T16904] ? page_to_nid.part.0+0x20/0x20 [ 313.443708][T16904] ? ___might_sleep+0x163/0x280 [ 313.448570][T16904] __should_failslab+0x121/0x190 [ 313.453521][T16904] should_failslab+0x9/0x14 [ 313.458034][T16904] kmem_cache_alloc_trace+0x2d3/0x790 [ 313.463417][T16904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.469662][T16904] gf128mul_init_4k_lle+0x4e/0x410 [ 313.469678][T16904] ? aesni_decrypt+0x90/0x90 [ 313.469693][T16904] ? crypto_rfc3686_create+0xd00/0xd00 [ 313.469709][T16904] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 313.469729][T16904] ghash_setkey+0x135/0x240 [ 313.479418][T16904] ? ghash_exit_tfm+0x60/0x60 [ 313.479438][T16904] crypto_shash_setkey+0xcb/0x2c0 [ 313.479453][T16904] shash_async_setkey+0x47/0x60 [ 313.479471][T16904] crypto_ahash_setkey+0xc8/0x2f0 [ 313.479491][T16904] crypto_gcm_setkey+0x45e/0x6b0 [ 313.490578][T16904] crypto_aead_setkey+0xc7/0x2a0 [ 313.490598][T16904] tls_sw_fallback_init+0x7d/0x194 [ 313.490614][T16904] tls_set_device_offload+0x54c/0xec0 [ 313.490633][T16904] tls_setsockopt+0x4ad/0x8d0 [ 313.514784][T16904] sock_common_setsockopt+0x94/0xd0 [ 313.535085][T16904] __sys_setsockopt+0x261/0x4c0 04:10:58 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='mounts\x00') perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x1) r2 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) stat(&(0x7f0000000300)='./file1\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x10000, 0x4, &(0x7f0000000540)=[{&(0x7f0000000180)="ccc1465f8d08f688db5b8e0ed3b9823b9e0ad93760ea32ede7d129df7dc45f25a9f18ff914e40a5025bc82491b58bb0ea12f551e1ae683118f93b60263a110fb", 0x40, 0x1ff}, {&(0x7f00000001c0)="58f3676ac5552ddaf4b7c01674e6b02006bd6a8101655bd8a046cb78502aca15a7555760e49ee3d3c056a6cbc073ab01fa5c4a16ca2abcf5c75e943d90369e094c505c3239fa77c29d64104d37a2ac31af873983c388677d4c0180c6fa4c082526a9b42ffd6356ded6e475d7f0834870174048e5807c635304028fe5d4fb7dfe6f", 0x81, 0x6}, {&(0x7f0000000380)="3499ee27e36dad2df67cafafcf77b7c793fb26a96b504011dc442c83d5c660f5aa08374147abfadddcbc2350abb970d32b5580909d0f7d7defbf2c4927150cd9962e241c9793db36b3bdb81009838d68a6c1c39978773af9474f1e392117ac6ee1225d67f3d25625d1bf1c9fb308f02ccd1cf2781ed5c2d0d5f6207eff00accc117f356045953c13416ec213b7c8f3b38d8b70bbd5313b", 0x97, 0x2}, {0x0, 0x0, 0x3}], 0x50080, &(0x7f0000000680)={[{@localcaching='localcaching'}, {@data_ordered='data=ordered'}, {@loccookie='loccookie'}, {@nodiscard='nodiscard'}], [{@permit_directio='permit_directio'}, {@fowner_eq={'fowner', 0x3d, r3}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type', 0x3d, 'em1'}}, {@hash='hash'}]}) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000080)={@dev={0xac, 0x14, 0x14, 0x1b}, @empty}, 0x8) ioctl$int_in(r2, 0x5473, &(0x7f0000000700)=0x1) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) [ 313.535101][T16904] ? sock_create_kern+0x50/0x50 [ 313.535122][T16904] ? fput+0x1b/0x20 [ 313.559000][T16904] ? switch_fpu_return+0x1fa/0x4f0 [ 313.564120][T16904] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 313.570189][T16904] __x64_sys_setsockopt+0xbe/0x150 [ 313.570208][T16904] do_syscall_64+0xfa/0x760 [ 313.570224][T16904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.570241][T16904] RIP: 0033:0x459829 04:10:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) 04:10:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000080)=0x36) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 313.580094][T16904] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.580102][T16904] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 313.580116][T16904] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 [ 313.580123][T16904] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 313.580138][T16904] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 313.589899][T16904] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 04:10:58 executing program 4 (fault-call:6 fault-nth:11): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 313.589907][T16904] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 04:10:58 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0/file0\x00', 0x80) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000200)={@rand_addr, @dev, @multicast2}, &(0x7f0000000240)=0xc) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000280)='./file0/file0/file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00') getdents(r1, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x0}, 0x20008000) [ 313.784063][T16935] FAULT_INJECTION: forcing a failure. [ 313.784063][T16935] name failslab, interval 1, probability 0, space 0, times 0 04:10:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 313.893869][T16935] CPU: 1 PID: 16935 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 313.903568][T16935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.914797][T16935] Call Trace: [ 313.918380][T16935] dump_stack+0x172/0x1f0 [ 313.923208][T16935] should_fail.cold+0xa/0x15 [ 313.928043][T16935] ? do_syscall_64+0xfa/0x760 [ 313.933008][T16935] ? fault_create_debugfs_attr+0x180/0x180 [ 313.939509][T16935] ? page_to_nid.part.0+0x20/0x20 [ 313.944627][T16935] ? ___might_sleep+0x163/0x280 [ 313.949837][T16935] __should_failslab+0x121/0x190 [ 313.955183][T16935] should_failslab+0x9/0x14 [ 313.960192][T16935] kmem_cache_alloc_trace+0x2d3/0x790 [ 313.965895][T16935] ? debug_check_no_obj_freed+0xc0/0x43f [ 313.972193][T16935] tls_set_sw_offload+0x1185/0x1567 [ 313.977399][T16935] ? quarantine_put+0x11c/0x1c0 [ 313.982278][T16935] ? trace_hardirqs_on+0x67/0x240 [ 313.987318][T16935] ? tls_sw_strparser_arm+0xe0/0xe0 [ 313.992521][T16935] ? tls_set_device_offload+0x1b5/0xec0 [ 313.998072][T16935] ? tls_set_device_offload+0x1ba/0xec0 [ 314.003717][T16935] tls_setsockopt+0x4d5/0x8d0 [ 314.008404][T16935] sock_common_setsockopt+0x94/0xd0 [ 314.013623][T16935] __sys_setsockopt+0x261/0x4c0 [ 314.018473][T16935] ? sock_create_kern+0x50/0x50 [ 314.018488][T16935] ? fput+0x1b/0x20 [ 314.018519][T16935] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 314.027155][T16935] __x64_sys_setsockopt+0xbe/0x150 [ 314.027174][T16935] do_syscall_64+0xfa/0x760 [ 314.027190][T16935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.027202][T16935] RIP: 0033:0x459829 [ 314.027222][T16935] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.072505][T16935] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 314.080913][T16935] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 04:10:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0xffffffffffffff13) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) 04:10:59 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x181000, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 314.080921][T16935] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 314.080928][T16935] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 314.080945][T16935] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 [ 314.112801][T16935] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 04:10:59 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:10:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r2}) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:10:59 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='mounts\x00') perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x1) r2 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) stat(&(0x7f0000000300)='./file1\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x10000, 0x4, &(0x7f0000000540)=[{&(0x7f0000000180)="ccc1465f8d08f688db5b8e0ed3b9823b9e0ad93760ea32ede7d129df7dc45f25a9f18ff914e40a5025bc82491b58bb0ea12f551e1ae683118f93b60263a110fb", 0x40, 0x1ff}, {&(0x7f00000001c0)="58f3676ac5552ddaf4b7c01674e6b02006bd6a8101655bd8a046cb78502aca15a7555760e49ee3d3c056a6cbc073ab01fa5c4a16ca2abcf5c75e943d90369e094c505c3239fa77c29d64104d37a2ac31af873983c388677d4c0180c6fa4c082526a9b42ffd6356ded6e475d7f0834870174048e5807c635304028fe5d4fb7dfe6f", 0x81, 0x6}, {&(0x7f0000000380)="3499ee27e36dad2df67cafafcf77b7c793fb26a96b504011dc442c83d5c660f5aa08374147abfadddcbc2350abb970d32b5580909d0f7d7defbf2c4927150cd9962e241c9793db36b3bdb81009838d68a6c1c39978773af9474f1e392117ac6ee1225d67f3d25625d1bf1c9fb308f02ccd1cf2781ed5c2d0d5f6207eff00accc117f356045953c13416ec213b7c8f3b38d8b70bbd5313b", 0x97, 0x2}, {0x0, 0x0, 0x3}], 0x50080, &(0x7f0000000680)={[{@localcaching='localcaching'}, {@data_ordered='data=ordered'}, {@loccookie='loccookie'}, {@nodiscard='nodiscard'}], [{@permit_directio='permit_directio'}, {@fowner_eq={'fowner', 0x3d, r3}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type', 0x3d, 'em1'}}, {@hash='hash'}]}) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000080)={@dev={0xac, 0x14, 0x14, 0x1b}, @empty}, 0x8) ioctl$int_in(r2, 0x5473, &(0x7f0000000700)=0x1) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) 04:10:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x8000) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f0000000240)={0xffffffffffff8001, 0x7, 0xfffffffffffffff7}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000080)={0x6, [0x3, 0x5, 0x3, 0xffff, 0x2, 0x6]}, &(0x7f0000000100)=0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x283}}, 0x20008000) 04:10:59 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) fstat(r1, &(0x7f00000001c0)) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001940)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000001980)=0x7ff, 0x4) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:10:59 executing program 4 (fault-call:6 fault-nth:12): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:10:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x1) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='udf\x00b\xdd\xd3\xb5\xcd\xbay\xb4\'Y\xa8\xcai\x8d\xcc\x10\xfaZ\xc4#\xd5\xb0\xe3\xbb\x01[\x83\x8c\x06z\xcb\xbd\nW\xa7n>\xcb\xecX\xf0\xbdA@\xc7\xad\xa7/\xfc7\xc0\x8b\xb4\xd9\xa2c\xd2u\xea?\xea\xa1\x03\xb0\x92-\x84\xbf\x06r\x80\xcf\xd2\xd0\xd70\x98\\\xa47\xc0w\x836\\U\xf4v:Pw\x84f~\x9f\xd5Q7\t\xa5\xc9[\x996HI\xd5\xcc\x86\x03&\f\xab)\x1ag^\xb8\xa2>/\xc9Fc]\xf6\xa6\xc9\xb6\xf0\x8ca\\\xcd\xe6\xe2^XV\xcb\xe9\xd3\x9f\xbe\xbfR=\x9b;*\a\v\xa6\x0f\x1a7\xca\x96_\xfb]\x1c\xb9\xbf\xd2w\xd1\xc4q.ol\xf4\xd9H\x86\x8b\x1b\xc6eN\xfd\xde6\xeeO\x1319\xa9\xb7\xa9', 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)="485e4394b17e6e58f1384612ab46354307f0fdd4eb6527d286b1a6f90a616aaada590e6fc41b826c58e165ec899376fc026fb0fb72f894392265adf1a8784b7567756ad35798943a7e2f0ce0c10dc6e37197e8efd67ac1b35e3572", 0x5b) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x3) open$dir(&(0x7f0000000080)='./file0\x00', 0x400080, 0x43) sync_file_range(r2, 0x1, 0x6, 0xecbe2082f24c4b6f) [ 314.432349][ C0] net_ratelimit: 29 callbacks suppressed [ 314.432359][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 314.508041][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:10:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) prctl$PR_SET_FPEMU(0xa, 0x1) [ 314.559586][T16973] device nr0 entered promiscuous mode [ 314.568716][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 314.616941][T16992] FAULT_INJECTION: forcing a failure. [ 314.616941][T16992] name failslab, interval 1, probability 0, space 0, times 0 [ 314.644251][T16992] CPU: 1 PID: 16992 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 314.653496][T16992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.663641][T16992] Call Trace: [ 314.666939][T16992] dump_stack+0x172/0x1f0 [ 314.671276][T16992] should_fail.cold+0xa/0x15 [ 314.675881][T16992] ? fault_create_debugfs_attr+0x180/0x180 [ 314.681779][T16992] ? page_to_nid.part.0+0x20/0x20 [ 314.686806][T16992] ? ___might_sleep+0x163/0x280 [ 314.691661][T16992] __should_failslab+0x121/0x190 [ 314.696602][T16992] should_failslab+0x9/0x14 [ 314.701347][T16992] kmem_cache_alloc_trace+0x2d3/0x790 [ 314.706727][T16992] ? init_timer_key+0x13b/0x3a0 [ 314.711583][T16992] tls_set_sw_offload+0x945/0x1567 04:10:59 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) r2 = dup2(r1, r0) connect$unix(r2, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e23}, 0x6e) renameat(r2, &(0x7f0000000000)='./file1\x00', r0, &(0x7f00000000c0)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000001c0)='./file0/file0\x00') [ 314.716702][T16992] ? tls_sw_strparser_arm+0xe0/0xe0 [ 314.721900][T16992] ? tls_set_device_offload+0x1b5/0xec0 [ 314.727449][T16992] ? tls_set_device_offload+0x1ba/0xec0 [ 314.732996][T16992] tls_setsockopt+0x4d5/0x8d0 [ 314.737691][T16992] sock_common_setsockopt+0x94/0xd0 [ 314.742886][T16992] __sys_setsockopt+0x261/0x4c0 [ 314.747735][T16992] ? sock_create_kern+0x50/0x50 [ 314.752603][T16992] ? fput+0x1b/0x20 [ 314.756423][T16992] ? switch_fpu_return+0x1fa/0x4f0 [ 314.761512][T16992] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 314.767579][T16992] __x64_sys_setsockopt+0xbe/0x150 [ 314.772670][T16992] do_syscall_64+0xfa/0x760 [ 314.777170][T16992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.783053][T16992] RIP: 0033:0x459829 [ 314.786923][T16992] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.806500][T16992] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 314.814886][T16992] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 [ 314.823033][T16992] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 314.830990][T16992] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 314.839026][T16992] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 [ 314.847146][T16992] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 04:11:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='mounts\x00') perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x1) r2 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) stat(&(0x7f0000000300)='./file1\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x10000, 0x4, &(0x7f0000000540)=[{&(0x7f0000000180)="ccc1465f8d08f688db5b8e0ed3b9823b9e0ad93760ea32ede7d129df7dc45f25a9f18ff914e40a5025bc82491b58bb0ea12f551e1ae683118f93b60263a110fb", 0x40, 0x1ff}, {&(0x7f00000001c0)="58f3676ac5552ddaf4b7c01674e6b02006bd6a8101655bd8a046cb78502aca15a7555760e49ee3d3c056a6cbc073ab01fa5c4a16ca2abcf5c75e943d90369e094c505c3239fa77c29d64104d37a2ac31af873983c388677d4c0180c6fa4c082526a9b42ffd6356ded6e475d7f0834870174048e5807c635304028fe5d4fb7dfe6f", 0x81, 0x6}, {&(0x7f0000000380)="3499ee27e36dad2df67cafafcf77b7c793fb26a96b504011dc442c83d5c660f5aa08374147abfadddcbc2350abb970d32b5580909d0f7d7defbf2c4927150cd9962e241c9793db36b3bdb81009838d68a6c1c39978773af9474f1e392117ac6ee1225d67f3d25625d1bf1c9fb308f02ccd1cf2781ed5c2d0d5f6207eff00accc117f356045953c13416ec213b7c8f3b38d8b70bbd5313b", 0x97, 0x2}, {0x0, 0x0, 0x3}], 0x50080, &(0x7f0000000680)={[{@localcaching='localcaching'}, {@data_ordered='data=ordered'}, {@loccookie='loccookie'}, {@nodiscard='nodiscard'}], [{@permit_directio='permit_directio'}, {@fowner_eq={'fowner', 0x3d, r3}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type', 0x3d, 'em1'}}, {@hash='hash'}]}) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000080)={@dev={0xac, 0x14, 0x14, 0x1b}, @empty}, 0x8) ioctl$int_in(r2, 0x5473, &(0x7f0000000700)=0x1) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) [ 314.890001][ T2484] blk_update_request: I/O error, dev loop1, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 314.905297][ T2484] blk_update_request: I/O error, dev loop1, sector 256 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 314.920223][T16996] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 314.957044][ T2485] blk_update_request: I/O error, dev loop1, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 314.971633][T16996] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 04:11:00 executing program 4 (fault-call:6 fault-nth:13): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 315.000262][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 315.015381][T16996] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found [ 315.023507][T16996] UDF-fs: Scanning with blocksize 512 failed [ 315.061673][ T2484] blk_update_request: I/O error, dev loop1, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 315.073244][ T2484] blk_update_request: I/O error, dev loop1, sector 512 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 315.087117][T16996] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 315.096198][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 