='dos1xfloppy'}, {@fat=@errors_remount='errors=remount-ro'}, {@nodots='nodots'}, {@nodots='nodots'}, {@fat=@check_relaxed='check=relaxed'}, {@nodots='nodots'}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@audit='audit'}, {@smackfstransmute={'smackfstransmute', 0x3d, '/sys/kernel/debug/binder/state\x00'}}, {@context={'context', 0x3d, 'user_u'}}, {@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x38, 0x0, 0x61, 0x7, 0x36, 0x36, 0x62], 0x2d, [0x63, 0x32, 0x61, 0x37], 0x2d, [0x64, 0x35, 0x38, 0x37], 0x2d, [0x31, 0x3f, 0x35, 0x61], 0x2d, [0x36, 0x34, 0x65, 0x54, 0x37, 0x33, 0x63, 0x33]}}}]}) 15:42:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x40100, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000002c0)=@gcm_128={{0x304}, "f5f9b9fe4af843f1", "18ae08dd6efcd0b8bcf266277d00", "aa5b3ce1", "3c249f59ae00"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r3 = fcntl$dupfd(r0, 0x406, r0) fcntl$addseals(r3, 0x409, 0xb) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_UNIQUE(r5, 0x40106410, &(0x7f0000000200)={0x5b, &(0x7f0000000180)="db2fd41c41d901db30852b7221bbda28ed86fbbbb0782576ecd0ff783891a25e2dda81f3ed77cff5539056bbfdfad6bc51062dbc6d92466fdbbcf6ddd83ebd5dd93ae20bfc83ede6b602648cdb7eaf6ec88f0f0acdd30c25a95f71"}) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r6, 0x8040942d, &(0x7f0000000240)) [ 842.020597] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000840)={0x28, 0x4, 0x0, {0x2, 0x5}}, 0x28) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000006c0)={r6, 0x8, 0x81}, &(0x7f0000000700)=0x8) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000800)={'team0\x00'}) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x8, &(0x7f0000000500)=[{&(0x7f0000000080)="ce79a867ee142cfce7e1f519680eb5f99740fcc86dc9fbbc34ce1da96aa434d21356800dbadec12adc7191106e8d277d0881ca1fe4c8c825b9bfbb8a4312776c9036912a6ff6a394cddeb29bfbc2cb75f41f5d8238e19fc4bb69550bd7b9c6efe7dc4e341ea0c958ec82aa2e81f66997912d749cb55be9cbca", 0x79, 0x8}, {&(0x7f0000000100)="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", 0xfc, 0xfffffffffffffffe}, {&(0x7f0000000200)="02d2ebecdc94e1fb3e839e2f091a1b46fa71f2e2e0b49a6ef73a06fc", 0x1c, 0x1}, {&(0x7f0000000240)="85", 0x1}, {&(0x7f0000000280)="7723e8a6ae6f4e83b88e8fb13ae2b0a23e69ce65f9d78ee0e135119722258616b69f3d75a08a45f1d9456eabc581038fcc91ea5d718b860262c71351cf709e09bd84a945fe2ee099a72a4d1c3508c1ea277b83c3eaf1be00ca68032690eb886568ab768427e7618a93c9a83b8c9f9baa9e1132cee21545129e4fdf04854228f19b0b2c42c69de12475538b72c617a20e995c9ac8dfcac1b189a4e043b7161d8eb5a9395458f21fb65bf8f640f8da01edff53ac61f2513e198244c58bc4c7fc59e7153a015e2260ff87232e55ee74a8ec08482d7e026147", 0xd7}, {&(0x7f0000000380)="8abf50897d5502e4cbf8a4ab971f240db6f02e669b458b3d9d06bfc1", 0x1c, 0x9}, {&(0x7f00000003c0)="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", 0xfa, 0x6}, {&(0x7f00000004c0)="69d858a8d800d5321d4b96f67f98ee320ddf808bf6344968722bd549bfbd0e309bf4a2191091e928", 0x28, 0x3}], 0x8400, &(0x7f00000005c0)=ANY=[@ANYBLOB='&/*)@%^-,permit_directio,dont_appraise,smackfshat=#*!{$.}+^,euid<', @ANYRESDEC=0xee00, @ANYBLOB=',context=user_u,smackfsdef=^+},uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646f6e745b6d6561738ac6d93400"]) [ 842.105753] FAT-fs (loop2): Unrecognized mount option "euid=00000000000000060929" or missing value 15:42:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x20, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELOBJ={0x2c, 0x14, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x74}}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmmsg(r3, &(0x7f0000000000), 0x43, 0x0) r6 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x10001) prctl$PR_GET_KEEPCAPS(0x7) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$EVIOCGABS0(r8, 0x80184540, &(0x7f0000000040)=""/61) r9 = accept4(r5, &(0x7f0000000100)=@generic, &(0x7f0000000180)=0x80, 0x180800) setsockopt$packet_fanout_data(r9, 0x107, 0x16, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0x2, 0x4, 0x9, 0x6}, {0x4, 0x8, 0x7, 0x1f}, {0x24, 0x6, 0xff, 0x1}, {0x101, 0x43, 0x6, 0x3}, {0x9, 0x91, 0xfe, 0x3f}, {0x5, 0x81, 0x1, 0x6}, {0x0, 0x5, 0x80, 0x9}, {0xa4, 0x0, 0x3f, 0x200}]}, 0x10) 15:42:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=""/237, &(0x7f0000000100)=0xed) r1 = dup(r0) prctl$PR_GET_KEEPCAPS(0x7) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="a8d23d", @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c147365725f69643d062682254ec13c567782b6cc6b92594ad9f4218b4f02bbf70a1e2f90ce3b73170dba0b79ca4999b102cc76a335554fb3a64c87bd6ac1bc2cfac3bed208", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r2, &(0x7f00000103c0)={0x2020, 0x0, 0x0}, 0x2020) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, 0x1410, 0x4, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x1}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8, 0x4c, 0x1}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) write$FUSE_INIT(r2, &(0x7f0000000040)={0x50, 0x0, r3, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) write$FUSE_WRITE(r1, &(0x7f0000000140)={0x18, 0x0, r3, {0xfff}}, 0x18) [ 842.331802] selinux_nlmsg_perm: 1 callbacks suppressed [ 842.331811] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=2020 comm=syz-executor.0 [ 842.362844] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=2011 comm=syz-executor.2 [ 842.365567] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'ip6_vti0\x00', r4, 0x2f, 0x80, 0x20, 0xffffffc1, 0x0, @private2={0xfc, 0x2, [], 0x1}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7800, 0x7fc0, 0x0, 0x26}}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 842.410860] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2022 comm=syz-executor.0 [ 842.456309] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) shmget(0x3, 0x2000, 0x100, &(0x7f0000ffe000/0x2000)=nil) r1 = dup(r0) remap_file_pages(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x4, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) [ 842.591647] mmap: syz-executor.0 (2034) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 15:42:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000), &(0x7f00000000c0)=0x14) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 842.896104] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "72d849fcddc7443c"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000840)={0x28, 0x4, 0x0, {0x2, 0x5}}, 0x28) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000006c0)={r6, 0x8, 0x81}, &(0x7f0000000700)=0x8) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000800)={'team0\x00'}) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x8, &(0x7f0000000500)=[{&(0x7f0000000080)="ce79a867ee142cfce7e1f519680eb5f99740fcc86dc9fbbc34ce1da96aa434d21356800dbadec12adc7191106e8d277d0881ca1fe4c8c825b9bfbb8a4312776c9036912a6ff6a394cddeb29bfbc2cb75f41f5d8238e19fc4bb69550bd7b9c6efe7dc4e341ea0c958ec82aa2e81f66997912d749cb55be9cbca", 0x79, 0x8}, {&(0x7f0000000100)="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", 0xfc, 0xfffffffffffffffe}, {&(0x7f0000000200)="02d2ebecdc94e1fb3e839e2f091a1b46fa71f2e2e0b49a6ef73a06fc", 0x1c, 0x1}, {&(0x7f0000000240)="85", 0x1}, {&(0x7f0000000280)="7723e8a6ae6f4e83b88e8fb13ae2b0a23e69ce65f9d78ee0e135119722258616b69f3d75a08a45f1d9456eabc581038fcc91ea5d718b860262c71351cf709e09bd84a945fe2ee099a72a4d1c3508c1ea277b83c3eaf1be00ca68032690eb886568ab768427e7618a93c9a83b8c9f9baa9e1132cee21545129e4fdf04854228f19b0b2c42c69de12475538b72c617a20e995c9ac8dfcac1b189a4e043b7161d8eb5a9395458f21fb65bf8f640f8da01edff53ac61f2513e198244c58bc4c7fc59e7153a015e2260ff87232e55ee74a8ec08482d7e026147", 0xd7}, {&(0x7f0000000380)="8abf50897d5502e4cbf8a4ab971f240db6f02e669b458b3d9d06bfc1", 0x1c, 0x9}, {&(0x7f00000003c0)="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", 0xfa, 0x6}, {&(0x7f00000004c0)="69d858a8d800d5321d4b96f67f98ee320ddf808bf6344968722bd549bfbd0e309bf4a2191091e928", 0x28, 0x3}], 0x8400, &(0x7f00000005c0)=ANY=[@ANYBLOB='&/*)@%^-,permit_directio,dont_appraise,smackfshat=#*!{$.}+^,euid<', @ANYRESDEC=0xee00, @ANYBLOB=',context=user_u,smackfsdef=^+},uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646f6e745b6d6561738ac6d93400"]) [ 843.236112] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=2047 comm=syz-executor.2 [ 843.267507] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:24 executing program 0: socket$netlink(0x10, 0x3, 0x2) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "0ce77ad6be8d91eef22a7b404e"}, @NL80211_ATTR_KEY_SEQ={0xa, 0xa, "74a791ab8bda"}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}]}, 0x50}, 0x1, 0x0, 0x0, 0x40800}, 0x44080) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7, 0x20000) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x400, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1389ebd0) prctl$PR_GET_KEEPCAPS(0x7) [ 843.417410] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) 15:42:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x1, 0x2}) 15:42:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x5}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x80) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) sendmsg$nl_crypto(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="e00000001500010026bd7000fddbdf2563636d5f626973652863747228787465612d67656e65726963292c736861312d6e69290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000a000000000000000000007a9051b7595dd8fd5a8a9a12d7b6879153c69029d8f5af85507db8426f72f2606b4af87f923b97680f879fc441c9d6ba08779754dce5de3cf39547857887ca12756ad7f1f5ae969f43c2963b4618e76436adab55a677ce9f7c1ab0a52641df7a0f122dab32a2168aabe9b269b1131449dc7518175b0166a1b9d5ef34ba214edfedbb8e764205f80b64648ded023c505f54a1c5a97a8f8dba7d042c055744eac67f4fb9"], 0xe0}, 0x1, 0x0, 0x0, 0x20010014}, 0x48094) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000000)=""/94, &(0x7f0000000080)=0x5e) 15:42:24 executing program 3: ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(0xffffffffffffffff, 0xc2604111, &(0x7f0000000100)={0x7fff, [[0x80000000, 0xeb9a, 0x8, 0x5, 0x4, 0x200, 0x4d, 0x1], [0xfffffffb, 0x80000000, 0x80000000, 0x89f7, 0x1f, 0x0, 0x3, 0x7], [0x7fff, 0x9, 0x0, 0x8, 0xffff, 0x1f, 0xeb85, 0x101]], [], [{0x7f, 0xf2, 0x1, 0x1, 0x1, 0x1}, {0x4, 0x7ff, 0x0, 0x1, 0x0, 0x1}, {0x80, 0x80, 0x1, 0x0, 0x1, 0x1}, {0x5, 0x800, 0x0, 0x0, 0x1}, {0x7, 0x3ff, 0x1}, {0xfffff641, 0x1, 0x1, 0x1, 0x1}, {0x8, 0x683, 0x0, 0x0, 0x1}, {0xfffffffb, 0x9, 0x1, 0x0, 0x1, 0x1}, {0x8, 0xff, 0x0, 0x1, 0x1}, {0x7, 0x2, 0x1, 0x1, 0x0, 0x1}, {0x9, 0xffff, 0x1, 0x0, 0x0, 0x1}, {0x0, 0x9, 0x1, 0x1, 0x0, 0x1}], [], 0x6}) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000000000)={[{@nobarrier='nobarrier'}]}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000040), &(0x7f0000000380)=0x4) [ 843.664923] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=263 sclass=netlink_route_socket pid=2075 comm=syz-executor.0 [ 843.685615] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=263 sclass=netlink_route_socket pid=2075 comm=syz-executor.0 15:42:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x1, r4, 0xff, 0x80000}) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000080)={0x990000, 0x8, 0xffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x980921, 0x6, [], @ptr=0xfffffffffffffffc}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2, 0x0) ioctl$SIOCX25GCAUSEDIAG(r5, 0x89e6, &(0x7f0000000100)={0x8, 0x5}) [ 843.775759] XFS (loop3): nobarrier option is deprecated, ignoring. 