315.105888][ T2484] blk_update_request: I/O error, dev loop1, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 315.110939][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 315.122491][T16996] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 [ 315.143695][T17016] FAULT_INJECTION: forcing a failure. [ 315.143695][T17016] name failslab, interval 1, probability 0, space 0, times 0 04:11:00 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r1, &(0x7f00000001c0)='./file1\x00', r1, &(0x7f0000000200)='./file1\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 315.145712][T16973] device nr0 entered promiscuous mode [ 315.152317][T16996] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found [ 315.165717][T16996] UDF-fs: Scanning with blocksize 1024 failed [ 315.181506][ T2484] blk_update_request: I/O error, dev loop1, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 315.194861][ T2484] blk_update_request: I/O error, dev loop1, sector 1024 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 315.213274][T17016] CPU: 1 PID: 17016 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 315.213781][T16996] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 315.222662][T17016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.222668][T17016] Call Trace: [ 315.222693][T17016] dump_stack+0x172/0x1f0 [ 315.222715][T17016] should_fail.cold+0xa/0x15 [ 315.222743][T17016] ? fault_create_debugfs_attr+0x180/0x180 [ 315.244616][ T2484] blk_update_request: I/O error, dev loop1, sector 2048 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 315.245824][T17016] ? page_to_nid.part.0+0x20/0x20 [ 315.245847][T17016] ? ___might_sleep+0x163/0x280 [ 315.250527][T16996] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 [ 315.254759][T17016] __should_failslab+0x121/0x190 [ 315.254777][T17016] should_failslab+0x9/0x14 [ 315.254803][T17016] kmem_cache_alloc_trace+0x2d3/0x790 [ 315.260691][T16996] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found [ 315.271775][T17016] ? init_timer_key+0x13b/0x3a0 [ 315.271794][T17016] tls_set_sw_offload+0x945/0x1567 [ 315.271813][T17016] ? tls_sw_strparser_arm+0xe0/0xe0 [ 315.271827][T17016] ? tls_set_device_offload+0x1b5/0xec0 [ 315.271847][T17016] ? tls_set_device_offload+0x1ba/0xec0 [ 315.277308][T16996] UDF-fs: Scanning with blocksize 2048 failed [ 315.281718][T17016] tls_setsockopt+0x4d5/0x8d0 [ 315.281739][T17016] sock_common_setsockopt+0x94/0xd0 [ 315.281755][T17016] __sys_setsockopt+0x261/0x4c0 [ 315.281773][T17016] ? sock_create_kern+0x50/0x50 [ 315.365719][T17016] ? fput+0x1b/0x20 [ 315.369523][T17016] ? switch_fpu_return+0x1fa/0x4f0 [ 315.374640][T17016] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 315.380704][T17016] __x64_sys_setsockopt+0xbe/0x150 [ 315.385813][T17016] do_syscall_64+0xfa/0x760 [ 315.390401][T17016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.396367][T17016] RIP: 0033:0x459829 [ 315.400259][T17016] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.419870][T17016] RSP: 002b:00007f08cac50c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 315.428544][T17016] RAX: ffffffffffffffda RBX: 00007f08cac50c90 RCX: 0000000000459829 [ 315.436534][T17016] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000003 [ 315.444500][T17016] RBP: 000000000075bf20 R08: 0000000000000028 R09: 0000000000000000 [ 315.452550][T17016] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f08cac516d4 [ 315.460512][T17016] R13: 00000000004c7eb6 R14: 00000000004ddd08 R15: 0000000000000005 [ 315.474508][ T2484] blk_update_request: I/O error, dev loop1, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 315.500776][T16996] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 315.547117][T16996] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 [ 315.570605][T16996] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found [ 315.580053][T16996] UDF-fs: Scanning with blocksize 4096 failed [ 315.596736][T16996] UDF-fs: warning (device loop1): udf_fill_super: No partition found (1) [ 315.624449][T17002] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 315.641078][T17002] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 [ 315.651838][T17002] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found [ 315.659808][T17002] UDF-fs: Scanning with blocksize 512 failed [ 315.675007][T17002] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 315.687239][T17002] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 [ 315.698212][T17002] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found [ 315.715445][T17002] UDF-fs: Scanning with blocksize 1024 failed [ 315.731771][T17002] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 04:11:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="8903a178490f000001a0ffffffffc4578ad7026b00576558cd020093dd86dd00008848ba0800451fc40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551516248e07573977c5eff11680107fdf79d1af8f4e56309ac9733d41cc0ff11999dec3740f0853200000000000115a21971dd1feb6c2bf65905e863b7d342ed5293033159b87069ccc2c25b80a1de96ea6221dc9adca6c19c1a979d81f287627b3ac0fe5d5d644dc299c6e5b1bbae122dcae5c4d3470b7ee0b23c466a410c5d885662de4bcfd4d73c0da00789d086dc805524b1df92b3c21d6605f191bed951f20a1560f7adf0c24ee5cb2e8dc126d94c3c5c26c01b572745bf81fb8a9607b6186fc72259d4504dc75ab7c6b5112"], 0x7ffff) 04:11:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x16) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x4, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x150, r3, 0x200, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x800}, 0x48000) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x1bf08a70b7a078f7) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000440)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r4 = dup3(r0, r1, 0x80000) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='mounts\x00') perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x1) r2 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) stat(&(0x7f0000000300)='./file1\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x10000, 0x4, &(0x7f0000000540)=[{&(0x7f0000000180)="ccc1465f8d08f688db5b8e0ed3b9823b9e0ad93760ea32ede7d129df7dc45f25a9f18ff914e40a5025bc82491b58bb0ea12f551e1ae683118f93b60263a110fb", 0x40, 0x1ff}, {&(0x7f00000001c0)="58f3676ac5552ddaf4b7c01674e6b02006bd6a8101655bd8a046cb78502aca15a7555760e49ee3d3c056a6cbc073ab01fa5c4a16ca2abcf5c75e943d90369e094c505c3239fa77c29d64104d37a2ac31af873983c388677d4c0180c6fa4c082526a9b42ffd6356ded6e475d7f0834870174048e5807c635304028fe5d4fb7dfe6f", 0x81, 0x6}, {&(0x7f0000000380)="3499ee27e36dad2df67cafafcf77b7c793fb26a96b504011dc442c83d5c660f5aa08374147abfadddcbc2350abb970d32b5580909d0f7d7defbf2c4927150cd9962e241c9793db36b3bdb81009838d68a6c1c39978773af9474f1e392117ac6ee1225d67f3d25625d1bf1c9fb308f02ccd1cf2781ed5c2d0d5f6207eff00accc117f356045953c13416ec213b7c8f3b38d8b70bbd5313b", 0x97, 0x2}, {0x0, 0x0, 0x3}], 0x50080, &(0x7f0000000680)={[{@localcaching='localcaching'}, {@data_ordered='data=ordered'}, {@loccookie='loccookie'}, {@nodiscard='nodiscard'}], [{@permit_directio='permit_directio'}, {@fowner_eq={'fowner', 0x3d, r3}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type', 0x3d, 'em1'}}, {@hash='hash'}]}) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000080)={@dev={0xac, 0x14, 0x14, 0x1b}, @empty}, 0x8) ioctl$int_in(r2, 0x5473, &(0x7f0000000700)=0x1) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) 04:11:00 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f00000001c0)=ANY=[@ANYBLOB="08000000000000000000f600"/36]) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000200)={0x3, {0x1e, 0x3ff, 0xff, 0x2}}) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:00 executing program 4 (fault-call:6 fault-nth:14): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 315.742387][T17002] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 [ 315.752120][T17002] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found [ 315.762523][T17002] UDF-fs: Scanning with blocksize 2048 failed [ 315.769243][T17002] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 315.780195][T17002] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 [ 315.840723][T17002] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found [ 315.872539][T17002] UDF-fs: Scanning with blocksize 4096 failed 04:11:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0xfffffffffffffffd, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = gettid() ptrace$peek(0x1, r2, &(0x7f0000000280)) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x5, 0x204000) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r4, 0x800442d3, &(0x7f0000000100)={0x0, 0x8, 0x100000000, @link_local, 'lapb0\x00'}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f00000002c0)=""/140) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) fcntl$setown(r1, 0x8, r6) 04:11:01 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) socketpair(0x2, 0x6, 0x8001, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000200)="e6988bab789a9072e29f6cafeb55314328f7592396cffda58d4cfba5c1598806493bc16a83897518d8590c2ed00d452ba88bb1965cca4baed7198ef67dd3749376323b0d4a7eb76a0d21454ed80f9bd148338d7e2d07366ab84c7e4fb4adda888da3536643c87e9ba055f33b4c19465528fe1a1c416a8796e93450fe35184aba5c4f26cee9691455c935c99c2b2e3b7a7e9f4eb4f168680dd3373fa9e969094707eb58e8701916c9368c1a57a8fb7d40e78a979370fe4b3eb5c9423e92651e377af5c592233eef96f00ab22b8fd662d5", 0xd0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 315.899786][T17002] UDF-fs: warning (device loop1): udf_fill_super: No partition found (1) [ 316.009242][T17041] device nr0 entered promiscuous mode [ 316.010428][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 316.040130][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x8001}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000240)={r2, 0x1000, "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"}, &(0x7f0000001280)=0x1008) r3 = dup3(r1, r0, 0x80000) ioctl$VIDIOC_SUBDEV_S_SELECTION(r3, 0xc040563e, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x2, {0x7, 0x40, 0x10000, 0x5}}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x3bb) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r4 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x42, 0x101000) ioctl$TIOCCONS(r1, 0x541d) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr, 0x9}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000080), &(0x7f0000000180)=0x4) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0xffffffffffffff46) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r4 = dup3(r0, r2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:01 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x80, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x10000) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000200)=0x3) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') getpeername$unix(r1, &(0x7f0000000280), &(0x7f0000000340)=0x6e) [ 316.240548][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 316.320525][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 316.471677][T17049] device nr0 entered promiscuous mode 04:11:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3ff, 0x80000) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000040)=0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000080)={0x6, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000004c0)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) 04:11:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x20cf6fe5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x200, 0x0) write$nbd(r3, &(0x7f0000000240)={0x67446698, 0x1, 0x3, 0x2, 0x4, "d310ce806104fe6f404988e8713864c4a1ff8aaa90f77069666a7db260b3e602dc59117742f2f04dcb36ac3ae081a9a338fdb7865852a3c0215247de44b53cc94d67fdeeab35c09d5f0c8c46891b1df1e4964f2eb3f76ff296f6a0304a23f214822a6baf97d017b8a0039c998948d3891a82f4735e6bcaa1954e1458b7ded5b0baa231a199253a82a6429ec81c62c2cafd86c52648a3e0aaf23d17973d349aa00d308522c882a6c2"}, 0xb8) socket$vsock_stream(0x28, 0x1, 0x0) r4 = dup3(r0, r2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:01 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000200)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x400000, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000300)={0x11f, 0x4, 0x1, r3}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r4 = dup3(r0, r1, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x5f, 0x7}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000180)={r5, 0x6, 0xffffffffffffffc0, 0x9}, &(0x7f0000000240)=0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x66, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:01 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = fcntl$dupfd(r2, 0x406, r2) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000240)) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000000)={0x3, 0x8, 0x80, 0x7fff, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000180)={r4, 0x7, 0x7, 0x9, 0x2, 0x1f}, &(0x7f00000001c0)=0x14) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@window={0x3, 0x9}, @timestamp, @mss={0x2, 0x40}, @sack_perm], 0x4) 04:11:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x300, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffdda, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e23, 0xfffffffffffffffd, @loopback}, 0x1c) r2 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0xf7f6, 0x208200) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000001800)={0x0, 0x24, "a9ef1670b0f2d5c195b48517bc492e96ec11da16e6a671814ca51ffde35b76962a6257b4"}, &(0x7f0000001840)=0x2c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000001c00)={0x0}, &(0x7f0000001c40)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000001d00)=[{&(0x7f0000000340)=@in6={0xa, 0x4e22, 0x6, @remote, 0x5}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000380)="2ad99637a166268f375442b3c6d4f030699910785c2be2b8ac31114b819a25960d12b8a74dd0d86ace5564bdfbcbd18ac8198b542a27de74454b0eb9ffd3843ec8a04b1c1b010915fc5609c9f6907829bc3ead7aec81673ba88cddb1aa4e13a4a37c2d308d5ad994ddfa481b21fe981b3e438a277c2fd81931e2f0197e1121709b5461da037c3a5ae73c01a90007183fde3ecab59c9497d075b1564a22c6e139b92d003b1f54ce827af9f2c00b12981be09d36a3028c7688659ff5c8726de98b281de4522df1be4698eec8c968cca01b985c2da106e455ce0f901d341e39f810cd14c8ad10920da350d375574f7a724053ec65a9", 0xf4}], 0x1, &(0x7f00000005c0)=[@dstaddrv4={0x18, 0x84, 0x7, @empty}, @sndinfo={0x20, 0x84, 0x2, {0x9, 0x20a, 0x0, 0x8, r3}}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @sndinfo={0x20, 0x84, 0x2, {0x40, 0x800f, 0x2, 0x8000, r4}}, @authinfo={0x18, 0x84, 0x6, {0x4000000000000}}], 0xa0, 0x800}, {&(0x7f0000000680)=@in={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f00000017c0)=[{&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="e89d052527666a7ac02d6bb6752369816e24eedcad90f04cb2165ae02aa8162444689220354fc0a8638a52ff1a6a6ad034014b896a773fbd089017b4290526112e2b0eb8b22fba0bfa36328c7e373b78295b11ec729bad5266332127fdbd6bf23b0f4c81b31147fe1c1e02a3742b92e99f31e14dfad2ee9c31412ed1865121acdadd4edfbba46176d58ab2eb9ff41a829453c3c3793646489fa6a8d334a59a25d91dee0a9e34ceb59777b8e473d96ed8e27614169e70b92c0e125ecc1ac56f1842fa9789d4636c8c7608c8472d54a4cfa0efa52c6be1aa07c86d8657bb0c7b2581678f9ebd3f8cc0543a0e959f3319045f26b5cb552b", 0xf6}], 0x2, &(0x7f0000001880)=ANY=[@ANYBLOB="1800000000000000840000000600000001000000000000002000000000000000840000000800000000004600000000000000ffffe000000230000000000000008400000001000000ff7f000204000000520000070000000000000000910900000a9e0000", @ANYRES32=r5, @ANYBLOB="20000000000000008400000008000000ff01000000000000000000000000000118000000000000008400000005000000200000000700000020000000000000008400000008000000fe880000000000000000000000000001180000000000000084000000050000003000000007000000"], 0xd8, 0x40}, {&(0x7f0000001980)=@in={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000001bc0)=[{&(0x7f00000019c0)="d5c4bac4af3f868df743c70f707514319dbc8c13a4234c9a3ea0cd00f38b38be76fc7d5c0a99ef997c4736cdeaf4b17568b585c72ac885c4b32579e7813b602bd6b0dcc64c1d9e47c0f46e9ff9aa854a2d4f6db6be9c4b8f0ad306a8e7bb3e1f142ca9aeeda673e6707c223c9b717a7997", 0x71}, {&(0x7f0000001a40)="0447f20c0d94e13988824764c9c4626a27c03c8cff552491905ae733aac5784a78bbf1ef87c35213dc2578984352b36142981d17335d64be2dce8d695212dc69", 0x40}, {&(0x7f0000001a80)="1b7941d3c21c6de959ca9ed24cfa257f8a16003d4d10ec417a11d57306c5f7044f5034629794a4abb453af1b73c5f555abfd3f8bb3d2da3277039cc1740d78950207d9b8315f59538a8f51797932bf00a4cb29665238e31772a36243f2ff2868e19fe3b663bcc2dc4753c5b94a7e975e5ce6c053df47f1a757c01970a8eff438207ac94209bb8726f2a33a3cd6e8d6a3631292e01e48f811ebdec250d1e1ceb1f20b836da4e541492cf301", 0xab}, {&(0x7f0000001b40)="e376697e14723a769c53b6d8f99f831dc688eafa871a93f6c77f8cd8644932af1c8aeca4976845a515f84f2c11f2b60ff7602b322cc1053b972255b9028085c59d3c587f2680919f9d79b3a6d8f2e77b", 0x50}], 0x4, &(0x7f0000001c80)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0xfffffffffffffc01}}, @init={0x18, 0x84, 0x0, {0x800, 0x900, 0x6, 0x2}}, @sndrcv={0x30, 0x84, 0x1, {0x20, 0xea, 0x2, 0x80000000, 0x1, 0xa440, 0x1190, 0x3f, r6}}], 0x60, 0x8000}], 0x3, 0x4000000) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x1, 0x10000) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x2e3) r7 = dup3(r0, r1, 0x0) write$UHID_GET_REPORT_REPLY(r7, &(0x7f0000000080)={0xa, 0x5, 0x854, 0x2}, 0xa) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000280)) sendmsg$SEG6_CMD_GET_TUNSRC(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xfffffffffffffd94}}, 0x20008000) ioctl$RTC_ALM_SET(r7, 0x40247007, &(0x7f0000000100)={0x35, 0x1c, 0x5, 0x10, 0x6, 0x5, 0x6, 0x10000000fa, 0xffffffffffffffff}) 04:11:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x80002) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000100)=0xfffffffffffff048) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:01 executing program 2: mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x80) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 316.947202][T17102] device nr0 entered promiscuous mode [ 317.240589][T17112] device nr0 entered promiscuous mode 04:11:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x66, 0x301840) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000180)=0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000280)={0xffff, 0x2, 0x1000, 0x528, 0x1, 0x4, 0x401, 0x7fff, 0x2, 0x7ff}) r4 = dup3(r0, r2, 0x80000) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:02 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x5, 0x400201) recvfrom$rose(r1, &(0x7f0000000200)=""/83, 0x53, 0x40000102, &(0x7f0000000280)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, [@null, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f00000002c0)={0x40, 0x0, 0x1, 0x7, 0x9, 0xfffffffffffffffa, 0x8001}) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) getresgid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x20008000) 04:11:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0xff00, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:02 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = fcntl$dupfd(r2, 0x406, r2) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000240)) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000000)={0x3, 0x8, 0x80, 0x7fff, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000180)={r4, 0x7, 0x7, 0x9, 0x2, 0x1f}, &(0x7f00000001c0)=0x14) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@window={0x3, 0x9}, @timestamp, @mss={0x2, 0x40}, @sack_perm], 0x4) 04:11:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r1, r0, 0x6ea533efc3e07251) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000080)={0x4238b102b4407b12, r2}) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:02 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') io_setup(0x6, &(0x7f00000001c0)=0x0) io_cancel(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x7, r1, &(0x7f0000000200)="22e129ca382cde8babc21ba5dd89bfc91a8465237d701630c8b003adb6419bd793d6994ba26a4b085dca8fe239e6c46c29f734a9497576460141e4ad7a7071a2f58dea2765a9124a805b53abc3e22813d50730da722f8d7d3e1709a54ec59c2cd5b148374c69a5340d17525f5622929cb446f0697296d8bc172708c5044947a90b40ade99ee93ca475f972415ccdbb3f376b4fe08c2624478d25b1faecceb5abc4524e0b016d48005691c4c3af88e0e584578635b4666b22c3e5f61955", 0xbd, 0x4, 0x0, 0x1}, &(0x7f0000000340)) 04:11:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0xffffff1f, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 317.485800][T17151] device nr0 entered promiscuous mode 04:11:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x4) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "b22d553ff9212f68", "f58755b644d1e1ec477ae8fadc4ed878749895ce8eaae7dbf8ffe0c416ff9b0c", "b18d7ada", "1ab3060f0f5b5490"}, 0x22e) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) tee(r1, r0, 0x7, 0xc) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:02 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) rt_tgsigqueueinfo(r1, r2, 0x22, &(0x7f0000000100)={0x4, 0x1530, 0x2}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f000028f000/0x3000)=nil, 0x3000}) [ 317.990974][T17155] device nr0 entered promiscuous mode 04:11:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x302}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:03 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r1 = creat(&(0x7f00000001c0)='./file0/file1\x00', 0x83) ioctl$VT_DISALLOCATE(r1, 0x5608) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) r3 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000240)="f965755e2a5c566e061be322fe459f552ddace743a108cae9ae1227e34144a9e99f3d0f23cc7e392f11e9150dab90d84a14aa48d44b1fbf9eed55028390922987bab5b9dc04504a19496877fd3a4a516d828efda833217804f84650fb7ee691eb027baeb5c0193d0613cceadc17847780621fed243eb5c6720244671c8b0449426af31abb0cb8e903e01fc83aa4a45b49e7e2c08", 0x94, 0xfffffffffffffffb) r4 = request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='tls\x00', 0x0) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r5, 0x1) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x1}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="180000001600010a00000000000000000a00000322ea501376fbc4a061000000"], 0x18}}, 0x0) 04:11:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000100)=0x14) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x73283890d2cfc884) r2 = accept(r0, &(0x7f0000000380)=@xdp, &(0x7f0000000180)=0x80) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000400)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0xdf34446d524da78, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000240)) r4 = dup3(r0, r1, 0x0) mq_timedreceive(r4, &(0x7f0000000300)=""/71, 0x47, 0xfff, &(0x7f0000000100)={0x77359400}) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:03 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x118) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='jfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x10a00, 0x10006) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x1, 0x0) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000240)={0x2}, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000280)={0x5, 0xfee, 0x5, 0xe2, 0x8}) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x304}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr, 0x6}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:03 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x1, 0x0) utimensat(r0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={{0x77359400}}, 0x100) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='bdeveth1posix_acl_accesswlan1%[P+\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000480)=0xc) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x3) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000500)={0x0, 0x7}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={r2, 0x7}, &(0x7f0000000740)=0x8) setxattr$system_posix_acl(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="0200000001000000000d000002000000b1891d96ff0e3ef30bcfcdac785471de442ba8b8892cdcd15173cfd5605dd50ccb91daee43c166e7d82c07d30aad1305b859b2202af8241e7e63ee9f6dbc931d5e3f80dcfd9871d7efce86ef797cfc4d6fec988885a016b0ffc9333e8b4de47b935174100b4facb667bbcfb25b9d529789", @ANYRES32=0x0, @ANYBLOB="04b1fe90ad27f3da6a382c71ef", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000700000000002000000000000000"], 0x3c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowLrdir=./file0,workdir=./file1\\\x00']) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000540)={0x4, 0x8, 0x20000000000, 0xfffffffffffffffb, 0x18}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000003c0)={0x0, 0x5, 0x2, 0x1000, 0x200000000, 0x200, 0x4}) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x7fff, 0x1, 0x0, 0xc3, 0x0, 0x5f71, 0x44400, 0x1, 0x401, 0x80000000, 0x5, 0x0, 0x8, 0x7ff, 0x8b, 0x0, 0xfffffffffffffffd, 0x5, 0x3, 0x7fff, 0x8e63, 0x7ff, 0x0, 0x0, 0x2, 0x7, 0x1, 0x3, 0x9, 0xfff, 0x7fffffff, 0x3, 0xfffffffffffffff7, 0x6, 0x0, 0xffff, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x1, 0x4, 0x4}, 0x0, 0xffffffffffffffff, r1, 0x0) 04:11:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x308}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 318.426145][T17203] device nr0 entered promiscuous mode [ 318.442049][T17214] overlayfs: unrecognized mount option "lowLrdir=./file0" or missing value [ 318.553644][T17214] overlayfs: unrecognized mount option "lowLrdir=./file0" or missing value 04:11:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:03 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x40000, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x2000, 0x8) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f0000000100)=0x2000400) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x20008000) write$9p(r2, &(0x7f0000000200)="bd98c6ea73de79d1167aa12e523186c5309b3697fc215bd87939318730aaa0ef2eea3bfc5a115edde397d1c0521ed5e6f93365e06c45bd1702e020b920e93c9bb3630c07cdc29d8a66b6a3f4238ec9129199f7efc79ac63d2d9345c7854dd1b94e7dcdb2d5b377427fadc9b50c333050f8cb9998bbb1e25d1ab947e25e7fac36c57256b3b5b9d675acecad8017945f0e83bcaa6eeb10717c8ba7ef7c79e9adbd83e9f0d0f6929f6a32d3bb03a2ef71ad18cfdf63a5ea135f9b21e566a98ff15f9a14e34b30ddbe634284c153da2be7e9288d717b480f7ce6c1a6cc70a9fcdb1ef20d", 0xe2) 04:11:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x310}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:03 executing program 1: set_mempolicy(0x0, 0x0, 0x1) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40, 0x80) renameat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x0, 0x0) accept$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 04:11:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getpeername$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000140)=0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r1 = dup3(r0, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000180)={0x0, 0xfffffffffffffca2, &(0x7f0000000100)={0x0, 0x306}, 0x1, 0x0, 0x0, 0x40090}, 0x11) sendmsg$nl_crypto(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x60000100}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@get={0xe8, 0x13, 0x400, 0x70bd25, 0x25dfdbfc, {{'morus640\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x20}]}, 0xe8}, 0x1, 0x0, 0x0, 0x40000}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8) 04:11:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x22080, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xa0421000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x34, r2, 0x300, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x18, 0x5, @udp='udp:syz1\x00'}}}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40804}, 0x4000000) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000240)=@gcm_256={{0x304}, "1e605f7455a3ac8d", "e211e7735b01b5d329ae81a2320d27e2d739f33f1e6420f700dd38b8d5e04a14", "a6fe8633", "5d7294b84a17811c"}, 0xffffffffffffffa6) r3 = dup3(r0, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECCOMP(0x15) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 04:11:04 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0xcdad, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@dev, @rand_addr="9bf7efa69e92a7ea4a88581d032e47b1", @mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x2202, 0x0) 04:11:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x403}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:04 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='t\x18?\xee\r\xcd', 0x1801090, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:04 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x2400, 0x0) write$P9_RATTACH(r0, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x10, 0x3, 0x1}}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) prctl$PR_CAPBSET_READ(0x17, 0x1c) r3 = dup(0xffffffffffffffff) ioctl$MON_IOCH_MFLUSH(r3, 0x9208, 0x100000000) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) mremap(&(0x7f0000789000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) r4 = dup3(r1, r2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 319.019213][T17260] device nr0 entered promiscuous mode [ 319.348082][T17268] device nr0 entered promiscuous mode 04:11:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303, 0x34}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:04 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:04 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x4) sendfile(r0, r2, 0x0, 0x80001d00c0d0) socket$inet_sctp(0x2, 0x1, 0x84) close(r1) 04:11:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='\x00)\bN'], &(0x7f0000000180)=""/6, 0x6) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 319.504397][ C0] net_ratelimit: 27 callbacks suppressed [ 319.504408][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303, 0x35}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:04 executing program 2: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xa416) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00') getdents(r1, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) getsockname$netrom(r2, &(0x7f0000000240)={{0x3, @default}, [@null, @bcast, @remote, @null, @remote, @bcast, @bcast, @netrom]}, &(0x7f0000000080)=0x48) [ 319.650801][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:04 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10008}, 0xff89) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) dup3(r1, r0, 0x0) [ 319.695182][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) poll(&(0x7f0000000180)=[{r0, 0x2}, {r1, 0x201}, {r0, 0x8000}, {r0, 0x410}, {r1, 0x100}], 0x5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r2, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r3, 0x4, 0x8}, 0xc) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 319.739458][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 319.788542][T17314] device nr0 entered promiscuous mode [ 319.869699][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 320.126391][T17324] device nr0 entered promiscuous mode 04:11:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:05 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) 04:11:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x88) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') socket$nl_xfrm(0x10, 0x3, 0x6) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000380)) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r3, 0x400, 0x70bd27, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x4080) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x917, 0x240002) r4 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) getsockname$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x1c) 04:11:05 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f00000000c0)=0x402, 0x4) sendto$inet6(r0, 0x0, 0xfffffffffffffe6e, 0x40000, &(0x7f0000000080)={0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x18) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) 04:11:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x18e}}, 0x20000000) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000080)={0x4, 0x34, "c1320b43dcd8e71347412f248107f9838489378669ff63588dfce9c5ef8f7a6d77d13ed1b8ebf33301287a91093e4efb880ffa6e"}) 04:11:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440265238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 320.278971][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 320.302718][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:05 executing program 1: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff48, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000115000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000048c000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x1) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x1ffc31}], 