15:42:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xe) r1 = dup(r0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x80840, 0x0) write$sndseq(r2, &(0x7f00000001c0)=[{0xfa, 0x0, 0x6, 0x5, @time={0xffff0001, 0x7}, {0x2, 0x8}, {0xf8, 0x7}, @note={0x0, 0x3, 0xd8, 0x22, 0x8000}}], 0x1c) r3 = accept4(r1, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000000)=0x80, 0x80800) getsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)) [ 843.871830] XFS (loop3): Invalid superblock magic number 15:42:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000840)={0x28, 0x4, 0x0, {0x2, 0x5}}, 0x28) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000ac0)=ANY=[@ANYBLOB="01000000b564d3a237a30df6236402f24cc7e18941d6faf7ad5d5232589c80ed5ca200c651b5c74f4c939586b6a3e302d56eb3b9e3fba1c666fcc047ea2e5244b30e145e6db3621c022067c7adf7c5ba45050834aae7ea7543ab65d9e8983ca7d754235fc63ab8c3b8b31d4d6d7a9545e9409f4384d9c99fa35ed5f63117043299f52d118032eb609b0b000000000000000072fcc4560e17dcd3137dfa8255ddff234d93983f49fde49d9118243d4db65cc2c0e6d33ceb14d63796e102d586f1a89b5c9f8cf96d36dff9ba2b2b275a747a5b7589ec180cc306ab70631b7b8fc3876b05f2f2dc771d016f25d5306bc91fa7c1f97786390700000000000000722e6d296fddb6cbd9fdd7827922002fd789c3a096d45850dd348d74e159a86573586030068d55da4f3285d50fc8c3c4522a38f71d904a416d16389872af6e8849c742038d51885beb3ef816c6c30ecddc46faa70fdc0b09efd24b13ef8ad7f8d7933284310e85ff91a3bad316c7f235dcb42f487fb029cd1e6188b391fb2576e79da26cd6cae270c6eb266480e3a81eab16774c7ab5e6ca625833b7e3a95cfbf98abf0e541d4e6626395096526914e6fd606ddc6db05d8953a50f97376312183e5633ec33670fd0e8406d3271cdbde35c06d6e0bfd69c933e90f928630b92a47540a9e053f2431361e7be1883ccb907f2e7cbdd7abbf1bd631b505f0f8a330a3960e2e28f62d74989225c0ee45c06de4684596af31edbf97143d55bfe2267b1f7743815ffa5ca532c8045b53d16", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000006c0)={r6, 0x8, 0x81}, &(0x7f0000000700)=0x8) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000800)={'team0\x00'}) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x8, &(0x7f0000000500)=[{&(0x7f0000000080)="ce79a867ee142cfce7e1f519680eb5f99740fcc86dc9fbbc34ce1da96aa434d21356800dbadec12adc7191106e8d277d0881ca1fe4c8c825b9bfbb8a4312776c9036912a6ff6a394cddeb29bfbc2cb75f41f5d8238e19fc4bb69550bd7b9c6efe7dc4e341ea0c958ec82aa2e81f66997912d749cb55be9cbca", 0x79, 0x8}, {&(0x7f0000000100)="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", 0xfc, 0xfffffffffffffffe}, {&(0x7f0000000200)="02d2ebecdc94e1fb3e839e2f091a1b46fa71f2e2e0b49a6ef73a06fc", 0x1c, 0x1}, {&(0x7f0000000240)="85", 0x1}, {&(0x7f0000000280)="7723e8a6ae6f4e83b88e8fb13ae2b0a23e69ce65f9d78ee0e135119722258616b69f3d75a08a45f1d9456eabc581038fcc91ea5d718b860262c71351cf709e09bd84a945fe2ee099a72a4d1c3508c1ea277b83c3eaf1be00ca68032690eb886568ab768427e7618a93c9a83b8c9f9baa9e1132cee21545129e4fdf04854228f19b0b2c42c69de12475538b72c617a20e995c9ac8dfcac1b189a4e043b7161d8eb5a9395458f21fb65bf8f640f8da01edff53ac61f2513e198244c58bc4c7fc59e7153a015e2260ff87232e55ee74a8ec08482d7e026147", 0xd7}, {&(0x7f0000000380)="8abf50897d5502e4cbf8a4ab971f240db6f02e669b458b3d9d06bfc1", 0x1c, 0x9}, {&(0x7f00000003c0)="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", 0xfa, 0x6}, {&(0x7f00000004c0)="69d858a8d800d5321d4b96f67f98ee320ddf808bf6344968722bd549bfbd0e309bf4a2191091e928", 0x28, 0x3}], 0x8400, &(0x7f00000005c0)=ANY=[@ANYBLOB='&/*)@%^-,permit_directio,dont_appraise,smackfshat=#*!{$.}+^,euid<', @ANYRESDEC=0xee00, @ANYBLOB=',context=user_u,smackfsdef=^+},uid<', @ANYRESDEC=0x0, @ANYBLOB="2c646f6e745b6d6561738ac6d93400"]) 15:42:25 executing program 3 (fault-call:7 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000000)=@generic={0x0, 0x27, 0x2}) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000325bd7000ffdbdf250300000044000180140002006261746164765f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="1400020074756e6c30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00'], 0x58}, 0x1, 0x0, 0x0, 0x804}, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 844.020310] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 844.052305] FAULT_INJECTION: forcing a failure. [ 844.052305] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 844.079353] CPU: 1 PID: 2109 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 844.087178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.096531] Call Trace: [ 844.099124] dump_stack+0x1b2/0x283 [ 844.102765] should_fail.cold+0x10a/0x154 [ 844.106916] __alloc_pages_nodemask+0x22c/0x2720 [ 844.111703] ? __lock_acquire+0x5fc/0x3f20 [ 844.115939] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 844.120791] ? trace_hardirqs_on+0x10/0x10 [ 844.125027] ? unwind_next_frame+0xe54/0x17d0 [ 844.129519] ? trace_hardirqs_on+0x10/0x10 [ 844.133749] ? deref_stack_reg+0x124/0x1a0 [ 844.137996] alloc_pages_current+0x155/0x260 [ 844.142417] skb_page_frag_refill+0x1bf/0x490 [ 844.146947] sk_page_frag_refill+0x4a/0x1b0 [ 844.151273] alloc_sg+0x13e/0x730 [ 844.154730] tls_sw_sendmsg+0x49a/0xfd0 [ 844.158713] ? selinux_socket_sendmsg+0x1d8/0x260 [ 844.163552] ? selinux_socket_getpeername+0x260/0x260 [ 844.168743] ? tls_sw_push_pending_record+0x30/0x30 [ 844.173851] ? __fget+0x225/0x360 [ 844.177306] inet_sendmsg+0x11a/0x4e0 [ 844.181108] ? security_socket_sendmsg+0x83/0xb0 [ 844.185862] ? inet_recvmsg+0x4d0/0x4d0 [ 844.189838] sock_sendmsg+0xb5/0x100 [ 844.193549] SyS_sendto+0x1c7/0x2c0 [ 844.197174] ? SyS_getpeername+0x220/0x220 [ 844.201450] ? lock_downgrade+0x740/0x740 [ 844.205605] ? wait_for_completion_io+0x10/0x10 [ 844.210271] ? vfs_write+0x319/0x4d0 [ 844.213979] ? fput+0xb/0x140 [ 844.217079] ? SyS_write+0x14d/0x210 [ 844.220788] ? SyS_read+0x210/0x210 [ 844.225000] ? SyS_clock_settime+0x1a0/0x1a0 15:42:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) dup(r5) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="ec0000db5088000772bd52bc00fce4678e93eced66541cc9f24f37767725ef9cdbfdd4bf777b47cdfa1c42a8a022967d7d7dac2cb285cdcc418fc942610a8356531fdc61c5b2ee66e1764f3eab0610323caeb55dfc9bd335fe1773b82a1ae6ce16b24546bc7441136b2e6261c2c2425e4bbeef6bea5a8bc4", @ANYRES16=r5, @ANYRESOCT=r4], 0xec}, 0x1, 0x0, 0x0, 0x2400c081}, 0x0) r6 = dup(r0) sendmsg$IPSET_CMD_ADD(r6, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf0, 0x9, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x70000}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz2\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x1000}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x2c, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR={0x5, 0x3, 0x81}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private0}}}]}, @IPSET_ATTR_LINENO={0x8}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4}, 0x40) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) accept4(r6, &(0x7f0000000140)=@qipcrtr, &(0x7f00000001c0)=0x80, 0x80800) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0)="137b8d14a0cd25f37347fcee87dbedfb43acd7a0ed232fd197", 0x19, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) 15:42:25 executing program 3 (fault-call:7 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x10201, 0x1, 0x1, 0x1000, &(0x7f0000fff000/0x1000)=nil}) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x119101, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x6, @local, 0x400}, @in6={0xa, 0x4e21, 0x9, @empty, 0x2}, @in6={0xa, 0x4e24, 0x9, @mcast2, 0x437}, @in6={0xa, 0x4e22, 0xffff, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x4e21, 0x4, @mcast1, 0x3}, @in6={0xa, 0x4e20, 0x8001, @private1={0xfc, 0x1, [], 0x1}}, @in={0x2, 0x4e20, @private=0xa010101}, @in6={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfc83}, @in6={0xa, 0x4e23, 0x800, @loopback, 0x4}, @in={0x2, 0x4e20, @loopback}], 0x100) 15:42:25 executing program 3 (fault-call:7 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:25 executing program 3 (fault-call:7 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:25 executing program 3 (fault-call:7 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:25 executing program 3 (fault-call:7 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:25 executing program 3 (fault-call:7 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 844.225013] ? do_syscall_64+0x4c/0x640 [ 844.225022] ? SyS_getpeername+0x220/0x220 [ 844.225033] do_syscall_64+0x1d5/0x640 [ 844.225049] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 844.225056] RIP: 0033:0x45dd99 [ 844.225061] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 844.225071] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 844.225077] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 844.225082] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 844.225088] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000000 [ 844.225094] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 844.244710] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 844.286586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=2108 comm=syz-executor.2 [ 844.318771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2124 comm=syz-executor.4 [ 844.377963] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 844.379738] FAULT_INJECTION: forcing a failure. [ 844.379738] name failslab, interval 1, probability 0, space 0, times 0 [ 844.379749] CPU: 1 PID: 2131 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 844.379755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.379759] Call Trace: [ 844.379774] dump_stack+0x1b2/0x283 [ 844.379790] should_fail.cold+0x10a/0x154 [ 844.379805] should_failslab+0xd6/0x130 [ 844.379815] __kmalloc+0x2c1/0x400 [ 844.379826] ? tls_push_record+0xfa/0x1270 [ 844.379839] tls_push_record+0xfa/0x1270 [ 844.379873] tls_sw_sendmsg+0xbb0/0xfd0 [ 844.379901] ? selinux_socket_sendmsg+0x1d8/0x260 [ 844.379913] ? selinux_socket_getpeername+0x260/0x260 [ 844.379931] ? tls_sw_push_pending_record+0x30/0x30 [ 844.379946] ? __fget+0x225/0x360 [ 844.379961] inet_sendmsg+0x11a/0x4e0 [ 844.379972] ? security_socket_sendmsg+0x83/0xb0 [ 844.379983] ? inet_recvmsg+0x4d0/0x4d0 [ 844.379996] sock_sendmsg+0xb5/0x100 [ 844.380007] SyS_sendto+0x1c7/0x2c0 [ 844.380016] ? SyS_getpeername+0x220/0x220 [ 844.380041] ? lock_downgrade+0x740/0x740 [ 844.380065] ? wait_for_completion_io+0x10/0x10 [ 844.380077] ? vfs_write+0x319/0x4d0 [ 844.380088] ? fput+0xb/0x140 [ 844.380099] ? SyS_write+0x14d/0x210 [ 844.380108] ? SyS_read+0x210/0x210 [ 844.380118] ? SyS_clock_settime+0x1a0/0x1a0 [ 844.380130] ? do_syscall_64+0x4c/0x640 [ 844.380141] ? SyS_getpeername+0x220/0x220 [ 844.380154] do_syscall_64+0x1d5/0x640 [ 844.380170] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 844.380179] RIP: 0033:0x45dd99 [ 844.380185] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 844.380196] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 844.380203] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 844.380209] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 844.380215] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000001 [ 844.380222] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 844.479413] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 844.489110] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 844.492567] FAULT_INJECTION: forcing a failure. [ 844.492567] name failslab, interval 1, probability 0, space 0, times 0 [ 844.492579] CPU: 0 PID: 2139 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 844.492593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.492598] Call Trace: [ 844.492613] dump_stack+0x1b2/0x283 [ 844.492629] should_fail.cold+0x10a/0x154 [ 844.492644] should_failslab+0xd6/0x130 [ 844.492655] __kmalloc+0x6d/0x400 [ 844.492761] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 844.492776] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 844.492798] ? generic_gcmaes_encrypt+0xf4/0x130 [ 844.492809] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 844.492856] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 844.492868] ? __kmalloc+0x3a4/0x400 [ 844.492881] ? tls_push_record+0xfa/0x1270 [ 844.492930] ? cryptd_aead_child+0x9/0x40 [ 844.492947] ? tls_push_record+0x938/0x1270 [ 844.492972] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 844.492992] ? selinux_socket_sendmsg+0x1d8/0x260 [ 844.493002] ? selinux_socket_getpeername+0x260/0x260 [ 844.493018] ? tls_sw_push_pending_record+0x30/0x30 [ 844.493035] ? __fget+0x225/0x360 [ 844.493052] ? inet_sendmsg+0x11a/0x4e0 [ 844.493060] ? security_socket_sendmsg+0x83/0xb0 [ 844.493073] ? inet_recvmsg+0x4d0/0x4d0 [ 844.493090] ? sock_sendmsg+0xb5/0x100 [ 844.493103] ? SyS_sendto+0x1c7/0x2c0 [ 844.493116] ? SyS_getpeername+0x220/0x220 [ 844.493131] ? lock_downgrade+0x740/0x740 [ 844.493154] ? wait_for_completion_io+0x10/0x10 [ 844.493172] ? vfs_write+0x319/0x4d0 [ 844.493186] ? fput+0xb/0x140 [ 844.493197] ? SyS_write+0x14d/0x210 [ 844.493207] ? SyS_read+0x210/0x210 [ 844.493216] ? SyS_clock_settime+0x1a0/0x1a0 [ 844.493235] ? do_syscall_64+0x4c/0x640 [ 844.493246] ? SyS_getpeername+0x220/0x220 [ 844.493259] ? do_syscall_64+0x1d5/0x640 [ 844.493278] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 844.561074] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 844.562268] FAULT_INJECTION: forcing a failure. [ 844.562268] name failslab, interval 1, probability 0, space 0, times 0 [ 844.562280] CPU: 0 PID: 2143 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 844.562286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.562290] Call Trace: [ 844.562306] dump_stack+0x1b2/0x283 [ 844.562323] should_fail.cold+0x10a/0x154 [ 844.562338] should_failslab+0xd6/0x130 [ 844.562349] kmem_cache_alloc_node+0x263/0x410 [ 844.562365] __alloc_skb+0x5c/0x510 [ 844.562452] sk_stream_alloc_skb+0xb1/0x760 [ 844.562466] ? tcp_send_mss+0x9f/0x2e0 [ 844.562514] ? ipv6_frag_exit+0x40/0x40 [ 844.562529] do_tcp_sendpages+0x835/0x1750 [ 844.562549] ? gcmaes_encrypt.constprop.0+0x6d8/0xc00 [ 844.562567] ? sk_stream_alloc_skb+0x760/0x760 [ 844.562599] tls_push_sg+0x1ee/0x760 [ 844.562621] tls_push_record+0xa81/0x1270 [ 844.562645] tls_sw_sendmsg+0xbb0/0xfd0 [ 844.562663] ? selinux_socket_sendmsg+0x1d8/0x260 [ 844.562675] ? selinux_socket_getpeername+0x260/0x260 [ 844.562694] ? tls_sw_push_pending_record+0x30/0x30 [ 844.562706] ? __fget+0x225/0x360 [ 844.562723] inet_sendmsg+0x11a/0x4e0 [ 844.562734] ? security_socket_sendmsg+0x83/0xb0 [ 844.562744] ? inet_recvmsg+0x4d0/0x4d0 [ 844.562758] sock_sendmsg+0xb5/0x100 [ 844.562770] SyS_sendto+0x1c7/0x2c0 [ 844.562779] ? SyS_getpeername+0x220/0x220 [ 844.562794] ? lock_downgrade+0x740/0x740 [ 844.562818] ? wait_for_completion_io+0x10/0x10 [ 844.562830] ? vfs_write+0x319/0x4d0 [ 844.562844] ? fput+0xb/0x140 [ 844.562854] ? SyS_write+0x14d/0x210 [ 844.562868] ? SyS_read+0x210/0x210 [ 844.562883] ? SyS_clock_settime+0x1a0/0x1a0 [ 844.562897] ? do_syscall_64+0x4c/0x640 [ 844.562914] ? SyS_getpeername+0x220/0x220 [ 844.562928] do_syscall_64+0x1d5/0x640 [ 844.562944] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 844.562953] RIP: 0033:0x45dd99 [ 844.562959] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 844.562972] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 844.562984] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 844.562992] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 844.562998] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000003 [ 844.563004] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 844.618142] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 844.619667] FAULT_INJECTION: forcing a failure. [ 844.619667] name failslab, interval 1, probability 0, space 0, times 0 [ 844.619678] CPU: 0 PID: 2147 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 844.619684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.619687] Call Trace: [ 844.619705] dump_stack+0x1b2/0x283 [ 844.619722] should_fail.cold+0x10a/0x154 [ 844.619737] should_failslab+0xd6/0x130 [ 844.619749] kmem_cache_alloc_node_trace+0x25a/0x400 [ 844.619762] __kmalloc_node_track_caller+0x38/0x70 [ 844.619776] __alloc_skb+0x96/0x510 [ 844.619791] sk_stream_alloc_skb+0xb1/0x760 [ 844.619801] ? tcp_send_mss+0x9f/0x2e0 [ 844.619813] ? ipv6_frag_exit+0x40/0x40 [ 844.619825] do_tcp_sendpages+0x835/0x1750 [ 844.619841] ? gcmaes_encrypt.constprop.0+0x6d8/0xc00 [ 844.619856] ? sk_stream_alloc_skb+0x760/0x760 [ 844.619874] tls_push_sg+0x1ee/0x760 [ 844.619892] tls_push_record+0xa81/0x1270 [ 844.619914] tls_sw_sendmsg+0xbb0/0xfd0 [ 844.619933] ? selinux_socket_sendmsg+0x1d8/0x260 [ 844.619944] ? selinux_socket_getpeername+0x260/0x260 [ 844.619965] ? tls_sw_push_pending_record+0x30/0x30 [ 844.619982] ? __fget+0x225/0x360 [ 844.619998] inet_sendmsg+0x11a/0x4e0 [ 844.620011] ? security_socket_sendmsg+0x83/0xb0 [ 844.620023] ? inet_recvmsg+0x4d0/0x4d0 [ 844.620044] sock_sendmsg+0xb5/0x100 [ 844.620056] SyS_sendto+0x1c7/0x2c0 [ 844.620068] ? SyS_getpeername+0x220/0x220 [ 844.620083] ? lock_downgrade+0x740/0x740 [ 844.620104] ? wait_for_completion_io+0x10/0x10 [ 844.620117] ? vfs_write+0x319/0x4d0 [ 844.620128] ? fput+0xb/0x140 [ 844.620138] ? SyS_write+0x14d/0x210 [ 844.620149] ? SyS_read+0x210/0x210 [ 844.620160] ? SyS_clock_settime+0x1a0/0x1a0 [ 844.620170] ? do_syscall_64+0x4c/0x640 [ 844.620178] ? SyS_getpeername+0x220/0x220 [ 844.620190] do_syscall_64+0x1d5/0x640 [ 844.620206] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 844.620214] RIP: 0033:0x45dd99 [ 844.620219] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 844.620230] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 844.620236] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 844.620242] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 844.620248] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000004 [ 844.620254] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 844.694921] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 844.696342] FAULT_INJECTION: forcing a failure. [ 844.696342] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 844.696354] CPU: 0 PID: 2151 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 844.696359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.696363] Call Trace: [ 844.696379] dump_stack+0x1b2/0x283 [ 844.696395] should_fail.cold+0x10a/0x154 [ 844.696410] __alloc_pages_nodemask+0x22c/0x2720 [ 844.696423] ? kasan_slab_free+0xc3/0x1a0 [ 844.696435] ? tls_push_record+0xc3b/0x1270 [ 844.696446] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 844.696454] ? inet_sendmsg+0x11a/0x4e0 [ 844.696465] ? do_syscall_64+0x1d5/0x640 [ 844.696474] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 844.696485] ? tcp_tx_timestamp+0x17/0x250 [ 844.696498] ? debug_check_no_obj_freed+0x2c0/0x674 [ 844.696513] ? lock_acquire+0x170/0x3f0 [ 844.696523] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 844.696544] ? debug_check_no_obj_freed+0x2c0/0x674 [ 844.696568] alloc_pages_current+0x155/0x260 [ 844.696577] ? tls_push_record+0xc3b/0x1270 [ 844.696602] skb_page_frag_refill+0x1bf/0x490 [ 844.696616] sk_page_frag_refill+0x4a/0x1b0 [ 844.696629] alloc_sg+0x13e/0x730 [ 844.696650] tls_sw_sendmsg+0x49a/0xfd0 [ 844.696670] ? selinux_socket_sendmsg+0x1d8/0x260 [ 844.696681] ? selinux_socket_getpeername+0x260/0x260 [ 844.696697] ? tls_sw_push_pending_record+0x30/0x30 [ 844.696710] ? __fget+0x225/0x360 [ 844.696722] inet_sendmsg+0x11a/0x4e0 [ 844.696731] ? security_socket_sendmsg+0x83/0xb0 [ 844.696740] ? inet_recvmsg+0x4d0/0x4d0 [ 844.696751] sock_sendmsg+0xb5/0x100 [ 844.696761] SyS_sendto+0x1c7/0x2c0 [ 844.696771] ? SyS_getpeername+0x220/0x220 [ 844.696782] ? lock_downgrade+0x740/0x740 [ 844.696803] ? wait_for_completion_io+0x10/0x10 [ 844.696812] ? vfs_write+0x319/0x4d0 [ 844.696823] ? fput+0xb/0x140 [ 