0x10, 0x2000) 04:11:05 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file1\x00', 0x100, 0x11) mknodat(r0, &(0x7f00000001c0)='./file1\x00', 0x80, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xffffffffffffffc4}}, 0x20008000) [ 320.329092][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 320.356692][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x8000, @mcast1, 0x1}, 0x1c) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440365238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 320.534389][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x2}, 0x16) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 320.577057][T17389] device nr0 entered promiscuous mode 04:11:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:06 executing program 3: r0 = socket$inet(0x2, 0xa, 0xfffffffffffffe9c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000240)=[@in6={0xa, 0x4e20, 0x7, @mcast1, 0xff}, @in={0x2, 0x4e20, @rand_addr=0x5}, @in6={0xa, 0x4e20, 0x200, @ipv4={[], [], @local}, 0x100}, @in={0x2, 0x4e22, @empty}], 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r0, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:06 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_mount_image$nfs4(&(0x7f00000001c0)='nfs4\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x4, &(0x7f0000000580)=[{&(0x7f0000000240)="c4f16c383ed23b3d614e0164f0c75f656284af24b9b6d1ec4e733ba54f5cc8243b02f9b17a496fd92ba86c302b6ca23a390e14626416aadca354bea00d6e2672c1f6f81a", 0x44, 0xfffffffffffffbff}, {&(0x7f00000003c0)="4de4deadea024ed1566aee6d589e4f60e6e15fc0d9b823f369fbf2d40e20f538553f64c76153e8aa7fa26f620e7ffc96226f9caf478529c2fc1150ab8f45e3177a2b31b5c6b62db422d6ba0058aa352a7cb9097cc983c372b2c36670d49c51aca5ddc9f1341bcdd8247b9848157bd80e9237d56286201f69109f22eab3109cd870925655c078bc3dcf34b2270d2929fc6860d8036284e51d4eaae5cb3039a64ed475310aceb33ffd94025c7a7f42d40073d1813ce5cc0a8035ae41e65a9ae1c322c0e3aea369fd827939faaf84e8099658fd477550011bbb4ec342620dd19ef9064b680c3d41465eff15b92ce98bcb4d39007e15", 0xf4, 0x7c00000}, {&(0x7f00000004c0)="0b31d6fa4dba5ae4f7d7ef9d5c875aa587d6764057a4beab264ac375b94b86d9f55dd1d16aec5d8cd048601febb3111dfb644c0167d4546b28988c6fa6fde6cdb341f25ff107696d05d7b99fbf799a5623802ea3f3a7cb52586b24df77c2916dcffc16e1c8b2ee3713a034847b659fa98fb9db7a592957ba8ac42f03e291463225e85d894136c7cc", 0x88}, {&(0x7f00000006c0)="6d3db02ed5b301f6068fdd14695ace2334c86f858588a34634d1c34550d746998f32b1ac9eab60d276cd2c170962301fcc1ab259f3b9ba4375d97560acc830f2da318ed8b08a414d7f4f844319e1c7f2fa8cc8955d452efaddd2870239fe9a24d8aed3787eaf8a2fcb771a4992337acd15b077632953d44924032113a8a1566f93e64ff5c76685f92d1f35393d9fc0782105ec38faef7b", 0x97, 0x205}], 0x80020, &(0x7f00000002c0)='user\x00') mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x8) link(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000780)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) syz_mount_image$nfs4(&(0x7f00000007c0)='nfs4\x00', &(0x7f0000000800)='./file1\x00', 0x100000004, 0x4, &(0x7f0000001a00)=[{&(0x7f0000000840)="5edc8df6f59da9c3", 0x8, 0xdc27}, {&(0x7f0000001b00)="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", 0x1000, 0x9}, {&(0x7f0000001880)="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", 0xfa, 0xfff}, {&(0x7f0000001980)="5158d5569a689eafdf4c072c016e3ec98dac382e5adf05a2053045e4452a06cc4b80f2cb110920836fbd8f88f93bbd04bc0d1717e3c0c5584a37aaeeda75b4519a17c61160739e4e2b22c984040e77f41c8930d75cc2c007", 0x21, 0x4}], 0x10, &(0x7f0000001ac0)=':\xc8em1selinuxuser)\x00') unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:06 executing program 1: mkdir(&(0x7f0000000900)='./file0\x00', 0x0) creat(&(0x7f00000006c0)='./file1\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0) 04:11:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440465238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x2) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 320.946034][T17434] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 04:11:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x18) pipe(&(0x7f0000000340)={0xffffffffffffffff}) sched_setparam(0x0, &(0x7f00000001c0)=0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 321.010968][T17432] tmpfs: Unknown parameter 'user' 04:11:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440565238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x8}, 0x17a) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x200020004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xfffffffffffffe78}}, 0x20008000) [ 321.082225][T17441] device nr0 entered promiscuous mode [ 321.195326][T17432] tmpfs: Unknown parameter 'user' 04:11:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2001, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000100)=0x101, 0x4) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x200, @mcast1, 0x5}, 0x1c) [ 321.540851][T17441] device nr0 entered promiscuous mode 04:11:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:06 executing program 2: link(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x10102) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r1 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x4b3f, 0x200) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000280)={[0x2, 0x3000, 0x2, 0x2], 0xffffffffffffffff, 0x20, 0x8}) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f00000003c0)={0x2, @sdr={0x4f424752, 0x7fff}}) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') getsockname$netlink(r1, &(0x7f0000000140), &(0x7f0000000340)=0xc) socket$inet6_dccp(0xa, 0x6, 0x0) 04:11:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x7ff, 0x801) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000240)=""/173) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440665238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3f, 0x800) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000100)) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440765238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 321.861065][T17500] device nr0 entered promiscuous mode 04:11:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_mount_image$nfs4(&(0x7f00000001c0)='nfs4\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x4, &(0x7f0000000580)=[{&(0x7f0000000240)="c4f16c383ed23b3d614e0164f0c75f656284af24b9b6d1ec4e733ba54f5cc8243b02f9b17a496fd92ba86c302b6ca23a390e14626416aadca354bea00d6e2672c1f6f81a", 0x44, 0xfffffffffffffbff}, {&(0x7f00000003c0)="4de4deadea024ed1566aee6d589e4f60e6e15fc0d9b823f369fbf2d40e20f538553f64c76153e8aa7fa26f620e7ffc96226f9caf478529c2fc1150ab8f45e3177a2b31b5c6b62db422d6ba0058aa352a7cb9097cc983c372b2c36670d49c51aca5ddc9f1341bcdd8247b9848157bd80e9237d56286201f69109f22eab3109cd870925655c078bc3dcf34b2270d2929fc6860d8036284e51d4eaae5cb3039a64ed475310aceb33ffd94025c7a7f42d40073d1813ce5cc0a8035ae41e65a9ae1c322c0e3aea369fd827939faaf84e8099658fd477550011bbb4ec342620dd19ef9064b680c3d41465eff15b92ce98bcb4d39007e15", 0xf4, 0x7c00000}, {&(0x7f00000004c0)="0b31d6fa4dba5ae4f7d7ef9d5c875aa587d6764057a4beab264ac375b94b86d9f55dd1d16aec5d8cd048601febb3111dfb644c0167d4546b28988c6fa6fde6cdb341f25ff107696d05d7b99fbf799a5623802ea3f3a7cb52586b24df77c2916dcffc16e1c8b2ee3713a034847b659fa98fb9db7a592957ba8ac42f03e291463225e85d894136c7cc", 0x88}, {&(0x7f00000006c0)="6d3db02ed5b301f6068fdd14695ace2334c86f858588a34634d1c34550d746998f32b1ac9eab60d276cd2c170962301fcc1ab259f3b9ba4375d97560acc830f2da318ed8b08a414d7f4f844319e1c7f2fa8cc8955d452efaddd2870239fe9a24d8aed3787eaf8a2fcb771a4992337acd15b077632953d44924032113a8a1566f93e64ff5c76685f92d1f35393d9fc0782105ec38faef7b", 0x97, 0x205}], 0x80020, &(0x7f00000002c0)='user\x00') mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x8) link(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000780)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) syz_mount_image$nfs4(&(0x7f00000007c0)='nfs4\x00', &(0x7f0000000800)='./file1\x00', 0x100000004, 0x4, &(0x7f0000001a00)=[{&(0x7f0000000840)="5edc8df6f59da9c3", 0x8, 0xdc27}, {&(0x7f0000001b00)="81d5e1a10f9209929b5ad8ffce1ea2dbac12013a2c349111628ddc5594840cd1c75f89c9e5ea73fef45baee868e1e49c6a2fab28669714c104034eb08179014e0b66b9e6952ab62473984535107b9ed3c72eab9a48c55f1edd092e5e5188bb7adadaad8679984b60d9cccb4bc4e52d7003fe8a4f84366a260af0ef62eda198c0c914182c7d6ccd69374073ac2405824d63c92c5f7976c412764ecd8881f8a00e20deca5ab263f9033b3833b6a732a36bd0837ba65930e8c187ca0e7a0234ae4bf0971ac34154fc4483fd94e9ec82a5110c62c5a71163a0f317e72bb6c0b3b369bf1bc66b43a9641d1ccf1686ca2050a4b2f05cac8b28543d35bc6d651948b6814ba21be86c3913ddbeee074f2582c6c3190da52a022f7dbda4b8553c4bd0857730183a9ac69cda8ff830411e48f376143a3465618384a9ec994b7e2f160bd58b67bd87174d460fd75372d34ac76342b43d427a591b19a51bc31d27ff108ad4c82a81b86fca4ba8f064102f16bbdbc9f141a7ad474de847c3f747097b7999992f67098d6863ed91384a3fb85fe872293c06fde5db71ce431403c6732459c2b0e31fd997597683d9f531426880e175b25a5295b83fbb5e2c2af61669c18e58bde5b950d200e97211b0b48256d7105f79dc46ce6aa1c57b5297685bab68626b312f40d7d9e0f1a4971ac02c98a31aea0788b2e31ee77eec4bbb8dafb6657c9286d69ddf0f91e6c8c714b557c15a9d143732dfc0202e81a3eb7278a18f21e8f94ce32ac008509e0bbb999b21798adaa5e550b09b2d3fd6a7ca219a4d246721314b827810d0f1583860c1d327ee868ef399cb8004664b71df7e25e944c683a69e1fc38a1ee38aeb24ab40759b1df61db26581da2bbbe5a35b5d0b7e4166c39bc8ac9151cb719231c1e73b1ea62f725d5e35035e1332f40078af953c98f03ad9e9c034a3c0e47a0627f2b7ad48fc839ff7957712cb74df1ed6a1b7fe5fa0ba089def8c34ff1b31d706bf05f6c1612ea7bcc8c0e3439f573753991ca0a3e54378a91f42f15efae80e93e58ad8db08cf6de5b894f96c375257b5b60d698eb41a9cbaf827677c3ed04b78f087f3c1665d971ffd5659198668c2ce894fdfc4d2c48e4c5f28caf98361837ee76e6f0d8b7ca48d0a5945ef6819b33effd280c7d8393e8e0ea56b760671e93bc5e6f1b0d4ee8771d6fe72d4bd5b1aac76957e418c08cf4474e46e9cecd28485bc3c13f194ec056d6138d03049e6b968e14ff9cbd868c6a329969914c682817eeb563bbf60aeb712dde7c6b72cf417dbae80869dd5457e32e99dc0e62b7f3a0f5003080fe3b89d1b9efd771e190093ab43b6d5d5480c0d74bfbff9cb3a3e2bc7c706c72e765c95d28f3133e24669191fcab64c003ddbc840eb30ca71ac0245c88ce35c5903cdb6a1e52640d63a6cb651a8e8514b0061911ec9d86d90c5aed530aae74fd10f968f4e144abc1fbcf92f77a2e79d5d83f4b55505b7a62c196fdbd37e3dd1359be2240829a5f7349b49dcd61550ca1a75ede7d5bc4a311ed059bd4b59c0ff186bf2234516c1898a5e855e34f65396a71650810d4873dd8266a324e2c12bec409b2a1d077653a58eca6e756ff834dda3137ce552508bf9d880e7f175017d717255b30dacf3da31c7549c2a4ba085a3602681e0039556f796a9842d779d81a87524633917fe69a127319c5eb8353948ce928a56bdde281c5aa804253febb852f2cb65be73f599ebb5b0de9989d246482ef211254264e0fca474782a015ae95c7c739a3afe434944fc65ac7bf55dc87c4c93dcb776d688e625504094a80955314dcf9f582796dba3e170e48477e7a947f08c18337fda4949d8509400ee7d99a8ff8c2ab07e15e8fa458350c374f01fe1b679138b444b1a04f11da9ddc160ed2bd2eae3d39f6ab6b76871270f7458c24fb43207ac1c6d7d3dc75aa9fd4fbbea14fc04ae707f64a28d63eb2871ad31a0efbe042a777c30404d28ef4dec5dde67426920b709f0ac967b62f23425f14882454aac94411c525f5138383dd7f0319136784faef3b601072bb4f2c331a30c1bc2357ef3a7adfc6c068ef9b6221af4492bdcbb98f7b7f5af586540626d078ee5842a5a9209e80a8eaeb238325c85df0d06a8dda92402292a9828998c53d881e18631c2f1cc239b04306f7b9fbccbf866d75f0431f855744da60025e4ebd75fde2a7959dd1418e790a6de1f9cab4c7eafd7be4c22eac3b00e2b90416ab3caa4ca99e5db546a9cafe059a748c8184f584c78e4832fb5706a8bf03e5dd3fb85aab1392b347c029c77d8467d174757b95ba8935e4ac255c167299cf9c089219f36584797f0ba0376360acea6d3c6fcf0eb02d68ba12833a0222775e872cc2302ada982b856078dc63bddb54bbbb07f7fb1479ab03cd0da57dddbe9afbe9771ce43c8384cc9d0bb3b2ade8a925817a5f2cff95b5e5f9bfb1e01a1fad0fc6f261a4fd2ec3e58a1eb4843ef88d84d32d76f840057dade683ffdc33b55034f637dfc0a836e2d2abdadb95921c141adc603f0592957aa95fb08ca8d3d2b610bda58f10540356ae95beed77e91a84f044a23d790b1d0f6df185109b2d34557bcb9257d92c7ddc9d072644ea4acb3a0086b6c0eb301460c801552aee6f3dcbf54c3bd7618d4990cc13ba68bf951b1417ff27c04dadbfe09cb8da398781bb9b7619cbf3f63a39820767e41300ab002ed8ec1789e38de58d3c2a138195f315052f7973bec0fccb8509e2c6d7ebb261992924f8d84f0d97c6d9b29a7f77cf3462672cb24d84100fccdb7e9ec47d51ba24459bbe62db858c43cfb3a4f1fdeb74275bac9c5d693beb86089d7182b5e4ecaea1ee9cd0482913c0df6629197dfbe517a0c73231ff1ca4a036e1f85915d14748e402653af8d41fbbddb1d74aec184d6b404de6a100b1c5fd59e3ca8053793cb25182ef44d3a301df003e113e486d6f7e8b17252b2bd14dc2b89e9015b9860857e89193f058b9870ba73f4758e793cd54c2d5b44edef3a3308fd4c38eeb31662585f108fb6dcef339e3db9901bd8a051d7256bc9dbe2055458e6dfa58a281ef9d9530de83eee3b62e5426141f23e36414358418b1d68d2c433282d3ee7f9b8d8981b0fe6933987b13c80549dd70aac6577658dd437352905b0e99ec61fcfc3705d6eca858080d55e468f0daa5371721563ce7a5b1c8600f0b5f6feb0862aac5e153bb7bab0d9694a5a89bc773a52d3373cb642eb7aae054a92148328cd75940a0d2b8cf2d5678c7a87d44977636c46c33226b2f59777c58ec58d96599f8d4b162ecbaad1390a677abe71995aa9a63164c7943e494420276f7591ee2956d30eaf441b88e1d6b214eeba94c8e6c497ee64d4e107154988fac59a7821adceaf3a7d8212304c9e1747e4c8030617c52bde776e33b70295f712591df92c900eac80ef56224943598db3fb347037e9575e6e76b593798b7b06cc043258a6b0e59ef2d749afc44f3f1eaedf44487bdb24dbd6782c5cd986fe68d294727726df9729bcede569e191af133432d13d8d363e3a897ad2f92e0ae82419f5d5c5d13db504735fa324461993fbded4b2562f170fb77aff55ac77a4c97d92bae886f63b33616c65c98c44c6db542a72e5bcbb7aa5c0bbbb7dd84f6433d563593270c1914c7e0f8b1dee0ddfaeef3c0289ffddb63757d0c0d1f8908164f8c2c804968ac5b9f8711b82b06243cbd65c3565d8238609152588bbb83fa8d3a0fd185dda195a43d80b7ca4fb35b6a38b84b7a0b8edcf6f5386ee82607c4158ba761d8305ac0b4e59f6038f9c27053dc514035cfe0c1117e5a369a0c974fb006e69df851d729381b8e3edffced27f171376877827cd342922733e04a5f3b23f7952b7dd91816a8e3a3d2fd73deb9063ee9c71d22c0842b8377b93135032bd74b5688c19b0e2185f5d3363cedfe26cf92386ff373707c37cec46b7b8e5af638166c012fde0951710c88f131b65930bdd512ece3a3d24ce45dfc7e3cb56617cfc0559db5c8483db4968311929475dcfe50834aae93f1b1503be94725998492966aee0f1f987b063e1e4b6e6fc89b2405bce421c51c00ec5188d2faed1c49bdcf1d120ef49e800f1fb9d1f32b347aa140f5f1b84eda7527cc78a9c3ea357f0cc2e6919494537128c5dba69b4b92d31b64bc035358e1d6056b280bdbe98cee56c25653589954b2863e42594e88529ab4bad155c24734d04362a6f1cb7ce06e41c0711d911ff99d59ce463a0f65135f192ca865e1bbbe3a947956db2ab628f4080877548ba6afebd17ee3927d2b55c938c4a28b19cfd509a3a76ced3e9f7476b5d72c528b957dee8ec626ec38f667d35ef823045045b78bbb9f2e741bc6ff5ec9273b0e5a145611dbcf801cdac4cade8118f30372a19e9bac115d3e20313575146f4fffe0a6fba7dd019761e3796a0b1dc2544839348299fc01a5be40b92742d7bbeed882ba347fb412784f3f93a168a77301c4306ac0563a5b1b6589c0b03acdee973b94df5ae389efbd615b92cb0369fbc6a6ba24922ee4ae42d7b3bad4aaf96ae0e8839cb18e21a4f239b3f6efa11b142829a9a61b8d131780aae50a0c4d17eebaa2ebafe8da8470e35ecc0b204bd88a78cc87ac9ec6944ef6a522356ce764a4c41a3e12167eff7a08c7142488a947d469b78a5b8770fd4fc92a3c89b295894fab40736ba70e41cf259bbd3b8cac68271e84ca1e02512110fd6adc8355a2f7468d5e82296dce24af4301618fa5b854f811021b7ce4ea3d5f47394e0fd7f6b5cc6f7bd50dbfc011a1e4936b1e3f5c44a697afe3541767dfabd5f2ed71d46043342e5568073dd40b089aa6f0071267f0bcdedbbc268c8164120ee67be509b92867c8af79f8a2fe0ac0ee2d082e468d391e61e1da38d10c33b5d8f486f5275da9c4d9d5c652afa85cf2e9a1378c45f8b0a64f02ad9fadadefaa77fd16d040ad703826371e48362a9cccf983c62984bd8e1de072f1b61500970d2ab749018a3d1ecf1c1d60db2dc79c7ff591f0c508884c10a827632ff82bea1775e4a09102ef6bae37c250df0e1daf4f9917a28f1467405a957d87b84bea60e8c0e118ada9de6ce944afa4c3ab5c1f775afccfefd27ecf9fbc7f0a3053f2478b7a6db79a83adc0cc5c9ca8cb68b65910f1b464a3d910bb6857794bba1753677e8f2332df94e523610923456142963e06880ef94545235866488eab1f82f963397ca67dff55eb9f3bcb28e012385840e43ed9bb46c38ad21b7b4b4108945f0f67ff1e6e3da35aec790e4288c5d0be1ddb27cc7df0f0352ffe1d030a48ec9baa02b13a6a6ecf2db49f7ec1bce21f51b057e9b780b838f81081fc6691de9e6085b83273547654429c254975524c999ef0546e764a0404f428e565d642030a0265ef47a94cc56ff1e32cf92bb424be19c0dc5139db80422e0393d7d1687c6c11253ffa7e11bedc3c560b0d711d7082c06b54479cfc48e97258e5b5cc4c339a4f9b062c7d222cd7371393a9fa8110bf536c40428e924033db823a83e6e8303c6606223b2e3e1739625066a8cad4e2b859228d1a3c6ebf7c0d1c31f5d33147c263b73b6164824ef83c79e5b4caa808edb798a63ade2613a7bae3a03dd6a5c4fc65b7882d8ce9833d79573197505900c8a5f0f40b6a2c9d89e8018428f1a6a03db059e3de053e526133795e43850a482cf79434b9a1318cd6bfea836b3ae839638373bf3e65ac8a71515fe921766f34dca93163d53a919b038d50fe0713be2348cd54d958f57b6151bec902bb3c38e1ab56f55f808f3", 0x1000, 