844.696832] ? SyS_write+0x14d/0x210 [ 844.696841] ? SyS_read+0x210/0x210 [ 844.696851] ? SyS_clock_settime+0x1a0/0x1a0 [ 844.696860] ? do_syscall_64+0x4c/0x640 [ 844.696869] ? SyS_getpeername+0x220/0x220 [ 844.696880] do_syscall_64+0x1d5/0x640 [ 844.696895] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 844.696903] RIP: 0033:0x45dd99 [ 844.696908] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 844.696919] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 844.696926] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 844.696932] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 844.696938] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000005 [ 844.696945] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 844.779098] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 844.780715] FAULT_INJECTION: forcing a failure. [ 844.780715] name failslab, interval 1, probability 0, space 0, times 0 [ 844.780727] CPU: 1 PID: 2155 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 844.780732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.780736] Call Trace: [ 844.780753] dump_stack+0x1b2/0x283 [ 844.780769] should_fail.cold+0x10a/0x154 [ 844.780784] should_failslab+0xd6/0x130 [ 844.780794] __kmalloc+0x2c1/0x400 [ 844.780807] ? tls_push_record+0xfa/0x1270 [ 844.780822] tls_push_record+0xfa/0x1270 [ 844.780835] ? sk_page_frag_refill+0x56/0x1b0 [ 844.780860] tls_sw_sendmsg+0xbb0/0xfd0 [ 844.780885] ? selinux_socket_sendmsg+0x1d8/0x260 [ 844.780896] ? selinux_socket_getpeername+0x260/0x260 [ 844.780917] ? tls_sw_push_pending_record+0x30/0x30 [ 844.780935] ? __fget+0x225/0x360 [ 844.780953] inet_sendmsg+0x11a/0x4e0 [ 844.780963] ? security_socket_sendmsg+0x83/0xb0 [ 844.780976] ? inet_recvmsg+0x4d0/0x4d0 [ 844.780990] sock_sendmsg+0xb5/0x100 [ 844.781002] SyS_sendto+0x1c7/0x2c0 [ 844.781015] ? SyS_getpeername+0x220/0x220 [ 844.781031] ? lock_downgrade+0x740/0x740 [ 844.781056] ? wait_for_completion_io+0x10/0x10 [ 844.781068] ? vfs_write+0x319/0x4d0 [ 844.781080] ? fput+0xb/0x140 [ 844.781102] ? SyS_write+0x14d/0x210 [ 844.781114] ? SyS_read+0x210/0x210 [ 844.781125] ? SyS_clock_settime+0x1a0/0x1a0 [ 844.781136] ? do_syscall_64+0x4c/0x640 [ 844.781142] ? SyS_getpeername+0x220/0x220 [ 844.781150] do_syscall_64+0x1d5/0x640 [ 844.781164] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 844.781172] RIP: 0033:0x45dd99 [ 844.781176] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 844.781186] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 15:42:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xe) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x6, 0x521002) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000040)={{0x0, 0x96}, 'port0\x00', 0x40, 0x0, 0x8000, 0x4, 0x1, 0x7ff, 0x1, 0x0, 0x4, 0x2}) 15:42:29 executing program 3 (fault-call:7 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000840)={0x28, 0x4, 0x0, {0x2, 0x5}}, 0x28) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000ac0)=ANY=[@ANYBLOB="01000000b564d3a237a30df6236402f24cc7e18941d6faf7ad5d5232589c80ed5ca200c651b5c74f4c939586b6a3e302d56eb3b9e3fba1c666fcc047ea2e5244b30e145e6db3621c022067c7adf7c5ba45050834aae7ea7543ab65d9e8983ca7d754235fc63ab8c3b8b31d4d6d7a9545e9409f4384d9c99fa35ed5f63117043299f52d118032eb609b0b000000000000000072fcc4560e17dcd3137dfa8255ddff234d93983f49fde49d9118243d4db65cc2c0e6d33ceb14d63796e102d586f1a89b5c9f8cf96d36dff9ba2b2b275a747a5b7589ec180cc306ab70631b7b8fc3876b05f2f2dc771d016f25d5306bc91fa7c1f97786390700000000000000722e6d296fddb6cbd9fdd7827922002fd789c3a096d45850dd348d74e159a86573586030068d55da4f3285d50fc8c3c4522a38f71d904a416d16389872af6e8849c742038d51885beb3ef816c6c30ecddc46faa70fdc0b09efd24b13ef8ad7f8d7933284310e85ff91a3bad316c7f235dcb42f487fb029cd1e6188b391fb2576e79da26cd6cae270c6eb266480e3a81eab16774c7ab5e6ca625833b7e3a95cfbf98abf0e541d4e6626395096526914e6fd606ddc6db05d8953a50f97376312183e5633ec33670fd0e8406d3271cdbde35c06d6e0bfd69c933e90f928630b92a47540a9e053f2431361e7be1883ccb907f2e7cbdd7abbf1bd631b505f0f8a330a3960e2e28f62d74989225c0ee45c06de4684596af31edbf97143d55bfe2267b1f7743815ffa5ca532c8045b53d16", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000006c0)={r6, 0x8, 0x81}, &(0x7f0000000700)=0x8) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000800)={'team0\x00'}) 15:42:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x47, 0x20000004, &(0x7f0000000280)={0xa, 0x5e20, 0x0, @loopback}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = syz_open_dev$vcsn(&(0x7f0000001480)='/dev/vcs#\x00', 0x7, 0x40c000) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "2a892098b345db86", "431a6023ae5d30d4b89c5f2f332578f0033695be90d392562a1fe78e41aa5d9b", "d3988473", "7df67fbec7ae1f6a"}, 0x38) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000140)=""/211, 0xd3}], 0x1, &(0x7f00000002c0)=""/198, 0xc6}, 0x120) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000400)={r6, 0x7f}, &(0x7f0000000440)=0x8) ioctl$IMHOLD_L1(r3, 0x80044948, &(0x7f0000000240)=0xa7) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x24, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x8, 0x2, 0xfffffff7}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000040}, 0x80) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000240)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x37, &(0x7f0000000140)=ANY=[@ANYBLOB="6c090000000000000730000000030a040200010000000000000003000000000000000000000000000000a0ea3b4b6ba315b800000000000000000502000904015ec910fe8000000000000000000000000000bb0000000000"], 0x58) [ 844.781191] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 844.781196] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 844.781201] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000006 [ 844.781206] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 845.277446] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 848.604579] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 848.618787] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2175 comm=syz-executor.1 [ 848.644813] FAULT_INJECTION: forcing a failure. [ 848.644813] name failslab, interval 1, probability 0, space 0, times 0 [ 848.657485] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 848.690454] CPU: 1 PID: 2174 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 848.698300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.707653] Call Trace: [ 848.710241] dump_stack+0x1b2/0x283 [ 848.713870] should_fail.cold+0x10a/0x154 [ 848.718022] should_failslab+0xd6/0x130 [ 848.722086] __kmalloc+0x6d/0x400 [ 848.725544] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 848.730732] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 848.735752] ? generic_gcmaes_encrypt+0xf4/0x130 [ 848.740505] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 848.745364] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 848.750378] ? __kmalloc+0x3a4/0x400 15:42:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) socket$inet6_dccp(0xa, 0x6, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x3f, 0x81, 0x3f, 0xfffffffffffffe01, 0x3, 0x3e, 0x1f, 0x3a9, 0x40, 0x31e, 0x5, 0x5, 0x38, 0x2, 0x8, 0x100, 0x7fff}, [{0x70000000, 0x5, 0x7, 0x81, 0x8, 0x7, 0x1, 0x9}, {0x60000005, 0x3ff, 0x80000001, 0x7, 0x2, 0x81000000000, 0x1, 0x3139}], "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", [[], [], [], [], [], [], []]}, 0x8ad) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e21, 0x85, @rand_addr=' \x01\x00', 0x2000000}, 0x1c) listen(r2, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000140)=0x8) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 848.754126] ? tls_push_record+0xfa/0x1270 [ 848.758360] ? cryptd_aead_child+0x9/0x40 [ 848.762511] ? tls_push_record+0x938/0x1270 [ 848.766842] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 848.771023] ? selinux_socket_sendmsg+0x1d8/0x260 [ 848.774360] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=2172 comm=syz-executor.2 [ 848.775864] ? selinux_socket_getpeername+0x260/0x260 [ 848.775882] ? tls_sw_push_pending_record+0x30/0x30 [ 848.775896] ? __fget+0x225/0x360 [ 848.775910] ? inet_sendmsg+0x11a/0x4e0 [ 848.805465] ? security_socket_sendmsg+0x83/0xb0 [ 848.810226] ? inet_recvmsg+0x4d0/0x4d0 [ 848.814205] ? sock_sendmsg+0xb5/0x100 [ 848.818091] ? SyS_sendto+0x1c7/0x2c0 [ 848.821887] ? SyS_getpeername+0x220/0x220 [ 848.826130] ? lock_downgrade+0x740/0x740 [ 848.830288] ? wait_for_completion_io+0x10/0x10 [ 848.834957] ? vfs_write+0x319/0x4d0 [ 848.838694] ? fput+0xb/0x140 [ 848.841799] ? SyS_write+0x14d/0x210 [ 848.845511] ? SyS_read+0x210/0x210 [ 848.849155] ? SyS_clock_settime+0x1a0/0x1a0 15:42:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) socketpair(0x27, 0x3, 0x400, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3a, r6}) [ 848.853561] ? do_syscall_64+0x4c/0x640 [ 848.857535] ? SyS_getpeername+0x220/0x220 [ 848.861882] ? do_syscall_64+0x1d5/0x640 [ 848.865949] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:42:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) inotify_init() ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f0000000000)=0x4) dup3(r0, r0, 0x80000) prctl$PR_GET_KEEPCAPS(0x7) 15:42:30 executing program 3 (fault-call:7 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 849.027038] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 849.046770] FAULT_INJECTION: forcing a failure. [ 849.046770] name failslab, interval 1, probability 0, space 0, times 0 [ 849.059192] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 849.072699] CPU: 0 PID: 2197 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 849.080523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.089983] Call Trace: [ 849.092570] dump_stack+0x1b2/0x283 [ 849.096634] should_fail.cold+0x10a/0x154 [ 849.100783] should_failslab+0xd6/0x130 [ 849.104757] kmem_cache_alloc_node+0x263/0x410 [ 849.109339] __alloc_skb+0x5c/0x510 [ 849.112974] sk_stream_alloc_skb+0xb1/0x760 [ 849.117295] ? tcp_send_mss+0x9f/0x2e0 [ 849.121212] ? ipv6_frag_exit+0x40/0x40 [ 849.125191] do_tcp_sendpages+0x835/0x1750 [ 849.129431] ? gcmaes_encrypt.constprop.0+0x6d8/0xc00 [ 849.134626] ? sk_stream_alloc_skb+0x760/0x760 [ 849.139239] tls_push_sg+0x1ee/0x760 [ 849.142964] tls_push_record+0xa81/0x1270 [ 849.147128] tls_sw_sendmsg+0xbb0/0xfd0 [ 849.151657] ? selinux_socket_sendmsg+0x1d8/0x260 [ 849.156501] ? selinux_socket_getpeername+0x260/0x260 [ 849.161695] ? tls_sw_push_pending_record+0x30/0x30 [ 849.166714] ? __fget+0x225/0x360 [ 849.170171] inet_sendmsg+0x11a/0x4e0 [ 849.173968] ? security_socket_sendmsg+0x83/0xb0 [ 849.178719] ? inet_recvmsg+0x4d0/0x4d0 [ 849.182692] sock_sendmsg+0xb5/0x100 [ 849.186405] SyS_sendto+0x1c7/0x2c0 [ 849.190029] ? SyS_getpeername+0x220/0x220 [ 849.194272] ? lock_downgrade+0x740/0x740 [ 849.198428] ? wait_for_completion_io+0x10/0x10 [ 849.203098] ? vfs_write+0x319/0x4d0 [ 849.206809] ? fput+0xb/0x140 [ 849.209914] ? SyS_write+0x14d/0x210 [ 849.213630] ? SyS_read+0x210/0x210 [ 849.217262] ? SyS_clock_settime+0x1a0/0x1a0 [ 849.221757] ? do_syscall_64+0x4c/0x640 [ 849.225731] ? SyS_getpeername+0x220/0x220 [ 849.229967] do_syscall_64+0x1d5/0x640 [ 849.233859] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 849.239042] RIP: 0033:0x45dd99 [ 849.242251] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 849.250340] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 849.257633] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 849.264900] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 15:42:30 executing program 3 (fault-call:7 fault-nth:9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 849.272171] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000008 [ 849.279440] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000840)={0x28, 0x4, 0x0, {0x2, 0x5}}, 0x28) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000006c0)={r6, 0x8, 0x81}, &(0x7f0000000700)=0x8) [ 849.366392] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 849.402855] FAULT_INJECTION: forcing a failure. [ 849.402855] name failslab, interval 1, probability 0, space 0, times 0 [ 849.409757] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2175 comm=syz-executor.1 [ 849.424973] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 849.457371] CPU: 0 PID: 2206 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 849.465815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.475167] Call Trace: [ 849.478715] dump_stack+0x1b2/0x283 [ 849.482350] should_fail.cold+0x10a/0x154 [ 849.486509] should_failslab+0xd6/0x130 [ 849.490483] kmem_cache_alloc_node_trace+0x25a/0x400 [ 849.495590] __kmalloc_node_track_caller+0x38/0x70 [ 849.500523] __alloc_skb+0x96/0x510 [ 849.504867] sk_stream_alloc_skb+0xb1/0x760 [ 849.509200] ? tcp_send_mss+0x9f/0x2e0 [ 849.513100] ? ipv6_frag_exit+0x40/0x40 [ 849.517100] do_tcp_sendpages+0x835/0x1750 [ 849.521353] ? gcmaes_encrypt.constprop.0+0x6d8/0xc00 [ 849.526553] ? sk_stream_alloc_skb+0x760/0x760 [ 849.531157] tls_push_sg+0x1ee/0x760 [ 849.534886] tls_push_record+0xa81/0x1270 [ 849.539052] tls_sw_sendmsg+0xbb0/0xfd0 [ 849.543040] ? selinux_socket_sendmsg+0x1d8/0x260 [ 849.547910] ? selinux_socket_getpeername+0x260/0x260 [ 849.553114] ? tls_sw_push_pending_record+0x30/0x30 [ 849.558138] ? __fget+0x225/0x360 [ 849.562293] inet_sendmsg+0x11a/0x4e0 [ 849.566126] ? security_socket_sendmsg+0x83/0xb0 [ 849.570884] ? inet_recvmsg+0x4d0/0x4d0 [ 849.574862] sock_sendmsg+0xb5/0x100 [ 849.578575] SyS_sendto+0x1c7/0x2c0 [ 849.582199] ? SyS_getpeername+0x220/0x220 [ 849.586436] ? lock_downgrade+0x740/0x740 [ 849.590594] ? wait_for_completion_io+0x10/0x10 [ 849.595267] ? vfs_write+0x319/0x4d0 [ 849.599003] ? fput+0xb/0x140 [ 849.602107] ? SyS_write+0x14d/0x210 [ 849.604052] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=2213 comm=syz-executor.2 [ 849.605829] ? SyS_read+0x210/0x210 [ 849.605841] ? SyS_clock_settime+0x1a0/0x1a0 [ 849.605854] ? do_syscall_64+0x4c/0x640 [ 849.630998] ? SyS_getpeername+0x220/0x220 [ 849.635240] do_syscall_64+0x1d5/0x640 [ 849.639135] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 849.644322] RIP: 0033:0x45dd99 [ 849.647505] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 15:42:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5f67af9f, 0x240102) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3fb, 0x1, 0x70bd2d, 0x25dfdbfd, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x20040000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000200)={0x7, 'batadv0\x00', {0x3}, 0x1}) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x8000, 0x8, &(0x7f0000000780)=[{&(0x7f0000000300)="8d8efe0183901cf08b7e9b2ab2bb34e4a2d0d9e30154e5345d6be154b036146795795699da953e9b233a86df8d530c0fca8809b4fd6f51f880efce8e8e467c0cef7aa2adf251e37055ec3efa2bb93b476e912b839645fc034eb54d370c07b3a158cc62214313c2b2f73495aab3ccccd70dbeb42fe90e2115373fb698a59ccfbb9daa9f2d7968eb513f1aedee4a5bfc3943675b4e2f5b4073e2fdd724f67f6f7eb9b044510a9465692e4a17d86625f760e1d34d0f1f2cad5aad0147ed317920250719cf1dcde344a2b5d93eaada3d614326138b74935b3280391982e0fddac10a31f1d12851b4fbf8924a128eb7357276d24d8808af24", 0xf6, 0xfffffffffffeffff}, {&(0x7f0000000400)="3a9d025cac7d6c330f5c64e5a3d14a3d08ba3fb41a2fe8fd10080416fa8dfe61e37768bc927f7dbff0c7cfb301dfd3fd6a56aa7eface20182627190ec6e54ed6760573e56204d7a2e9a2ac060691af5781433163c0a80fb49bb6d9abec36", 0x5e, 0xb6}, {&(0x7f0000000480)="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", 0xff, 0x2}, {&(0x7f0000000580)="201ac91a16e4a39abf995d15933a60baad2c69fc2184cf6f0c969cbf3b386800ad6d4fa768748a42213963d41b0cf732ea55666389410ce371db07814df8ae4bc90cd50648aea68e4c8e48da442ff2d3cbfcacf3b42b8de632be8289a244c7d8969fad527107c4", 0x67, 0x10001}, {&(0x7f0000000600)="51b5a19a22afefcf6383aae413b5bd3fac9286c0fc59f6d4a3c27ee7cf629c9bf5e5febaf526dff140864e46eaffd2d02fd6318f082839e2ae4dade201d32754685e30efa98a3b139eba1e0f154fc2eb3b165d7665d090a4c6fef1f530ca6f", 0x5f}, {&(0x7f0000000680)="6cb61c55b07cf53bd051929cad884d3af26a085ea6c502e180842a5ec863ef7c7140f281a01c6aeb", 0x28}, {&(0x7f00000006c0)="335fe4dcdba9a4374ddc196582fe4082d37722177e8924e5463c3f8daa96c0a7a07f9d9025bc", 0x26, 0x200}, {&(0x7f0000000700)="1a4dd68f1ac3220680221289e242d7a994ec02b5f32577be5af8e4e4711349d6a88e870a8df63f2f89c8c8b6a74ec798e88efa885fb773da644fe5245eb5fe6ddf44d70505e9805df319025dd5399c34b4b53d5a81", 0x55, 0x43}], 0x8888, &(0x7f0000000840)={[{@metadata_ratio={'metadata_ratio', 0x3d, 0xfff}}, {@enospc_debug='enospc_debug'}, {@fragment_data='fragment=data'}, {@datasum='datasum'}, {@noenospc_debug='noenospc_debug'}, {@fragment_data='fragment=data'}, {@ref_verify='ref_verify'}, {@commit={'commit', 0x3d, 0x5}}, {@discard='discard'}], [{@dont_measure='dont_measure'}, {@smackfsroot={'smackfsroot', 0x3d, 'batadv0\x00'}}]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) munlockall() sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 849.655214] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 849.662509] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 849.669777] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 849.677082] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000009 [ 849.684354] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 849.719896] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:30 executing program 3 (fault-call:7 fault-nth:10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 849.824130] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 849.828741] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 849.848672] FAULT_INJECTION: forcing a failure. [ 849.848672] name failslab, interval 1, probability 0, space 0, times 0 [ 849.881924] CPU: 0 PID: 2226 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 849.889753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.899122] Call Trace: [ 849.901723] dump_stack+0x1b2/0x283 [ 849.905358] should_fail.cold+0x10a/0x154 [ 849.909510] should_failslab+0xd6/0x130 [ 849.913485] __kmalloc+0x2c1/0x400 [ 849.917027] ? tls_push_record+0xfa/0x1270 [ 849.921262] tls_push_record+0xfa/0x1270 [ 849.925319] ? sk_page_frag_refill+0x56/0x1b0 [ 849.929819] tls_sw_sendmsg+0xbb0/0xfd0 [ 849.933803] ? selinux_socket_sendmsg+0x1d8/0x260 [ 849.938645] ? selinux_socket_getpeername+0x260/0x260 [ 849.943841] ? tls_sw_push_pending_record+0x30/0x30 [ 849.948855] ? __fget+0x225/0x360 [ 849.952330] inet_sendmsg+0x11a/0x4e0 [ 849.956129] ? security_socket_sendmsg+0x83/0xb0 [ 849.960893] ? inet_recvmsg+0x4d0/0x4d0 [ 849.964893] sock_sendmsg+0xb5/0x100 [ 849.968626] SyS_sendto+0x1c7/0x2c0 [ 849.972251] ? SyS_getpeername+0x220/0x220 [ 849.976486] ? lock_downgrade+0x740/0x740 [ 849.980641] ? wait_for_completion_io+0x10/0x10 [ 849.985341] ? vfs_write+0x319/0x4d0 [ 849.989058] ? fput+0xb/0x140 [ 849.992183] ? SyS_write+0x14d/0x210 [ 849.995916] ? SyS_read+0x210/0x210 [ 849.999567] ? SyS_clock_settime+0x1a0/0x1a0 [ 850.003977] ? do_syscall_64+0x4c/0x640 [ 850.008242] ? SyS_getpeername+0x220/0x220 [ 850.012482] do_syscall_64+0x1d5/0x640 [ 850.017596] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 850.022786] RIP: 0033:0x45dd99 15:42:31 executing program 3 (fault-call:7 fault-nth:11): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 850.025968] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 850.033697] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 850.040977] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 850.048253] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 850.055519] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000000a [ 850.062782] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f00000000c0)={@my=0x1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0xfffffffc}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$netlink(r5, 0x10e, 0x7, &(0x7f0000000140)=""/218, &(0x7f0000000000)=0xda) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r2, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 850.183374] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 850.200527] FAULT_INJECTION: forcing a failure. [ 850.200527] name failslab, interval 1, probability 0, space 0, times 0 [ 850.232112] CPU: 1 PID: 2237 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 850.239943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.249292] Call Trace: [ 850.251882] dump_stack+0x1b2/0x283 [ 850.255541] should_fail.cold+0x10a/0x154 [ 850.260071] should_failslab+0xd6/0x130 [ 850.264048] __kmalloc+0x6d/0x400 [ 850.267503] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 850.272694] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 850.277717] ? generic_gcmaes_encrypt+0xf4/0x130 [ 850.282471] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 850.287311] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 850.292349] ? __kmalloc+0x3a4/0x400 [ 850.296059] ? tls_push_record+0xfa/0x1270 [ 850.300294] ? cryptd_aead_child+0x9/0x40 [ 850.304458] ? tls_push_record+0x938/0x1270 [ 850.308809] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 850.313568] ? selinux_socket_sendmsg+0x1d8/0x260 [ 850.318411] ? selinux_socket_getpeername+0x260/0x260 [ 850.323613] ? tls_sw_push_pending_record+0x30/0x30 [ 850.328628] ? __fget+0x225/0x360 [ 850.332078] ? inet_sendmsg+0x11a/0x4e0 [ 850.336071] ? security_socket_sendmsg+0x83/0xb0 [ 850.341529] ? inet_recvmsg+0x4d0/0x4d0 [ 850.345503] ? sock_sendmsg+0xb5/0x100 [ 850.349391] ? SyS_sendto+0x1c7/0x2c0 [ 850.353221] ? SyS_getpeername+0x220/0x220 [ 850.357474] ? lock_downgrade+0x740/0x740 [ 850.361629] ? wait_for_completion_io+0x10/0x10 [ 850.366319] ? vfs_write+0x319/0x4d0 [ 850.370030] ? fput+0xb/0x140 [ 850.373132] ? SyS_write+0x14d/0x210 [ 850.376851] ? SyS_read+0x210/0x210 [ 850.380474] ? SyS_clock_settime+0x1a0/0x1a0 [ 850.384878] ? do_syscall_64+0x4c/0x640 [ 850.388847] ? SyS_getpeername+0x220/0x220 [ 850.393088] ? do_syscall_64+0x1d5/0x640 [ 850.397157] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:42:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r3, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000840)={0x28, 0x4, 0x0, {0x2, 0x5}}, 0x28) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000000c0)={r5, 0x1, '!'