0x9}, {&(0x7f0000001880)="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", 0xfa, 0xfff}, {&(0x7f0000001980)="5158d5569a689eafdf4c072c016e3ec98dac382e5adf05a2053045e4452a06cc4b80f2cb110920836fbd8f88f93bbd04bc0d1717e3c0c5584a37aaeeda75b4519a17c61160739e4e2b22c984040e77f41c8930d75cc2c007", 0x21, 0x4}], 0x10, &(0x7f0000001ac0)=':\xc8em1selinuxuser)\x00') unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f0000000100)=0x8) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x2, 0x73c, 0x200, 0x8, 0x2448b4b4}, &(0x7f0000000240)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000380)=ANY=[@ANYRES32=r3, @ANYBLOB="ffff02000700008056481c0309411efd38ddc71ef2d125c34e53c07ac0fe91633613bf67da5a00001800b22034c008a7a243f8b8cecda420f2706d8c6ea1c521b661e5a4eaf2d3f822a1d7b85c2b899e9b1b1d411333bcde60aed85bcf17c9fc147bf389d0699d701a243326167446083f5e27cedff56b5dc9f7325afb2bbff12c31019e78697e8fda430fb0cecaf1421c18c5ad4d5b20d1788ee74ddbdfca9470fa7018a7a5287602c0e9f8fd61d556b766b6bfc634d6b40536e3e8916795a3b22907f700c7b4008ec3950000"], 0xc) 04:11:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404010002000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r1, r1, 0x0) recvfrom$unix(r2, &(0x7f0000000300)=""/170, 0xaa, 0x7fed9aa1ceb50b1a, &(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000240)) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:07 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000280)=""/45) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f00000001c0)='./file0/file0\x00') getdents(r1, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x10800, 0x0) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000200)) 04:11:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440865238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440965238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x400000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x10001, 0xc0000) 04:11:07 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x400200, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) r3 = dup3(r2, r0, 0x80000) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f00000001c0)=""/2) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 322.257018][T17535] tmpfs: Unknown parameter 'user' 04:11:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000100)=[0x4, 0x9]) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) ioctl$sock_netdev_private(r3, 0x89f6, &(0x7f0000000240)="a70f36df3bf65cecbbbf6a9f98159bc924934af26cbd5b80db9fc83dd17cfc5e6673624e922fb4148e39b2f048111567c51f4b0c2fe95653e5fba8ce7f5512f9f8bf860de19f031aeee03c987355d9beb658ff2483026709e9c70795506e5530dae6071ca8b71650acf87f0d86966d0abcb4461a7a0eacd81ad56cccda") ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000080)={0x3, 0x3}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x3) 04:11:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xffffffffffffff6e}}, 0x20008002) [ 322.415897][T17544] device nr0 entered promiscuous mode 04:11:07 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x1, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x6) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000007c0), 0x4) sendto$inet(r1, &(0x7f0000000a00), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f00000002c0)='./file0/file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xfffffffffffffe7b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001300)='maps\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 04:11:07 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') kexec_load(0x0, 0x4, &(0x7f0000000280)=[{&(0x7f00000001c0)="1fa33baecb0a2ec0b6a3b51968e7baea4efd0f974d55a07480fdf499ad9c3fa9c15f42d7770e2b777fd5a4e57cb0cc0b98c43102e50bb9f1ce2792750452", 0x3e, 0xa3f, 0x1ff}, {&(0x7f0000000200)="3af76122b9", 0x5, 0x8, 0x800}, {&(0x7f0000000240)="8d19ceeffbd4f323e22754ae852c03aa040a28", 0x13, 0x5, 0x400}, {&(0x7f00000006c0)="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", 0x1000, 0xff, 0x5}], 0xc7f1583df19f5913) 04:11:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440a65238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0xa68) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:07 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x2f8fadd2, 0x402000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0xd4, 0xfffffffffffffffe}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000240)={r3, 0x1}, 0x8) 04:11:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440b65238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 322.954609][T17544] device nr0 entered promiscuous mode 04:11:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:08 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0/file0\x00', 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') mount$bpf(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x10, &(0x7f00000002c0)={[{@mode={'mode', 0x3d, 0x7fff}}], [{@obj_type={'obj_type', 0x3d, 'tmpfs\x00'}}]}) lsetxattr(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)=@random={'btrfs.', '(system}\x00'}, &(0x7f0000000400)='em0/\x00', 0x5, 0x2) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='mime_typesecurity@\x00') 04:11:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x800, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) sendto$inet6(r1, 0x0, 0xfffffcb1, 0x81, &(0x7f0000000080)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x34594a214b54816c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) tee(r1, r1, 0x2, 0x2) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000240)={'nat\x00'}, &(0x7f0000000100)=0x78) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) 04:11:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440c65238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@ccm_128={{0x303}, "38f0f46853497720", "10a943ff97debc2861164b37832f24f6", "e80bf517", "aa92c3621c2eb38e"}, 0x28) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=""/238, 0xee) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000100)=[0x8, 0xffffffff]) r4 = dup3(r0, r1, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000180), &(0x7f0000000240)=0x4) setsockopt$TIPC_MCAST_REPLICAST(r3, 0x10f, 0x86) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:08 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x1, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x6) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000007c0), 0x4) sendto$inet(r1, &(0x7f0000000a00), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f00000002c0)='./file0/file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xfffffffffffffe7b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001300)='maps\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 04:11:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x400, @rand_addr, 0xfffffffffffffffd}, 0x1c) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x7fff, 0x10400) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000003c0)={'mangle\x00'}, &(0x7f0000000040)=0x54) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f0000000240)={{0x0, 0x53, 0x3, 0x2, 0x1fffffffe, 0x4}, 0x5, 0x5, 0x3, 0x1, 0x7, "8a5e1f0e9454bc59d1975b86f0d5cffecec3c4c00596bc162e13d9e4b1481a6032dd805542130486318365ebfcbfbc5e2a38180d0679a941f022562d7e378d21cea43265927626366731204ae48c676a35c27b443428efb7ce60b312732b16dd111efa9f100d81d31324ab08c871cb79f2632947e5cdfeddd9dc95ebacbc4a49"}) listen(r1, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000300)={0x0, @reserved}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xc07, 0x1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000180)={0x6000}) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0xffffffffffffffc1, &(0x7f00000001c0)={0x0}}, 0x84) 04:11:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440d65238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x200000200004) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="7a14fd5e1e4b56a7d380250996ce9f0911a9193e8eb4649c44aa80524b7187d44ab7af6bddf557c66015c1b5b36168aa", 0x30, 0x4080, &(0x7f0000000100)={0xa, 0x4e20, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffffff}, 0x1c) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) syz_open_pts(r2, 0x0) 04:11:08 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file1\x00', 0x4001, 0x10000) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r2 = openat(r1, &(0x7f00000001c0)='./file0\x00', 0x20000, 0xa) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f0000000240)='./file0/file0\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x800, 0x0) 04:11:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000440)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f00000002c0)=@gcm_128={{0x304}, "833be153622db4ca", "daa7f8b43b1eeb764822e67c1d4c1717", "0dbe0d37", "00ff3335078d42e1"}, 0xfffffffffffffdcb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x10000, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x5, 0x6, 0x1, 0x835, 0x9c, 0xc742, 0x3, 0x781c, 0x0}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000240)={r3, 0xfff}, &(0x7f0000000280)=0x8) r4 = dup3(r0, r1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000300), &(0x7f0000000340)=0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f00000005c0)={&(0x7f0000000040), 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0xe4, r5, 0xd00, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xff}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x236}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100000001}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xff4a}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}]}, 0xe4}, 0x1, 0x0, 0x0, 0x44}, 0x80) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) write$P9_RCREATE(r4, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x58, 0x2, 0x2}, 0x9}}, 0x18) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000600)={0x0, @reserved}) socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_capability(r1, &(0x7f0000000380)='security.capability\x00', &(0x7f00000003c0)=@v2={0x2000000, [{0x260, 0x5}, {0x2, 0x3ff}]}, 0x14, 0x1) 04:11:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440e65238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 323.499484][T17618] device nr0 entered promiscuous mode 04:11:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0x12, "f28c731ebf62"}, 0x8, 0x1) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r3, 0xd7d2e91999109fc7, 0x0, @in={0x2, 0x4e22, @empty}}}, 0x90) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:08 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0xb511a5ee5213eaa7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000280)={0xa, 0x4, 0xfa00, {r1}}, 0xc) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000340)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r3, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r3, &(0x7f0000000000)='./file1\x00', r3, &(0x7f0000000080)='./file0\x00') getdents(r3, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "440f65238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:08 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bond_slave_1\x00', @ifru_ivalue}) 04:11:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f0000000240)="a0d90c332ad46a48080d698412f9bf40f9d9321939ad95483bf13709d6c1296479a9e22f33a82460dcb4fbea9e73a359e3e10a557b1af2e03cc8533806f9d2402d8ed8d5c72e81e45c5a70cd19fb024242028ac0151f79925ca9a0b8609f84e2b14e529f1ce7b008072a65864ad251dc065d98ecba55e737c981340ec9eee30be588db74a08e550e4ce6c90acea83b39f2f377bb54b8457a51af84b1266c6e0434a2bd9946c0b723ae5f8682a5b40565983bcee4aab2a9f696d737b68c2cb4eea8db597f3055c40acb604916dd52e52c207a"}, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000340)='nv\x00', 0x3) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) fcntl$getown(r0, 0x9) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x800, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0xba21237cb7fe8a63, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000380)={0xa6496949f96702c6, 0x7f5}) getsockopt$sock_timeval(r2, 0x1, 0x57, &(0x7f0000000080), &(0x7f0000000100)=0x10) write$FUSE_IOCTL(r2, &(0x7f0000000180)={0x20, 0x0, 0x4, {0x2, 0x4, 0xb0fc, 0x3}}, 0x20) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000400)={{0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4, 'lblcr\x00', 0x2, 0x0, 0x41}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x3, 0x9, 0xffffffffffffffff, 0x7fd5}}, 0x44) ppoll(&(0x7f0000000240)=[{r1, 0x4040}, {r0, 0x2000}, {r2, 0x3028}, {r0, 0x360}], 0x4, &(0x7f0000000280)={0x0, 0x989680}, &(0x7f00000002c0)={0x9a3}, 0x8) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:09 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bond_slave_1\x00', @ifru_ivalue}) 04:11:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, 0x100, 0x3, 0x1, &(0x7f0000ff9000/0x3000)=nil, 0x4}) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r2, &(0x7f0000000240)='./file1\x00', r1, &(0x7f0000000280)='./file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x101000, 0x4) listen(r3, 0x9) getdents(r1, &(0x7f00000003c0)=""/177, 0xfffffffffffffe94) unlink(&(0x7f00000000c0)='./file0\x00') inotify_add_watch(r3, &(0x7f0000000100)='./file1\x00', 0x800) 04:11:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$session_to_parent(0x12) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0xffffffff80000000, 0x4) [ 324.095482][T17665] device nr0 entered promiscuous mode [ 324.398798][T17668] device nr0 entered promiscuous mode 04:11:09 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bond_slave_1\x00', @ifru_ivalue}) 04:11:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441165238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr, 0x8}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback, 0x401}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xfffffffffffffff7, 0x400000) sendmsg$rds(r2, &(0x7f0000000440)={&(0x7f0000000180)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000240)=""/143, 0x8f}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="580000000000000014010000080000000900000000800000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="0100000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0200000000000000060000000000000000000000080000000000000020000000000202000180000000001e59b72283d35ad9f145070000000000000c1a7b4800"], 0x58, 0x8000}, 0x0) r3 = dup3(r0, r1, 0x0) ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f00000003c0)={0xd6ae, 0xc32}) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f0000000080)={0x1, "c39b139371e33a385085b9bf2ef3bdf4e389491cf6b637e2e9a553b39fa29623", 0x2, 0x1}) sendto$llc(r3, &(0x7f0000000480)="1edbcedfaf520c088b2f0933c255f089a8707e36a697b9707fa3e86c711c5551f8f5069bde173c794d87a0bd772590fdbe6cfe8339ce0d747e021a72d08a854db2a5b3182ee9733194", 0x49, 0x804, &(0x7f0000000500)={0x1a, 0x76f841bf1ffe59ad, 0xff, 0x452, 0x1, 0x4, @remote}, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:09 executing program 2: mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x84) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r2 = openat(r1, &(0x7f0000000240)='./file1/file0\x00', 0x100, 0x1) sendto$rose(r2, &(0x7f00000003c0)="eaf23d25d81607eb46d620d90f4c3dba63a071284635d5a5e449cc2e3a56f63945f57d5291580a803fb4e9d8a7b1f8528187132300bac3547ac3afc05933dbbb65dff5c15fbb971a956df44ab45787b5803b4f96ea26143580c97f2c07f5760c370158f769b4a502b2c2f3fa28c41af2ab4a0f1734647282ddceac62015fef46bdc407e9b686b2e9b36668c9e9b81de031598b21c0c1fd6e082a5471c58ff953f4f447ab963daffd4f53bf59ae06f05896bc798cb73848f1d9f8fe768487ee02d8b7980a8e5acf22df79c2af09d6cc3c1af8d49760fc7e", 0xd7, 0x4040051, &(0x7f00000002c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x1b, 0x4, 0x1, "0fc1c3640010a6e43b59d0b352c58e74", "0207df2f5456"}, 0x1b, 0x2) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r0, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000080)={0x0, @aes256, 0x2, "f09a6d4bd44af186"}) 04:11:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt(r1, 0x0, 0x1, &(0x7f0000000240)=""/93, &(0x7f0000000080)=0x5d) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0xb55f3d455ebf8911, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x33c, &(0x7f00000001c0)={0x0}}, 0x20008000) futimesat(r3, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x0, 0x2710}, {0x77359400}}) [ 324.515388][T17708] net_ratelimit: 30 