}, &(0x7f0000000000)=0x3e2) [ 850.526709] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat(r3, &(0x7f0000000140)='./file0\x00', 0x80, 0x1) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000000c0)=0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000180)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 850.664007] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=2242 comm=syz-executor.2 [ 850.696475] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:31 executing program 3 (fault-call:7 fault-nth:12): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 850.830901] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 850.853445] FAULT_INJECTION: forcing a failure. [ 850.853445] name failslab, interval 1, probability 0, space 0, times 0 [ 850.875469] CPU: 0 PID: 2254 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 850.883282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.892633] Call Trace: [ 850.895223] dump_stack+0x1b2/0x283 [ 850.898860] should_fail.cold+0x10a/0x154 [ 850.903017] should_failslab+0xd6/0x130 [ 850.906993] kmem_cache_alloc_node+0x263/0x410 [ 850.918461] __alloc_skb+0x5c/0x510 [ 850.922118] sk_stream_alloc_skb+0xb1/0x760 [ 850.926443] ? tcp_send_mss+0x9f/0x2e0 [ 850.930331] ? ipv6_frag_exit+0x40/0x40 [ 850.934314] do_tcp_sendpages+0x835/0x1750 [ 850.938560] ? sk_stream_alloc_skb+0x760/0x760 [ 850.943150] tls_push_sg+0x1ee/0x760 [ 850.946901] tls_push_record+0xa81/0x1270 [ 850.951092] tls_sw_sendmsg+0xbb0/0xfd0 [ 850.955078] ? selinux_socket_sendmsg+0x1d8/0x260 [ 850.959957] ? selinux_socket_getpeername+0x260/0x260 [ 850.965162] ? tls_sw_push_pending_record+0x30/0x30 [ 850.970180] ? __fget+0x225/0x360 [ 850.973640] inet_sendmsg+0x11a/0x4e0 [ 850.977785] ? security_socket_sendmsg+0x83/0xb0 [ 850.984620] ? inet_recvmsg+0x4d0/0x4d0 [ 850.988618] sock_sendmsg+0xb5/0x100 [ 851.002515] SyS_sendto+0x1c7/0x2c0 [ 851.006315] ? SyS_getpeername+0x220/0x220 [ 851.010573] ? lock_downgrade+0x740/0x740 [ 851.014728] ? wait_for_completion_io+0x10/0x10 [ 851.019395] ? vfs_write+0x319/0x4d0 [ 851.023113] ? fput+0xb/0x140 [ 851.026331] ? SyS_write+0x14d/0x210 [ 851.030039] ? SyS_read+0x210/0x210 [ 851.033663] ? SyS_clock_settime+0x1a0/0x1a0 [ 851.038096] ? do_syscall_64+0x4c/0x640 [ 851.047367] ? SyS_getpeername+0x220/0x220 [ 851.051625] do_syscall_64+0x1d5/0x640 [ 851.055516] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 851.060992] RIP: 0033:0x45dd99 [ 851.064200] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 851.071925] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 851.081279] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 851.088548] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 851.095930] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000000c [ 851.103202] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:32 executing program 3 (fault-call:7 fault-nth:13): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:32 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001300)='/dev/dlm-monitor\x00', 0x0, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) [ 851.219136] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 851.238795] FAULT_INJECTION: forcing a failure. [ 851.238795] name failslab, interval 1, probability 0, space 0, times 0 [ 851.256543] CPU: 0 PID: 2263 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 851.264370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.273718] Call Trace: [ 851.276336] dump_stack+0x1b2/0x283 [ 851.279985] should_fail.cold+0x10a/0x154 [ 851.284156] should_failslab+0xd6/0x130 [ 851.288136] kmem_cache_alloc_node_trace+0x25a/0x400 [ 851.293247] __kmalloc_node_track_caller+0x38/0x70 [ 851.298177] __alloc_skb+0x96/0x510 [ 851.301815] sk_stream_alloc_skb+0xb1/0x760 [ 851.306145] ? tcp_send_mss+0x9f/0x2e0 [ 851.310062] ? ipv6_frag_exit+0x40/0x40 [ 851.314041] do_tcp_sendpages+0x835/0x1750 [ 851.318283] ? sk_stream_alloc_skb+0x760/0x760 [ 851.322874] tls_push_sg+0x1ee/0x760 [ 851.326610] tls_push_record+0xa81/0x1270 [ 851.330765] tls_sw_sendmsg+0xbb0/0xfd0 [ 851.335181] ? selinux_socket_sendmsg+0x1d8/0x260 [ 851.340038] ? selinux_socket_getpeername+0x260/0x260 [ 851.345230] ? tls_sw_push_pending_record+0x30/0x30 [ 851.350246] ? __fget+0x225/0x360 [ 851.353701] inet_sendmsg+0x11a/0x4e0 [ 851.357495] ? security_socket_sendmsg+0x83/0xb0 [ 851.362259] ? inet_recvmsg+0x4d0/0x4d0 [ 851.366231] sock_sendmsg+0xb5/0x100 [ 851.369940] SyS_sendto+0x1c7/0x2c0 [ 851.373559] ? SyS_getpeername+0x220/0x220 [ 851.377790] ? lock_downgrade+0x740/0x740 [ 851.381941] ? wait_for_completion_io+0x10/0x10 [ 851.386623] ? vfs_write+0x319/0x4d0 [ 851.390342] ? fput+0xb/0x140 [ 851.393462] ? SyS_write+0x14d/0x210 [ 851.397219] ? SyS_read+0x210/0x210 [ 851.400856] ? SyS_clock_settime+0x1a0/0x1a0 [ 851.405534] ? do_syscall_64+0x4c/0x640 [ 851.409523] ? SyS_getpeername+0x220/0x220 [ 851.413757] do_syscall_64+0x1d5/0x640 [ 851.417651] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 851.422864] RIP: 0033:0x45dd99 [ 851.426078] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 851.433808] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 851.441110] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 851.448383] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 851.455827] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000000d [ 851.463894] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r3, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000840)={0x28, 0x4, 0x0, {0x2, 0x5}}, 0x28) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "d8d3b426d6604530", "41aae2ee48dc58f1e953e17572b57e8d6d2ffd50c90f2d9f4009634714286223", "d06723e2", "52a0717c4333ae39"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x559}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)={r2, 0xc1, "4d7c5f9a43d7baca344c3bb37d21ce4bcad678b7021b2daff435199873bd4e987f6bd02c2eea3fdf2d5e1bcefa7b3bd3896e278fce26b181175492591ddeeef3b9373714eaa592babaea036aeb3db19b4551b19e7d31ec781a08093612f070cf2e2d8916f2166b0b5b9e5598fc3459fd4a61d551fec195d374367ddb7f256cca21021e2eb3b28d793fd78a62b6c2eb3affdf9866dfebc32b29e4c8973be7b46c54dd48c8b17c58e2e8ee08ec5fcbbb304f6b5892d1cb8f6c5b444bd9f60c456822"}, &(0x7f0000000240)=0xc9) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$inet6(r4, &(0x7f00000002c0)="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", 0x1000, 0x40, &(0x7f00000012c0)={0xa, 0x4e22, 0x1ff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, 0x1c) [ 851.524731] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:32 executing program 3 (fault-call:7 fault-nth:14): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 851.590304] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 851.669825] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=2269 comm=syz-executor.2 [ 851.685868] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 851.704736] FAULT_INJECTION: forcing a failure. [ 851.704736] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 851.732141] CPU: 1 PID: 2277 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 851.739981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.749489] Call Trace: [ 851.752094] dump_stack+0x1b2/0x283 [ 851.755732] should_fail.cold+0x10a/0x154 [ 851.759886] __alloc_pages_nodemask+0x22c/0x2720 [ 851.764645] ? kasan_slab_free+0xc3/0x1a0 [ 851.768796] ? tls_push_record+0xc3b/0x1270 [ 851.773144] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 851.777327] ? inet_sendmsg+0x11a/0x4e0 [ 851.781329] ? do_syscall_64+0x1d5/0x640 [ 851.785395] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 851.790759] ? tcp_tx_timestamp+0x17/0x250 [ 851.795021] ? debug_check_no_obj_freed+0x2c0/0x674 [ 851.800084] ? lock_acquire+0x170/0x3f0 [ 851.804069] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 851.808920] ? debug_check_no_obj_freed+0x2c0/0x674 [ 851.813951] alloc_pages_current+0x155/0x260 [ 851.818361] ? tls_push_record+0xc3b/0x1270 [ 851.822692] skb_page_frag_refill+0x1bf/0x490 [ 851.827222] sk_page_frag_refill+0x4a/0x1b0 [ 851.831550] alloc_sg+0x13e/0x730 [ 851.835041] tls_sw_sendmsg+0x49a/0xfd0 [ 851.839031] ? selinux_socket_sendmsg+0x1d8/0x260 [ 851.843902] ? selinux_socket_getpeername+0x260/0x260 [ 851.849098] ? tls_sw_push_pending_record+0x30/0x30 [ 851.854145] ? __fget+0x225/0x360 [ 851.857618] inet_sendmsg+0x11a/0x4e0 [ 851.861416] ? security_socket_sendmsg+0x83/0xb0 [ 851.866261] ? inet_recvmsg+0x4d0/0x4d0 [ 851.870240] sock_sendmsg+0xb5/0x100 [ 851.873956] SyS_sendto+0x1c7/0x2c0 [ 851.877582] ? SyS_getpeername+0x220/0x220 [ 851.881821] ? lock_downgrade+0x740/0x740 [ 851.885994] ? wait_for_completion_io+0x10/0x10 [ 851.890788] ? vfs_write+0x319/0x4d0 [ 851.894532] ? fput+0xb/0x140 [ 851.897638] ? SyS_write+0x14d/0x210 [ 851.901522] ? SyS_read+0x210/0x210 [ 851.905154] ? SyS_clock_settime+0x1a0/0x1a0 [ 851.909565] ? do_syscall_64+0x4c/0x640 [ 851.913538] ? SyS_getpeername+0x220/0x220 [ 851.917785] do_syscall_64+0x1d5/0x640 [ 851.921680] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 851.926867] RIP: 0033:0x45dd99 [ 851.930080] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 851.937791] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 851.945090] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 851.952364] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 851.959722] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000000e [ 851.966996] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:33 executing program 3 (fault-call:7 fault-nth:15): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r3, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) socket$inet6_sctp(0xa, 0x10000000005, 0x84) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000840)={0x28, 0x4, 0x0, {0x2, 0x5}}, 0x28) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 852.388882] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 852.477117] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 852.489477] FAULT_INJECTION: forcing a failure. [ 852.489477] name failslab, interval 1, probability 0, space 0, times 0 [ 852.513394] CPU: 1 PID: 2289 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 852.521367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.530727] Call Trace: [ 852.533322] dump_stack+0x1b2/0x283 [ 852.536961] should_fail.cold+0x10a/0x154 [ 852.541117] should_failslab+0xd6/0x130 [ 852.545094] __kmalloc+0x2c1/0x400 [ 852.548634] ? tls_push_record+0xfa/0x1270 [ 852.552872] tls_push_record+0xfa/0x1270 [ 852.556938] ? sk_page_frag_refill+0x56/0x1b0 [ 852.561468] tls_sw_sendmsg+0xbb0/0xfd0 [ 852.565450] ? selinux_socket_sendmsg+0x1d8/0x260 [ 852.570296] ? selinux_socket_getpeername+0x260/0x260 [ 852.575494] ? tls_sw_push_pending_record+0x30/0x30 [ 852.580513] ? __fget+0x225/0x360 [ 852.583971] inet_sendmsg+0x11a/0x4e0 [ 852.587770] ? security_socket_sendmsg+0x83/0xb0 [ 852.592962] ? inet_recvmsg+0x4d0/0x4d0 [ 852.596966] sock_sendmsg+0xb5/0x100 [ 852.601640] SyS_sendto+0x1c7/0x2c0 [ 852.605268] ? SyS_getpeername+0x220/0x220 [ 852.609508] ? lock_downgrade+0x740/0x740 [ 852.613666] ? wait_for_completion_io+0x10/0x10 [ 852.618334] ? vfs_write+0x319/0x4d0 [ 852.622049] ? fput+0xb/0x140 [ 852.625156] ? SyS_write+0x14d/0x210 [ 852.628870] ? SyS_read+0x210/0x210 [ 852.632497] ? SyS_clock_settime+0x1a0/0x1a0 [ 852.636922] ? do_syscall_64+0x4c/0x640 [ 852.640894] ? SyS_getpeername+0x220/0x220 [ 852.645131] do_syscall_64+0x1d5/0x640 [ 852.649028] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 852.655696] RIP: 0033:0x45dd99 [ 852.659485] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 852.667188] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 852.674452] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 852.681719] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 852.688993] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000000f [ 852.696260] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 852.774878] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=2288 comm=syz-executor.2 15:42:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "2c2178c32c65f99e", "7629f3203515b94e4048c68203ef43d8", "4d2c95b3", "41f706547aece1ba"}, 0x1f) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r3, 0x0) setgroups(0x2, &(0x7f0000000080)=[r3, r3]) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r4, 0x0, 0x0) setresgid(r6, r4, 0x0) setgroups(0x2, &(0x7f0000000080)=[r4, r4]) setgroups(0x4, &(0x7f0000000000)=[r3, r4, 0xffffffffffffffff, 0xffffffffffffffff]) 15:42:34 executing program 3 (fault-call:7 fault-nth:16): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 852.971663] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 853.018696] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 853.035959] FAULT_INJECTION: forcing a failure. [ 853.035959] name failslab, interval 1, probability 0, space 0, times 0 [ 853.061804] CPU: 1 PID: 2299 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 853.069638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.078992] Call Trace: [ 853.081585] dump_stack+0x1b2/0x283 [ 853.085218] should_fail.cold+0x10a/0x154 [ 853.089367] should_failslab+0xd6/0x130 [ 853.093341] __kmalloc+0x6d/0x400 [ 853.096800] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 853.101996] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 853.107032] ? generic_gcmaes_encrypt+0xf4/0x130 [ 853.111791] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 853.118035] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 853.123076] ? __kmalloc+0x3a4/0x400 [ 853.126789] ? tls_push_record+0xfa/0x1270 [ 853.131017] ? cryptd_aead_child+0x9/0x40 [ 853.135170] ? tls_push_record+0x938/0x1270 [ 853.139499] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 853.143654] ? selinux_socket_sendmsg+0x1d8/0x260 [ 853.148496] ? selinux_socket_getpeername+0x260/0x260 [ 853.153691] ? tls_sw_push_pending_record+0x30/0x30 [ 853.158708] ? __fget+0x225/0x360 [ 853.162189] ? inet_sendmsg+0x11a/0x4e0 [ 853.166243] ? security_socket_sendmsg+0x83/0xb0 [ 853.170997] ? inet_recvmsg+0x4d0/0x4d0 [ 853.175005] ? sock_sendmsg+0xb5/0x100 [ 853.178889] ? SyS_sendto+0x1c7/0x2c0 [ 853.183316] ? SyS_getpeername+0x220/0x220 [ 853.187559] ? lock_downgrade+0x740/0x740 [ 853.191715] ? wait_for_completion_io+0x10/0x10 [ 853.196387] ? vfs_write+0x319/0x4d0 [ 853.200098] ? fput+0xb/0x140 [ 853.203198] ? SyS_write+0x14d/0x210 [ 853.206936] ? SyS_read+0x210/0x210 [ 853.210559] ? SyS_clock_settime+0x1a0/0x1a0 [ 853.214965] ? do_syscall_64+0x4c/0x640 [ 853.218946] ? SyS_getpeername+0x220/0x220 [ 853.223185] ? do_syscall_64+0x1d5/0x640 [ 853.227252] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:42:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r3, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) socket$inet6_sctp(0xa, 0x10000000005, 0x84) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:34 executing program 3 (fault-call:7 fault-nth:17): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) [ 853.352726] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 853.375135] FAULT_INJECTION: forcing a failure. [ 853.375135] name failslab, interval 1, probability 0, space 0, times 0 [ 853.400035] CPU: 0 PID: 2310 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 853.407877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.417249] Call Trace: [ 853.419838] dump_stack+0x1b2/0x283 [ 853.423505] should_fail.cold+0x10a/0x154 [ 853.427656] should_failslab+0xd6/0x130 [ 853.431631] kmem_cache_alloc_node+0x263/0x410 [ 853.436227] __alloc_skb+0x5c/0x510 [ 853.439858] sk_stream_alloc_skb+0xb1/0x760 [ 853.444216] ? __sk_mem_schedule+0x99/0xd0 [ 853.448467] ? ipv6_frag_exit+0x40/0x40 [ 853.452455] do_tcp_sendpages+0x835/0x1750 [ 853.456724] ? sk_stream_alloc_skb+0x760/0x760 [ 853.461314] tls_push_sg+0x1ee/0x760 [ 853.465043] tls_push_record+0xa81/0x1270 [ 853.470008] tls_sw_sendmsg+0xbb0/0xfd0 [ 853.473991] ? selinux_socket_sendmsg+0x1d8/0x260 [ 853.478836] ? selinux_socket_getpeername+0x260/0x260 [ 853.484031] ? tls_sw_push_pending_record+0x30/0x30 [ 853.489050] ? __fget+0x225/0x360 [ 853.492505] inet_sendmsg+0x11a/0x4e0 [ 853.496311] ? security_socket_sendmsg+0x83/0xb0 [ 853.501069] ? inet_recvmsg+0x4d0/0x4d0 [ 853.505046] sock_sendmsg+0xb5/0x100 [ 853.508756] SyS_sendto+0x1c7/0x2c0 [ 853.512391] ? SyS_getpeername+0x220/0x220 [ 853.516624] ? lock_downgrade+0x740/0x740 [ 853.520777] ? wait_for_completion_io+0x10/0x10 [ 853.525461] ? vfs_write+0x319/0x4d0 [ 853.529174] ? fput+0xb/0x140 [ 853.532275] ? SyS_write+0x14d/0x210 [ 853.535990] ? SyS_read+0x210/0x210 [ 853.539711] ? SyS_clock_settime+0x1a0/0x1a0 [ 853.544121] ? do_syscall_64+0x4c/0x640 [ 853.548099] ? SyS_getpeername+0x220/0x220 [ 853.552334] do_syscall_64+0x1d5/0x640 [ 853.556242] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 853.561445] RIP: 0033:0x45dd99 [ 853.564624] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 853.572329] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 853.579598] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 853.586873] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 853.594325] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000011 [ 853.601596] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:34 executing program 3 (fault-call:7 fault-nth:18): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCPNGETOBJECT(0xffffffffffffffff, 0x89e0, &(0x7f00000000c0)=0x3a) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r6, 0x0, 0x41, &(0x7f0000000100)={'raw\x00', 0x18, "f9bc5472c6e5bc10eee842515bfc49d68570c89a29600cc0"}, &(0x7f0000000140)=0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x1000) prctl$PR_GET_KEEPCAPS(0x7) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, &(0x7f0000000000)={0x3b, 0x12, 0x1, 0x80, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={[], [], @loopback}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, @private0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, @remote, @dev={0xfe, 0x80, [], 0x1f}]}, 0x98) [ 853.733982] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 853.751665] FAULT_INJECTION: forcing a failure. [ 853.751665] name failslab, interval 1, probability 0, space 0, times 0 [ 853.778555] CPU: 0 PID: 2323 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 853.786376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.795725] Call Trace: [ 853.798327] dump_stack+0x1b2/0x283 [ 853.801955] should_fail.cold+0x10a/0x154 [ 853.806111] should_failslab+0xd6/0x130 [ 853.810081] kmem_cache_alloc_node_trace+0x25a/0x400 [ 853.815212] __kmalloc_node_track_caller+0x38/0x70 [ 853.820138] __alloc_skb+0x96/0x510 [ 853.823804] sk_stream_alloc_skb+0xb1/0x760 [ 853.828123] ? __sk_mem_schedule+0x99/0xd0 [ 853.832349] ? ipv6_frag_exit+0x40/0x40 [ 853.836340] do_tcp_sendpages+0x835/0x1750 [ 853.840583] ? sk_stream_alloc_skb+0x760/0x760 [ 853.845361] tls_push_sg+0x1ee/0x760 [ 853.849078] tls_push_record+0xa81/0x1270 [ 853.853234] tls_sw_sendmsg+0xbb0/0xfd0 [ 853.857243] ? selinux_socket_sendmsg+0x1d8/0x260 [ 853.862083] ? selinux_socket_getpeername+0x260/0x260 [ 853.867275] ? tls_sw_push_pending_record+0x30/0x30 [ 853.872292] ? __fget+0x225/0x360 [ 853.875762] inet_sendmsg+0x11a/0x4e0 [ 853.879557] ? security_socket_sendmsg+0x83/0xb0 [ 853.884307] ? inet_recvmsg+0x4d0/0x4d0 [ 853.888299] sock_sendmsg+0xb5/0x100 [ 853.892030] SyS_sendto+0x1c7/0x2c0 [ 853.895655] ? SyS_getpeername+0x220/0x220 [ 853.899893] ? lock_downgrade+0x740/0x740 [ 