callbacks suppressed [ 324.515397][T17708] bond_slave_1: mtu less than device minimum 04:11:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441265238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:09 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r1 = open(&(0x7f00000001c0)='./file0/file0\x00', 0x2, 0x2) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:09 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x100, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x144) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000000)=0xff, 0x4) sendto(r3, &(0x7f0000cfefee)="120000001200e7ff00ffe90009144aff0ae9", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000002dc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 04:11:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000100)) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket(0x15, 0x4, 0xbf2a00000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r4 = getpid() capget(&(0x7f0000000600)={0x20071026, r4}, &(0x7f0000000640)={0x2, 0x7, 0x5, 0x3, 0x7, 0x5}) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f00000005c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="7c030000", @ANYRES16=r3, @ANYBLOB="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"], 0x37c}, 0x1, 0x0, 0x0, 0x4000001}, 0x4000) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r5 = dup3(r0, r1, 0x0) ioctl$EVIOCGBITSND(r5, 0x80404532, &(0x7f0000000240)=""/1) sendmsg$SEG6_CMD_GET_TUNSRC(r5, &(0x7f0000000200)={0x0, 0xfffffffffffffeea, &(0x7f0000000080)={0x0}}, 0x20008000) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r6, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7fffffff}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7fffffff}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4004000) [ 324.677070][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 324.741821][T17716] device nr0 entered promiscuous mode 04:11:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441365238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r1 = dup3(0xffffffffffffffff, r0, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') r2 = dup(r1) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) 04:11:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000080)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 324.961641][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) bind$isdn(r2, &(0x7f0000000080)={0x22, 0x81, 0x7, 0x2, 0x9}, 0x6) 04:11:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441465238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') r1 = accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000280)={@empty, 0x0}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={@rand_addr="5a2483cfc318811f85d4a3375a289141", @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, 0x80000001, 0x983c, 0x9, 0x400, 0xffffffffffffffc0, 0x7c26610d5872293, r2}) socket$xdp(0x2c, 0x3, 0x0) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) accept4(r1, &(0x7f0000000240)=@ethernet={0x0, @dev}, &(0x7f0000000080)=0x80, 0x800) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x3, 0x200000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f00000002c0)) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x18032, 0xffffffffffffffff, 0x1) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000240)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x3a1f5eb45b133a82, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x6c, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000280)={r3, &(0x7f0000000140)=""/190}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) r5 = dup2(r0, r2) dup3(r5, r1, 0x0) io_setup(0x1f, &(0x7f0000000040)=0x0) io_pgetevents(r6, 0x3, 0x2, &(0x7f0000000000)=[{}, {}], 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1}, 0x8}) personality(0x5000004) io_pgetevents(r6, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0) 04:11:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441565238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 325.248299][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 325.275152][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x9, 0x34001) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000240)=0x7) ioctl$TUNSETLINK(r2, 0x400454cd, 0xf362de4cdd7c72d0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) socket$rxrpc(0x21, 0x2, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r3, 0x6430) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f0000000500)={0x6, 0x10001, 0xfff, 0xc3, &(0x7f0000000340)=""/195, 0x3b, &(0x7f00000000c0)=""/59, 0xb1, &(0x7f0000000440)=""/177}) bind$vsock_stream(r3, &(0x7f0000000100)={0x28, 0x0, 0x2711}, 0x10) r4 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000540)={0x0, 0xffffffffffffffaf, &(0x7f00000001c0)={0x0}}, 0x20008000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000280)=[@in6={0xa, 0x4e24, 0x100000000, @ipv4={[], [], @multicast2}, 0xc2}, @in6={0xa, 0x4e21, 0x4, @empty, 0x1}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e23, 0x0, @loopback, 0x9}, @in6={0xa, 0x4e23, 0x2ddf, @mcast1, 0x80}, @in6={0xa, 0x4e21, 0xffff, @ipv4={[], [], @remote}, 0x81}], 0x9c) 04:11:10 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x7fffffff, 0x7, &(0x7f0000001840)=[{&(0x7f00000006c0)="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", 0x1000, 0x8001}, {&(0x7f00000003c0)="829bfdb26c747cc558725a5444444b5bdc5191931a823512bca8275a8d7087bf1b897a261218973738b627534c703e6dcaa245ff0b6d2149b0db23e7d5ad44c2c9a17296bd9575dfc62e9b69da20898d8c6c4376112fb1d1a3e89c9d3473688ff87a4482d8a9d8b8dc2c83db5483a83a73372aac06ecc362f870a53d2dc9bf394d72f60e354b5eec591094abbca41d38100ad9311677f80b27689bb785d15402da3fa2b28b1604eca36774f1950ab1a7a127a21d8eca852282d14753287881b952f76a64a25a", 0xc6, 0xfffffffffffff6e8}, {&(0x7f00000004c0)="a669a5bf69ccf7af5e10acd5f3c869ecef362efce165661716c49483f4b2f962a72bcdedb4ceefbc64c262ddb20ec16b0ba68bc84fcefe629d5c5ce9b6710aa13727fbf197e42f5b4eece47d2165ce65e3ac9ac27ae719d6de3967e0e7485d000a895764f91c2bf8e3afce49d9c403b98d1b2a97229ae8e9988752e4c3d32860f36d78b893aa7c68e21460640e294f849189dced7f4eed821ce7f72326cbc2222a1f11ac5ae2037221b34efa8041bfda24270783954b7551aa49fd1b6efec32a8d94d37451094349f217a377faf5afe3e64e129f86fc58f9", 0xd8, 0x9}, {&(0x7f00000016c0)="23a9769c2b4999cd1969874b5f30b12696b84d5a409c08f2a662d7fe4e954fa962b122c3a339d515a2acc11f11c31080386eaed9886761cb71cf250e6a2c4fff3216da89c51a69fe3971b79d6b2b37d5ef72d23f67df66f707d32839f468295418b60144964f0f11aa2d1169a58dac81b4d20fb63ef754f16445c054ced6d376a77bf32cf977fd45f530ed75ff92b1e6d954c94446098e8039023458e8da109701789ee6b0df0f7c433d8186e55a8a56c45da6daec355902eec23658a5b06906a11624a35f23910a95aa767467aae5e6", 0xd0, 0xc945}, {&(0x7f0000000200)="00be39ed0c6120243274a4dffb5075921eaa5f30c8659c235269e931d072e55cf2c30087821c265d604250589f40961f9ed23d5c1a4b672c4f46030276fa9c44dccf086a245dc165534603fe00634ca005c80ece9c1b59c0570f02252f2637587ec42ffc208a129fc550807288330c87abe0be2f29", 0x75, 0x3}, {&(0x7f0000000280)="0c65ad634ca7", 0x6}, {&(0x7f00000017c0)="0aec01e9c94f2650b176217b4b821ba49ed6e3593349b8c3ccbb6c84281d77cf200aee034f74f195489640c065dea9ef0e5edd145bb9c57169b18b138d0422b7f915f84be5fb65110bf69c7ca3a80366357fde711a9f9a6a3d57642b8deb5998", 0x60, 0x1a3e6a35}], 0x0, &(0x7f0000001900)={[{@check_relaxed='check=relaxed'}, {@map_normal='map=normal'}, {@overriderock='overriderockperm'}, {@nocompress='nocompress'}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan1.GPL'}}, {@smackfshat={'smackfshat', 0x3d, 'em0'}}]}) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f00000002c0)='./file1\x00', 0x20004, 0x84) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 325.378589][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:10 executing program 1: r0 = fsopen(&(0x7f0000000000)='bfs\x00', 0x1) r1 = accept4(r0, &(0x7f0000000180)=@generic, &(0x7f0000000080)=0x80, 0x80800) accept4$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe172, 0x1, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000500), 0x8) r3 = msgget$private(0x0, 0x20) msgctl$IPC_INFO(r3, 0x3, &(0x7f0000000380)=""/43) r4 = semget(0x0, 0x2, 0x540) semctl$GETALL(r4, 0x0, 0xd, &(0x7f0000000240)=""/53) recvmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000440)=""/113, 0x71}], 0x1}, 0x2000) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x54, &(0x7f0000000000), 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000002c0)={0x8, 0x2, 0x5, 0x0, 0x0, [{r1, 0x0, 0x10001}, {r2, 0x0, 0x332a}, {r2, 0x0, 0x401}, {r0, 0x0, 0x4f26}, {r0, 0x0, 0x3}]}) 04:11:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441665238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 325.421376][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 325.424179][T17784] device nr0 entered promiscuous mode 04:11:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000080)=0x7, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 325.560813][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 325.607054][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 325.888492][T17790] device nr0 entered promiscuous mode 04:11:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="8903a1784901006001a0ffffffffc4578ad7026b00576558cd020093dd86dd00008848ba0800451fc40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551516248e07573977c5eff11680107fdf79d1af8f4e56309ac9733d41cc0ff11999dec3740f0853200000000000115a21971dd1feb6c2bf65905e863b7d342ed5293033159b87069ccc2c25b80a1de96ea6221dc9adca6c19c1a979d81f287627b3ac0fe5d5d644dc299c6e5b1bbae122dcae5c4d3470b7ee0b23c466a410c5d885662de4bcfd4d73c0da00789d086dc805524b1df92b3c21d6605f191bed951f20a1560f7adf0c24ee5cb2e8dc126d94c3c5c26c01b572745bf81fb8a9607b6186fc72259d4504dc75ab7c6b5112"], 0x7ffff) 04:11:11 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$9p_tcp(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030303030302c76657273696f6e3d3970323030302c0078b8cc8743bb8684526f520e45c58e5dc9fb88c7607efbfba705000000"]) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x840) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)=0x1) prctl$PR_GET_THP_DISABLE(0x2a) accept4$unix(r0, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x80800) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f00000001c0)=@bcast) 04:11:11 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x10001, 0x6f890e5049d2817c) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000200)) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441765238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 326.012745][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0x11, &(0x7f0000000080)=0x3, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000080)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_128={{0x304}, "1979feda8f8de8f7", "196c7b763e4fef2c15e2f31416096125", "c83c1ad1", "6285dc3eb260eca4"}, 0x28) r2 = dup3(r0, r1, 0x80000) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') close(r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) tgkill(r1, 0x0, 0x19) 04:11:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) r1 = getpgrp(0x0) tkill(r1, 0x19) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x410900, 0x0) connect$unix(r2, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e20}, 0x6e) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441865238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000080)=0x400, 0x4) 04:11:11 executing program 1: r0 = timerfd_create(0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000300)="79841e6c9b2f5dd5a743560b69e0c91267f91de5ed3888a9bf2f636777363796326849288ba698987f579cc91c1536c13a32db942b0f7e90819c5d6cfb59b7ceeef8fb149516c2c0f59551a5834517f0ba5ebd29c81075492e6de675368c004dbff2783619f18801116cb4e4009c8e1fe6bcc74b98845cb36cdd297027afbbf4f109811f7352f35fa2a0f90edbdc138a10e5d73513c208aef4d163d28c418a4bf7c3aa760d7b124c9b42aa337fa964a22bfa5ca8a619ad04d2b551239d876c8a0dd667d2abfabebc10d7f47e0bb508dcd222e9436c61e876fa6539e2bd754a1d6395b71bd68b5cc6ed0132b5b683cd0850d592dc") readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/138, 0x8a}], 0x1) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x10010, r0, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x101000, 0x0) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000400)={'batadv0\x00', 0x7, 0x2}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.events\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x400000, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x101a02, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) 04:11:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441965238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 326.308602][T17837] device nr0 entered promiscuous mode 04:11:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) 04:11:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x200000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x778, 0x250, 0x0, 0x0, 0x0, 0x250, 0x6a8, 0x6a8, 0x6a8, 0x6a8, 0x6a8, 0x5, &(0x7f0000000200), {[{{@ipv6={@local, @mcast1, [0x0, 0xff, 0xffffff00, 0xff000000], [0xff000000, 0xffffff00, 0xffffffff, 0xff000000], 'irlan0\x00', 'hwsim0\x00', {0xc1edc70d3c7495f0}, {}, 0x67, 0x8, 0x0, 0x10}, 0x0, 0x208, 0x250, 0x0, {}, [@common=@inet=@recent1={0x108, 'recent\x00', 0x0, {0x1, 0xc7, 0x2, 0x0, 'syz0\x00', 0x0, [0xffffffff, 0x0, 0x0, 0xff]}}, @common=@unspec=@time={0x38, 'time\x00', 0x0, {0x7a, 0x30, 0x146fb, 0x9a79, 0x1, 0x4, 0x1}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x2, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv4=@remote, @gre_key=0x5, @port=0x4e20}}}, {{@ipv6={@empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0xffffffff, 0xffffff00, 0xa53e0c4ce97cfd3e, 0xff000000], [0xffffffff, 0xff000000, 0xff000000, 0xe498c8a4dd3cba15], 'gre0\x00', 'erspan0\x00', {}, {0xff}, 0x2c, 0x4085efcc, 0x4, 0x1}, 0x0, 0x138, 0x178, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x2, 0x7}}, @common=@unspec=@nfacct={0x48, 'nfacct\x00', 0x0, {'syz1\x00', 0xffffffffe45914a6}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x1f, 0x8, 0x9e, 0xffff, 0x2f8cea44, 0x9, 0x1ff, 0x6]}}}, {{@uncond, 0x0, 0x188, 0x1d0, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x5e, 0x0, 0xe8, 0x0, 0x7, @dev={0xfe, 0x80, [], 0x27}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0x0, 0xffffff00, 0xff000000, 0xffffff00], [0xff, 0xe886099f67a084c2, 0x0, 0xffffff00], [0xff, 0x0, 0xffffffff, 0xe005de03a558692f], 0x2600, 0x3784}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x6, 0x6, 0x3, 0x1, 0x6, 0x4, 0x800}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x4, @ipv6=@loopback, @ipv6=@mcast2, @gre_key=0x6, @port=0x4e24}}}, {{@ipv6={@local, @rand_addr="54614533d8aee1ff264841a7fa27d891", [0x0, 0xff, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'syzkaller0\x00', 'vxcan1\x00', {}, {0xff}, 0x3a, 0x401, 0x4}, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x8, @ipv4=@rand_addr=0x3, @ipv4=@multicast1, @gre_key, @gre_key=0x9}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7d8) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f00000003c0)={0x8, [0x9, 0x412a, 0x10000, 0x0, 0x4, 0xffffffff7fffffff, 0x401, 0x66695419, 0x2020000, 0x1000, 0x3, 0xff, 0x80, 0x3, 0xffffffff7fffffff, 0x400, 0x0, 0x5, 0x4, 0x9, 0x1, 0x3ff, 0x8, 0x0, 0x4, 0x0, 0x6, 0x80, 0x7, 0x8, 0xd318, 0x5, 0x9, 0x8001, 0x800, 0x3, 0x0, 0x1ff, 0x10000, 0x6, 0x400, 0x5, 0x7, 0x100000000, 0xab8, 0x8000, 0xaac8, 0xffffffff], 0x97af8e848ee19dcd}) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000280)) socket$inet6(0xa, 0x80000, 0x400) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'team_slave_1\x00', {0x2, 0x4e21, @local}}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:11 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x80000) fcntl$lock(r2, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3}) fcntl$lock(r1, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x200}) dup3(r0, r1, 0x0) 04:11:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441a65238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:11 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x6, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r1, r2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441b65238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:11 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x9, 0x81c1) accept$unix(r0, 0x0, &(0x7f0000000240)) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00') getdents(r1, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000080)={0x1, 0x7}, 0x8) listen(r1, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x74000, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000180)={0x3062, 0x416e}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @remote}}, 0xfffffffffffffffc}, &(0x7f0000000300)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000340)={r3, 0x54, "50ab38f469353c31c92140684d2ea0bb048f50e5a6835424df8514affb9471e7090732bf75a222756de2bac245a366a8177c051f21d334a2e09daa8d15a02b6bcc51d17f61e55720f1e7e38f6f1007e6f6ef9e5f"}, &(0x7f00000003c0)=0x5c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r4 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0xfff, 0x526784172ff0dae4) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000540)='/dev/full\x00', &(0x7f0000000580)='./file0\x00', 0xffffffffffffffff) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x109e00, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000480)=0x9, 0x4) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000200)={0x1, 0x101, 0x1000, 0x62, &(0x7f0000000000)="5fe779f146c44bd3382918b0605ea34df61783ae66975d1da3acebb493791cb68f487ee2137328cea0b7c1736781de7995dc1240b0c376294871ddedc99ddbb0c02316ec32840baa1f36cbac3d1bcceb45bf560e7c755e02279b4e71199b078cc348", 0x8c, 0x0, &(0x7f0000000140)="a84e853c9890da6724bd48e66e883babe9d097bb553767567294aee031080c24036a6b76fc34f5dfb39559efce8f59c093111d6d465904f7894679d719411fa618089c06ad1da31d805649773b54ce39a5db2747d23eb151a802a13650714288e4383dd39bb84604655470c2422ce0856dcadbd31a85b302b26ae87f26cdb77348d8f7ba6d3e9f96b963db85"}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000002c0)="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") write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x7530}, 0x1, 0x400000000000064, 0x2}], 0xff49) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x6e507ff776816bd1, &(0x7f0000000080), &(0x7f0000000280)=0x4) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x8) write$FUSE_DIRENT(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="10000000feffffff0809000000000000"], 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) fcntl$notify(r2, 0x402, 0x1) read$rfkill(r3, &(0x7f00000003c0), 0x8) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f00000004c0)={0xfffffffffffff704, 0x7}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 04:11:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup2(r0, r1) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 326.933550][T17900] device nr0 entered promiscuous mode [ 327.258592][T17903] device nr0 entered promiscuous mode 04:11:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441c65238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x4}) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000100)=0xdd3) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) listen(r0, 0x80000001) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:12 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) open(&(0x7f00000001c0)='./file1\x00', 0x880, 0x5) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:12 executing program 1: r0 = socket$nl_generic(0xa, 0x3, 0x10) getrusage(0x1, &(0x7f0000000000)) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x22, &(0x7f0000000180)={0x0, 0x20000020002}, 0x10) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r0, 0x800b}, {r0, 0x2000}, {r0, 0x1000}, {r0, 0x2}, {r0, 0x10}], 0x5, &(0x7f0000000140)={r1, r2+30000000}, &(0x7f00000001c0)={0x4}, 0x8) 04:11:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441d65238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1, 0x1}, 0x0, 0x0, &(0x7f0000000180)={0x1, 0x8, 0xfffffffffffffffe}, &(0x7f0000000240)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x80000001}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r2, 0x4) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:12 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x404000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000008c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000900)={@local, r2}, 0x14) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x4400, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) ptrace$getregset(0x4204, r4, 0x2, &(0x7f00000004c0)={&(0x7f0000000400)=""/179, 0xb3}) ioctl$VFIO_CHECK_EXTENSION(r3, 0x3b65, 0xe7b88cdbc972c774) pivot_root(&(0x7f0000000500)='./file2\x00', &(0x7f0000000540)='./file0\x00') syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x2, 0x80000) 04:11:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xff14, 0x40) ioctl$VIDIOC_G_CTRL(r2, 0xc008561b, &(0x7f0000000100)={0x1, 0x7f}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x2e50836978fa7f32, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x20008002) 04:11:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "441e65238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 327.595768][T17950] device nr0 entered promiscuous mode 04:11:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket(0x9, 0x6, 0x5) getsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000240)=""/69, &(0x7f0000000080)=0x45) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004016, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="13d30805000000fffffd"]}) prctl$PR_GET_THP_DISABLE(0x2a) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238925350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000000)={0x7fff, 0x2}) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000240)=&(0x7f00000001c0)) mknod(&(0x7f0000000080)='./file1\x00', 0x40, 0x2) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000440)={0x4, 0x43, 0x7, 0x0, 0x1, 0x81, 0x27}) unlink(&(0x7f00000004c0)='\x00') r3 = fcntl$dupfd(r1, 0x406, r1) r4 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000008c0)={0x0, @in6={{0xa, 0x4e23, 0x81, @mcast2, 0xfffffffffffffffa}}, 0x9, 0x3, 0x4, 0x2, 0x4}, &(0x7f00000005c0)=0x98) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000980)={r5, 0x401}, 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x1, 0x0) stat(&(0x7f0000000580)='./file0/file1\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='bpf\x00', 0x8000, &(0x7f0000000740)={[{@mode={'mode', 0x3d, 0x80}}, {@mode={'mode', 0x3d, 0xfffffffffffffffc}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x7eab}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x5}}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@uid_gt={'uid>', r6}}, {@permit_directio='permit_directio'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@obj_user={'obj_user', 0x3d, '\\selfwlan1'}}]}) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f00000002c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8010}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x14, r7, 0x1, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4001) 04:11:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x3e, 0x40000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="240027bd7000fbdbdf2501000000000000000b0000000014001462726f616463617374c90e00006b0000"], 0x30}, 0x1, 0x0, 0x0, 0x20004001}, 0x40000) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r4 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000100)={0x80, "36f0254a08c93771648719f1b80a0b1267691e347b057440f101453a1ad8a825", 0x2, 0x1}) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 328.038361][T17994] bpf: Bad value for 'mode' [ 328.091834][T17999] device nr0 entered promiscuous mode [ 328.112017][T18006] bpf: Bad value for 'mode' 04:11:13 executing program 1: r0 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0x3, 0x2) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x7, 0x73) bind(r1, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000480)={@remote, 0x57, r3}) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f00000001c0)={'nat\x00'}, &(0x7f0000000240)=0x78) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x12000) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000380)={0xacb, 0x1d, 0x7c2000, 0x0, 0x4657, 0x7a58, 0x4, 0x2, 0x8, 0x7, 0x3cf5, 0x1f, 0x0, 0x8001, 0x7ff, 0x1000, 0x40, 0x4, 0xfffffffffffffeff}) getsockopt$inet_buf(r4, 0x0, 0x23, &(0x7f0000000040)=""/212, &(0x7f0000000140)=0xd4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0, @ANYBLOB="ff0ff81ee1ba239f90d81ddac51c0b6b050256c2d6c30c51690fb55ab0303072c3c547971596fea694c18603a566c6a85bc3a94531c88675796b6f440cf0251d9843e043df8cb5c18967ec7c5ad36403a6f4c4c523aa0bdd51d284e5"], &(0x7f00000002c0)=0x8) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f0000000440)=0x6, 0x4) write$UHID_INPUT2(r0, &(0x7f0000000700)={0xc, 0x8b, "da28fe28b69dbe863b40e6d9c38359d5eb9c8430c699be8a093767a8a6485632df47167486d0b8b2bffdd287d40e5e7e97af5e82062998463971b153ff9f85e4c528c02840bd2672005fb5de8880f67cef327af9114a816a30730bf028ab2c9f6f49655302d89119eb04f6dab443cb39c9931abda293f4418210e19dab05003c52895921eec73f903b129e"}, 0x91) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000600)=@assoc_id=0x0, &(0x7f0000000640)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000680)={r6, 0x1e, "1d089921a7e88091fafdab7489ae06c7095163493347382e00eb271dab4f"}, &(0x7f00000006c0)=0x26) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r4, &(0x7f0000000280)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000300)={r5, 0x4, 0x80}, 0x8) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r4, 0xc0505405, &(0x7f00000004c0)={{0x2, 0x1, 0x80000000, 0x2, 0x6}, 0xffffffffffffffff, 0x80000000d09, 0x8}) 04:11:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "4420652389293510de91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r0, r1, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="04ec8b68a1aad55411026b"], 0xb, 0x2) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000080)) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:13 executing program 0: lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@ipv4, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x8001, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="58ba991c71955062e668c0fe4e5bb0ee64ee6dd205adecd68aeeaa91b1cc18449347d28487c19c94716dd0942cfdcffd92792190becc7ef165ce763e9793ac32", 0x40, 0x22ae}, {&(0x7f00000003c0)="a09440b366c9f81566a5fe010ab587b4254a61c3ca07032bcbad81523a", 0x1d, 0x5}], 0x200084, &(0x7f0000000800)=ANY=[@ANYBLOB='nodecompose,force,decompose,uid=', @ANYRESHEX=r0, @ANYBLOB="2c6465636f6d706f8638daada2d5cf33650400000000000000216172000065722c6325a1ed1a26dd6fcbc414490000000000000000003f1e5b6f7ea19b543256a74b479d18ee8457d24aa66112df89aeac27e4e567f4e9f21ea7a9c0f7cc064cbfe2985065f3ad7e4f147e355202a426cd13f2974b34e0391335f68c", @ANYRESHEX=r1, @ANYBLOB=',uid=', @ANYRESHEX=r2, @ANYBLOB=',part=0x0000000000008001,dont_hash,defcontext=sysadm_u,mask=MAY_APPEND,fowner=', @ANYRESDEC=r3, @ANYBLOB=',\x00']) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x610840, 0x0) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r6, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="080029bd5000fedbdf2504000000080006000400000014000100fe880000000000000000000000000101"], 0x30}}, 0x4004000) listen(r5, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r8 = dup3(r4, r5, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91901051fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) [ 328.333478][T18018] hfsplus: invalid uid specified [ 328.340924][T17999] device nr0 entered promiscuous mode [ 328.362746][T18019] QAT: Invalid ioctl 04:11:13 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000240)=""/81, 0x51}, {&(0x7f00000002c0)=""/62, 0x3e}, {&(0x7f00000003c0)=""/98, 0x62}, {&(0x7f0000000440)=""/254, 0xfe}, {&(0x7f0000000340)=""/36, 0x24}, {&(0x7f0000000540)=""/51, 0x33}, {&(0x7f00000006c0)=""/233, 0xe9}], 0x7, &(0x7f00000007c0)=""/206, 0xce}, 0x1}, {{&(0x7f00000008c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000940)=""/250, 0xfa}, {&(0x7f0000000a40)=""/5, 0x5}, {&(0x7f0000000a80)=""/191, 0xbf}, {&(0x7f0000000b40)=""/144, 0x90}, {&(0x7f0000000c00)=""/238, 0xee}, {&(0x7f0000000d00)=""/115, 0x73}, {&(0x7f0000000d80)=""/71, 0x47}, {&(0x7f0000000e00)=""/147, 0x93}], 0x8, &(0x7f0000000f40)=""/100, 0x64}, 0x3}, {{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000fc0)=""/145, 0x91}, {&(0x7f0000001080)=""/193, 0xc1}], 0x2, &(0x7f00000011c0)=""/244, 0xf4}, 0xc3}], 0x3, 0x2000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000013c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000001500)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0x98, r2, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x75}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4ee48fdf}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) write$eventfd(r3, &(0x7f0000000200)=0x4, 0x8) [ 328.390269][T18018] hfsplus: unable to parse mount options [ 328.394152][T18034] QAT: Invalid ioctl [ 328.486196][T18039] hfsplus: unable to parse mount options 04:11:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$BLKRRPART(r2, 0x125f, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x400) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000180)={r2, @in={{0x2, 0x4e23, @rand_addr=0x1000}}, [0x9, 0x6, 0x5, 0x62, 0x8, 0x7f, 0x27, 0xffffffffffffffff, 0x0, 0x7ff, 0x8, 0x7cc, 0x7, 0x14d, 0x2]}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="e58b61dcf01e4223bbad3b0200030006003300a534"], 0xe) epoll_create1(0x0) r3 = syz_open_pts(r0, 0x0) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) dup2(r3, r0) 04:11:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91901251fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 04:11:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0xc0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) r2 = dup3(r1, r1, 0xe11db12d35883528) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) ioctl$SG_SET_COMMAND_Q(r2, 0x2271, &(0x7f0000000100)=0x1) 04:11:13 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) fspick(r0, &(0x7f0000000280)='./file1\x00', 0x1) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x2b, 0x1, 0x4, "097910dc0699cb05a5b56341b68325d7", "67dee92412af12525a8b8cc8a7c206d5ccf68b82b978"}, 0x2b, 0x2) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda702", "7ee51430da3f51b3"}, 0x28) 04:11:14 executing program 1: lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@ipv4, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x8001, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="58ba991c71955062e668c0fe4e5bb0ee64ee6dd205adecd68aeeaa91b1cc18449347d28487c19c94716dd0942cfdcffd92792190becc7ef165ce763e9793ac32", 0x40, 0x22ae}, {&(0x7f00000003c0)="a09440b366c9f81566a5fe010ab587b4254a61c3ca07032bcbad81523a", 0x1d, 0x5}], 0x200084, &(0x7f0000000800)=ANY=[@ANYBLOB='nodecompose,force,decompose,uid=', @ANYRESHEX=r0, @ANYBLOB="2c6465636f6d706f8638daada2d5cf33650400000000000000216172000065722c6325a1ed1a26dd6fcbc414490000000000000000003f1e5b6f7ea19b543256a74b479d18ee8457d24aa66112df89aeac27e4e567f4e9f21ea7a9c0f7cc064cbfe2985065f3ad7e4f147e355202a426cd13f2974b34e0391335f68c", @ANYRESHEX=r1, @ANYBLOB=',uid=', @ANYRESHEX=r2, @ANYBLOB=',part=0x0000000000008001,dont_hash,defcontext=sysadm_u,mask=MAY_APPEND,fowner=', @ANYRESDEC=r3, @ANYBLOB=',\x00']) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x610840, 0x0) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r6, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="080029bd5000fedbdf2504000000080006000400000014000100fe880000000000000000000000000101"], 0x30}}, 0x4004000) listen(r5, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r8 = dup3(r4, r5, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = accept4$rose(0xffffffffffffffff, &(0x7f0000000240)=@short={0xb, @dev, @default, 0x1, @rose}, &(0x7f0000000280)=0x1c, 0x80000) getsockopt$rose(r2, 0x104, 0x6, &(0x7f00000002c0), &(0x7f0000000300)=0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) 04:11:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x900, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000001380)={@broadcast, @empty, 0x0}, &(0x7f00000013c0)=0xc) sendmsg$xdp(r2, &(0x7f0000002740)={&(0x7f0000001400)={0x2c, 0x1, r3, 0x38}, 0x10, &(0x7f00000026c0)=[{&(0x7f0000001440)="3368b508fc8f312a0ea6375618357d32407698c2c7e5fa4a7b134cad039c49e67088389ecf4f3da32b26ce53c6a355561d60148231d26eccb878e7f073fc00de8bceb19fbcacc71e1177f366189f4621b036df7d92d05aaf5b02743d5162166bfa604b7af3824b71d20349528929b13a40d2671d8ebc7158da0e0aece4d8972d4e114aa66aabe0662cff5440b4330cbfc8a3d5b9532a74a9748bc048b123bf76f9e3e43e365d7e9ee551e779ff9b80fe73fa9191f209c30c1a5ed669e6c785152e65fac8a4047ef678d335103e58359da18a84e063e7c8742b", 0xd9}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000002540)="86ba866cf89c35a9e8f7558487bb8e81b7e6df25bdf89037d17d04dbd63cccfa88e89a6529", 0x25}, {&(0x7f0000002580)="b3a06db5a4ce54053d1ced28270a397a4acd59b815e5737e6f948db1a5b8aa7885d44c43eb380947f2aa6a2a59ecab5cf270ad3b2808dfe517c7a42cef1cb4a08bdddda7de05d2267a733aab5891e0a19cb3e50bff665c14b93bdeacca327d10990f196830a2821a4ab41ebab98113a0b8efc1c514cc17f999818df462eb8bccb5c855c9c1a4ab978b846f5588ab5c4223a6b1eeb60a9a30ec4c46d14a5125778aeacdc22362e86ca3e66a4b92a5282990dbe7da4ec47d299c08816bf5c9d008abd504b9ad", 0xc5}, {&(0x7f0000002680)="86c9ab6b6c90665d8232e809625b0afa3397a2c084c0da3bd6c117ea8352be0110cb53da16bcb8aa725e9056ea8b00e28632fd89a818", 0x36}], 0x5, 0x0, 0x0, 0x4008000}, 0x4000000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r4 = dup(r1) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000100)={0x14, 0x1000, &(0x7f0000000240)="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"}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r5 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 328.939513][T18072] device nr0 entered promiscuous mode 04:11:14 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') renameat(r0, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') [ 329.022973][T18093] hfsplus: invalid uid specified 04:11:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda703", "7ee51430da3f51b3"}, 0x28) [ 329.045726][T18093] hfsplus: unable to parse mount options [ 329.387117][T18078] device nr0 entered promiscuous mode 04:11:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="8903a1784901000e01a0ffffffffc4578ad7026b00576558cd020093dd86dd00008848ba0800451fc40176ec09b4280452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adfd178514a941af96fe540551516248e07573977c5eff11680107fdf79d1af8f4e56309ac9733d41cc0ff11999dec3740f0853200000000000115a21971dd1feb6c2bf65905e863b7d342ed5293033159b87069ccc2c25b80a1de96ea6221dc9adca6c19c1a979d81f287627b3ac0fe5d5d644dc299c6e5b1bbae122dcae5c4d3470b7ee0b23c466a410c5d885662de4bcfd4d73c0da00789d086dc805524b1df92b3c21d6605f191bed951f20a1560f7adf0c24ee5cb2e8dc126d94c3c5c26c01b572745bf81fb8a9607b6186fc72259d4504dc75ab7c6b5112"], 0x7ffff) 04:11:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000240)=@gcm_256={{0x303}, "64379284f94732ab", "9dfb6522708a566fd7ac2147e8493b9af4830e1817bf663f3aa66d65cbcee725", "6ecf24d5", "bb419a798aa6ea45"}, 0xffffff3c) r2 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x204e24, 0x5, @rand_addr, 0x1}, 0xffffffffffffffe7) getpid() listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) rt_sigsuspend(&(0x7f0000000340)={0x800}, 0x8) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc038563b, &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x200, 0x94001) getsockopt$inet6_dccp_buf(r3, 0x21, 0xd, &(0x7f0000000240)=""/214, &(0x7f00000000c0)=0xd6) r4 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:14 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0/file0\x00', 0x400, 0xb508619a16e52d39) mknodat(r0, &(0x7f0000000200)='\x00', 0xd800, 0x6) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x1) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f00000002c0)) unlink(&(0x7f00000000c0)='./file0/file0\x00') 04:11:14 executing program 1: lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@ipv4, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x8001, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="58ba991c71955062e668c0fe4e5bb0ee64ee6dd205adecd68aeeaa91b1cc18449347d28487c19c94716dd0942cfdcffd92792190becc7ef165ce763e9793ac32", 0x40, 0x22ae}, {&(0x7f00000003c0)="a09440b366c9f81566a5fe010ab587b4254a61c3ca07032bcbad81523a", 0x1d, 0x5}], 0x200084, &(0x7f0000000800)=ANY=[@ANYBLOB='nodecompose,force,decompose,uid=', @ANYRESHEX=r0, @ANYBLOB="2c6465636f6d706f8638daada2d5cf33650400000000000000216172000065722c6325a1ed1a26dd6fcbc414490000000000000000003f1e5b6f7ea19b543256a74b479d18ee8457d24aa66112df89aeac27e4e567f4e9f21ea7a9c0f7cc064cbfe2985065f3ad7e4f147e355202a426cd13f2974b34e0391335f68c", @ANYRESHEX=r1, @ANYBLOB=',uid=', @ANYRESHEX=r2, @ANYBLOB=',part=0x0000000000008001,dont_hash,defcontext=sysadm_u,mask=MAY_APPEND,fowner=', @ANYRESDEC=r3, @ANYBLOB=',\x00']) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x610840, 0x0) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r6, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="080029bd5000fedbdf2504000000080006000400000014000100fe880000000000000000000000000101"], 0x30}}, 0x4004000) listen(r5, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r8 = dup3(r4, r5, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) 04:11:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda704", "7ee51430da3f51b3"}, 0x28) 04:11:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda705", "7ee51430da3f51b3"}, 0x28) [ 329.561245][T18124] hfsplus: invalid uid specified [ 329.574380][ C1] net_ratelimit: 27 callbacks suppressed [ 329.574390][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 329.580678][T18124] hfsplus: unable to parse mount options 04:11:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='tls\x00', 0xfffffffffffffffb) keyctl$set_timeout(0xf, r2, 0x7) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x400000) r3 = dup3(r0, r1, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x900}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x300, 0x70bd25, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x880) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000100)=0x81, 0x4) 04:11:14 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') r1 = openat(r0, &(0x7f00000001c0)='./file1\x00', 0x4000, 0xd0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000200), &(0x7f0000000240)=0x4) [ 329.654218][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 329.690393][T18133] device nr0 entered promiscuous mode 04:11:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x4c043) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100)={0x41, 0x2, 0x2}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000340)={{&(0x7f0000000240)=""/204, 0xcc}, &(0x7f0000000180), 0x1}, 0x20) [ 329.774627][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:14 executing program 1: lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@ipv4, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x8001, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="58ba991c71955062e668c0fe4e5bb0ee64ee6dd205adecd68aeeaa91b1cc18449347d28487c19c94716dd0942cfdcffd92792190becc7ef165ce763e9793ac32", 0x40, 0x22ae}, {&(0x7f00000003c0)="a09440b366c9f81566a5fe010ab587b4254a61c3ca07032bcbad81523a", 0x1d, 0x5}], 0x200084, &(0x7f0000000800)=ANY=[@ANYBLOB='nodecompose,force,decompose,uid=', @ANYRESHEX=r0, @ANYBLOB="2c6465636f6d706f8638daada2d5cf33650400000000000000216172000065722c6325a1ed1a26dd6fcbc414490000000000000000003f1e5b6f7ea19b543256a74b479d18ee8457d24aa66112df89aeac27e4e567f4e9f21ea7a9c0f7cc064cbfe2985065f3ad7e4f147e355202a426cd13f2974b34e0391335f68c", @ANYRESHEX=r1, @ANYBLOB=',uid=', @ANYRESHEX=r2, @ANYBLOB=',part=0x0000000000008001,dont_hash,defcontext=sysadm_u,mask=MAY_APPEND,fowner=', @ANYRESDEC=r3, @ANYBLOB=',\x00']) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x610840, 0x0) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r6, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="080029bd5000fedbdf2504000000080006000400000014000100fe880000000000000000000000000101"], 0x30}}, 0x4004000) listen(r5, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r8 = dup3(r4, r5, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 329.823193][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda706", "7ee51430da3f51b3"}, 0x28) [ 329.964832][T18158] hfsplus: invalid uid specified [ 330.001536][T18158] hfsplus: unable to parse mount options [ 330.008367][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 330.022117][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 330.024690][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:11:15 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7ffff) 04:11:15 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000200)=0x1) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') syz_init_net_socket$x25(0x9, 0x5, 0x0) getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x31) [ 330.302174][T18179] device nr0 entered promiscuous mode 04:11:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x40000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000001340)=0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000001240)='\x8e)\x85IDA\xec\b\x03\x06s0\xd2qf\xfb\xc2\n<\x8c\x9a\x88\xc7a\n\\\xb9\xbb\xbbT\x0e\x0fG\xa2\xcf\xf4\x9a\xc83\'0x0}) r1 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@ipv4, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x8001, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="58ba991c71955062e668c0fe4e5bb0ee64ee6dd205adecd68aeeaa91b1cc18449347d28487c19c94716dd0942cfdcffd92792190becc7ef165ce763e9793ac32", 0x40, 0x22ae}, {&(0x7f00000003c0)="a09440b366c9f81566a5fe010ab587b4254a61c3ca07032bcbad81523a", 0x1d, 0x5}], 0x200084, &(0x7f0000000800)=ANY=[@ANYBLOB='nodecompose,force,decompose,uid=', @ANYRESHEX=r0, @ANYBLOB="2c6465636f6d706f8638daada2d5cf33650400000000000000216172000065722c6325a1ed1a26dd6fcbc414490000000000000000003f1e5b6f7ea19b543256a74b479d18ee8457d24aa66112df89aeac27e4e567f4e9f21ea7a9c0f7cc064cbfe2985065f3ad7e4f147e355202a426cd13f2974b34e0391335f68c", @ANYRESHEX=r1, @ANYBLOB=',uid=', @ANYRESHEX=r2, @ANYBLOB=',part=0x0000000000008001,dont_hash,defcontext=sysadm_u,mask=MAY_APPEND,fowner=', @ANYRESDEC=r3, @ANYBLOB=',\x00']) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x610840, 0x0) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r6, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="080029bd5000fedbdf2504000000080006000400000014000100fe880000000000000000000000000101"], 0x30}}, 0x4004000) listen(r5, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r4, r5, 0x0) 04:11:15 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x40, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00') getdents(r0, &(0x7f0000000600)=""/177, 0xaa) unlink(&(0x7f00000000c0)='./file0/file0\x00') r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x6}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000280)={r3, 0x2}, &(0x7f00000002c0)=0x8) [ 330.413152][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 330.434341][T18189] ================================================================== [ 330.442434][T18189] BUG: KASAN: null-ptr-deref in rxrpc_unuse_local+0x23/0x70 [ 330.449722][T18189] Write of size 4 at addr 0000000000000010 by task syz-executor.2/18189 [ 330.458121][T18189] [ 330.460445][T18189] CPU: 0 PID: 18189 Comm: syz-executor.2 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 330.469622][T18189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.479943][T18189] Call Trace: [ 330.483227][T18189] dump_stack+0x172/0x1f0 [ 330.487550][T18189] ? rxrpc_unuse_local+0x23/0x70 [ 330.492502][T18189] ? rxrpc_unuse_local+0x23/0x70 [ 330.497441][T18189] __kasan_report.cold+0x5/0x36 [ 330.502288][T18189] ? _raw_spin_unlock_irqrestore+0x11/0xe0 [ 330.508111][T18189] ? rxrpc_unuse_local+0x23/0x70 [ 330.513041][T18189] kasan_report+0x12/0x17 [ 330.517887][T18189] check_memory_region+0x134/0x1a0 [ 330.522988][T18189] __kasan_check_write+0x14/0x20 [ 330.527916][T18189] rxrpc_unuse_local+0x23/0x70 [ 330.532671][T18189] rxrpc_release+0x47d/0x840 [ 330.537250][T18189] __sock_release+0xce/0x280 [ 330.541831][T18189] sock_close+0x1e/0x30 [ 330.545981][T18189] __fput+0x2ff/0x890 [ 330.549955][T18189] ? __sock_release+0x280/0x280 [ 330.554824][T18189] ____fput+0x16/0x20 [ 330.558815][T18189] task_work_run+0x145/0x1c0 [ 330.563401][T18189] exit_to_usermode_loop+0x316/0x380 [ 330.568684][T18189] do_syscall_64+0x65f/0x760 [ 330.573268][T18189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.579154][T18189] RIP: 0033:0x413511 [ 330.583041][T18189] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 330.607941][T18189] RSP: 002b:00007fffd5ffe040 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 330.616347][T18189] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 0000000000413511 [ 330.624310][T18189] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 330.632269][T18189] RBP: 0000000000000001 R08: 00000000f644093a R09: 00000000f644093e [ 330.640252][T18189] R10: 00007fffd5ffe120 R11: 0000000000000293 R12: 000000000075bf20 [ 330.648237][T18189] R13: 0000000000050ab6 R14: 0000000000760878 R15: ffffffffffffffff [ 330.656220][T18189] ================================================================== [ 330.674423][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 330.691981][T18179] device nr0 entered promiscuous mode [ 330.699099][T18189] Kernel panic - not syncing: panic_on_warn set ... [ 330.705702][T18189] CPU: 0 PID: 18189 Comm: syz-executor.2 Tainted: G B 5.3.0-rc4-next-20190812+ #64 04:11:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom(r0, &(0x7f0000000240)=""/180, 0xb4, 0x40, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e2a, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r1, r2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 330.716278][T18189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.718207][T18186] hfsplus: invalid uid specified [ 330.726322][T18189] Call Trace: [ 330.726343][T18189] dump_stack+0x172/0x1f0 [ 330.726359][T18189] panic+0x2dc/0x755 [ 330.726380][T18189] ? add_taint.cold+0x16/0x16 [ 330.747568][T18189] ? rxrpc_unuse_local+0x23/0x70 [ 330.752511][T18189] ? preempt_schedule+0x4b/0x60 [ 330.752949][T18186] hfsplus: unable to parse mount options [ 330.757387][T18189] ? ___preempt_schedule+0x16/0x20 [ 330.757404][T18189] ? trace_hardirqs_on+0x5e/0x240 [ 330.757424][T18189] ? rxrpc_unuse_local+0x23/0x70 [ 330.778181][T18189] end_report+0x47/0x4f [ 330.782364][T18189] ? rxrpc_unuse_local+0x23/0x70 [ 330.786821][ T3880] kobject: 'loop3' (00000000fad33164): kobject_uevent_env [ 330.787310][T18189] __kasan_report.cold+0xe/0x36 [ 330.799249][T18189] ? _raw_spin_unlock_irqrestore+0x11/0xe0 [ 330.802293][ T3880] kobject: 'loop3' (00000000fad33164): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 330.805141][T18189] ? rxrpc_unuse_local+0x23/0x70 [ 330.805157][T18189] kasan_report+0x12/0x17 04:11:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x43926884e1bcbd74, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r2, r0, 0x759aff41336710cd) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20008000) [ 330.805178][T18189] check_memory_region+0x134/0x1a0 [ 330.829686][T18189] __kasan_check_write+0x14/0x20 [ 330.834629][T18189] rxrpc_unuse_local+0x23/0x70 [ 330.839397][T18189] rxrpc_release+0x47d/0x840 [ 330.843996][T18189] __sock_release+0xce/0x280 [ 330.848621][T18189] sock_close+0x1e/0x30 [ 330.852791][T18189] __fput+0x2ff/0x890 [ 330.856840][T18189] ? __sock_release+0x280/0x280 [ 330.861696][T18189] ____fput+0x16/0x20 [ 330.865680][T18189] task_work_run+0x145/0x1c0 04:11:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda708", "7ee51430da3f51b3"}, 0x28) [ 330.870362][T18189] exit_to_usermode_loop+0x316/0x380 [ 330.875655][T18189] do_syscall_64+0x65f/0x760 [ 330.880275][T18189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.883745][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 330.886198][T18189] RIP: 0033:0x413511 [ 330.886213][T18189] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 330.886220][T18189] RSP: 002b:00007fffd5ffe040 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 330.886239][T18189] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 0000000000413511 [ 330.937344][T18189] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 330.945322][T18189] RBP: 0000000000000001 R08: 00000000f644093a R09: 00000000f644093e [ 330.953460][T18189] R10: 00007fffd5ffe120 R11: 0000000000000293 R12: 000000000075bf20 [ 330.961430][T18189] R13: 0000000000050ab6 R14: 0000000000760878 R15: ffffffffffffffff [ 330.970378][T18189] Kernel Offset: disabled [ 330.974711][T18189] Rebooting in 86400 seconds..