853.904138] ? wait_for_completion_io+0x10/0x10 [ 853.910285] ? vfs_write+0x319/0x4d0 [ 853.914171] ? fput+0xb/0x140 [ 853.917276] ? SyS_write+0x14d/0x210 [ 853.920990] ? SyS_read+0x210/0x210 [ 853.924631] ? SyS_clock_settime+0x1a0/0x1a0 [ 853.929036] ? do_syscall_64+0x4c/0x640 [ 853.933022] ? SyS_getpeername+0x220/0x220 [ 853.937279] do_syscall_64+0x1d5/0x640 [ 853.941170] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 853.946374] RIP: 0033:0x45dd99 [ 853.949557] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 853.957339] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 853.964778] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 853.972151] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 15:42:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 853.979415] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000012 [ 853.986680] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f0000000000)={0x6, 'veth0_to_team\x00', {}, 0x9}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:35 executing program 3 (fault-call:7 fault-nth:19): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 854.103174] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r3, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 854.208774] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 854.240394] FAULT_INJECTION: forcing a failure. [ 854.240394] name failslab, interval 1, probability 0, space 0, times 0 [ 854.280817] CPU: 0 PID: 2336 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 854.288642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.298108] Call Trace: [ 854.300707] dump_stack+0x1b2/0x283 [ 854.304876] should_fail.cold+0x10a/0x154 [ 854.309053] should_failslab+0xd6/0x130 [ 854.313035] __kmalloc+0x2c1/0x400 [ 854.316574] ? tls_push_record+0xfa/0x1270 [ 854.320810] tls_push_record+0xfa/0x1270 [ 854.324902] ? sk_page_frag_refill+0x56/0x1b0 [ 854.329505] tls_sw_sendmsg+0xbb0/0xfd0 [ 854.333596] ? selinux_socket_sendmsg+0x1d8/0x260 [ 854.338437] ? selinux_socket_getpeername+0x260/0x260 [ 854.343632] ? tls_sw_push_pending_record+0x30/0x30 [ 854.348649] ? __fget+0x225/0x360 [ 854.352104] inet_sendmsg+0x11a/0x4e0 [ 854.355900] ? security_socket_sendmsg+0x83/0xb0 [ 854.360738] ? inet_recvmsg+0x4d0/0x4d0 [ 854.364715] sock_sendmsg+0xb5/0x100 [ 854.368516] SyS_sendto+0x1c7/0x2c0 [ 854.372147] ? SyS_getpeername+0x220/0x220 [ 854.376403] ? lock_downgrade+0x740/0x740 [ 854.380561] ? wait_for_completion_io+0x10/0x10 [ 854.385256] ? vfs_write+0x319/0x4d0 [ 854.388967] ? fput+0xb/0x140 [ 854.392072] ? SyS_write+0x14d/0x210 [ 854.395782] ? SyS_read+0x210/0x210 [ 854.399406] ? SyS_clock_settime+0x1a0/0x1a0 [ 854.403833] ? do_syscall_64+0x4c/0x640 [ 854.407805] ? SyS_getpeername+0x220/0x220 [ 854.412045] do_syscall_64+0x1d5/0x640 [ 854.415941] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 854.421153] RIP: 0033:0x45dd99 [ 854.424339] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 854.432046] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 854.439323] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 854.448252] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 854.455540] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000013 [ 854.462917] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:35 executing program 3 (fault-call:7 fault-nth:20): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 854.586426] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 854.600806] FAULT_INJECTION: forcing a failure. [ 854.600806] name failslab, interval 1, probability 0, space 0, times 0 [ 854.630138] CPU: 1 PID: 2346 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 854.637960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.647314] Call Trace: [ 854.650254] dump_stack+0x1b2/0x283 [ 854.653885] should_fail.cold+0x10a/0x154 [ 854.658062] should_failslab+0xd6/0x130 [ 854.662034] __kmalloc+0x6d/0x400 [ 854.665571] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 854.671459] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 854.676478] ? generic_gcmaes_encrypt+0xf4/0x130 [ 854.681257] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 854.686122] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 854.691158] ? __kmalloc+0x3a4/0x400 [ 854.694871] ? tls_push_record+0xfa/0x1270 [ 854.699715] ? cryptd_aead_child+0x9/0x40 [ 854.703867] ? tls_push_record+0x938/0x1270 [ 854.708199] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 854.712355] ? selinux_socket_sendmsg+0x1d8/0x260 [ 854.717195] ? selinux_socket_getpeername+0x260/0x260 [ 854.722411] ? tls_sw_push_pending_record+0x30/0x30 [ 854.727427] ? __fget+0x225/0x360 [ 854.730905] ? inet_sendmsg+0x11a/0x4e0 [ 854.734924] ? security_socket_sendmsg+0x83/0xb0 [ 854.739759] ? inet_recvmsg+0x4d0/0x4d0 [ 854.743728] ? sock_sendmsg+0xb5/0x100 [ 854.747606] ? SyS_sendto+0x1c7/0x2c0 [ 854.751399] ? SyS_getpeername+0x220/0x220 [ 854.755630] ? lock_downgrade+0x740/0x740 [ 854.759784] ? wait_for_completion_io+0x10/0x10 [ 854.764497] ? vfs_write+0x319/0x4d0 [ 854.768275] ? fput+0xb/0x140 [ 854.771375] ? SyS_write+0x14d/0x210 [ 854.775174] ? SyS_read+0x210/0x210 [ 854.778800] ? SyS_clock_settime+0x1a0/0x1a0 [ 854.783206] ? do_syscall_64+0x4c/0x640 [ 854.787180] ? SyS_getpeername+0x220/0x220 [ 854.791416] ? do_syscall_64+0x1d5/0x640 [ 854.795484] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 854.903623] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r3, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:36 executing program 3 (fault-call:7 fault-nth:21): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 855.091937] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 855.153606] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 855.168929] FAULT_INJECTION: forcing a failure. [ 855.168929] name failslab, interval 1, probability 0, space 0, times 0 [ 855.192914] CPU: 1 PID: 2359 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 855.200741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.210096] Call Trace: [ 855.212695] dump_stack+0x1b2/0x283 [ 855.216345] should_fail.cold+0x10a/0x154 [ 855.220497] should_failslab+0xd6/0x130 [ 855.224473] kmem_cache_alloc_node+0x263/0x410 [ 855.229059] __alloc_skb+0x5c/0x510 [ 855.232686] sk_stream_alloc_skb+0xb1/0x760 [ 855.237004] ? __sk_mem_schedule+0x99/0xd0 [ 855.241232] ? ipv6_frag_exit+0x40/0x40 [ 855.245202] do_tcp_sendpages+0x835/0x1750 [ 855.249448] ? sk_stream_alloc_skb+0x760/0x760 [ 855.254042] tls_push_sg+0x1ee/0x760 [ 855.257761] tls_push_record+0xa81/0x1270 [ 855.261919] tls_sw_sendmsg+0xbb0/0xfd0 [ 855.265901] ? selinux_socket_sendmsg+0x1d8/0x260 [ 855.270744] ? selinux_socket_getpeername+0x260/0x260 [ 855.275939] ? tls_sw_push_pending_record+0x30/0x30 [ 855.280959] ? __fget+0x225/0x360 [ 855.284413] inet_sendmsg+0x11a/0x4e0 [ 855.288217] ? security_socket_sendmsg+0x83/0xb0 [ 855.292980] ? inet_recvmsg+0x4d0/0x4d0 [ 855.297073] sock_sendmsg+0xb5/0x100 [ 855.300786] SyS_sendto+0x1c7/0x2c0 [ 855.304411] ? SyS_getpeername+0x220/0x220 [ 855.308648] ? lock_downgrade+0x740/0x740 [ 855.312807] ? wait_for_completion_io+0x10/0x10 [ 855.318459] ? vfs_write+0x319/0x4d0 [ 855.322169] ? fput+0xb/0x140 [ 855.325269] ? SyS_write+0x14d/0x210 [ 855.328980] ? SyS_read+0x210/0x210 [ 855.332607] ? SyS_clock_settime+0x1a0/0x1a0 [ 855.337019] ? do_syscall_64+0x4c/0x640 [ 855.340997] ? SyS_getpeername+0x220/0x220 [ 855.345233] do_syscall_64+0x1d5/0x640 [ 855.349131] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 855.354324] RIP: 0033:0x45dd99 [ 855.357508] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 855.365233] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 855.372498] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 855.379762] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 855.387034] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000015 [ 855.394323] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:36 executing program 3 (fault-call:7 fault-nth:22): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 855.797267] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 855.814457] FAULT_INJECTION: forcing a failure. [ 855.814457] name failslab, interval 1, probability 0, space 0, times 0 [ 855.849652] CPU: 1 PID: 2364 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 855.857478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.867700] Call Trace: [ 855.870464] dump_stack+0x1b2/0x283 [ 855.874102] should_fail.cold+0x10a/0x154 [ 855.878254] should_failslab+0xd6/0x130 [ 855.882412] kmem_cache_alloc_node_trace+0x25a/0x400 [ 855.887517] __kmalloc_node_track_caller+0x38/0x70 [ 855.891242] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 855.892530] __alloc_skb+0x96/0x510 [ 855.892545] sk_stream_alloc_skb+0xb1/0x760 [ 855.892555] ? __sk_mem_schedule+0x99/0xd0 [ 855.892567] ? ipv6_frag_exit+0x40/0x40 [ 855.919077] do_tcp_sendpages+0x835/0x1750 [ 855.923321] ? sk_stream_alloc_skb+0x760/0x760 [ 855.927909] tls_push_sg+0x1ee/0x760 [ 855.931631] tls_push_record+0xa81/0x1270 [ 855.935900] tls_sw_sendmsg+0xbb0/0xfd0 [ 855.939914] ? selinux_socket_sendmsg+0x1d8/0x260 [ 855.944778] ? selinux_socket_getpeername+0x260/0x260 [ 855.955017] ? tls_sw_push_pending_record+0x30/0x30 [ 855.960048] ? __fget+0x225/0x360 [ 855.963529] inet_sendmsg+0x11a/0x4e0 [ 855.967327] ? security_socket_sendmsg+0x83/0xb0 [ 855.972110] ? inet_recvmsg+0x4d0/0x4d0 [ 855.976081] sock_sendmsg+0xb5/0x100 [ 855.979792] SyS_sendto+0x1c7/0x2c0 [ 855.983560] ? SyS_getpeername+0x220/0x220 [ 855.988632] ? lock_downgrade+0x740/0x740 [ 855.992785] ? wait_for_completion_io+0x10/0x10 [ 855.997453] ? vfs_write+0x319/0x4d0 [ 856.001173] ? fput+0xb/0x140 [ 856.004273] ? SyS_write+0x14d/0x210 [ 856.008004] ? SyS_read+0x210/0x210 [ 856.011635] ? do_syscall_64+0x4c/0x640 [ 856.015607] ? SyS_getpeername+0x220/0x220 [ 856.019838] do_syscall_64+0x1d5/0x640 [ 856.023725] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 856.029083] RIP: 0033:0x45dd99 [ 856.032266] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 856.039993] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 856.047269] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 856.054535] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 856.061797] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000016 [ 856.069061] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000000)={r1, 0x3}) 15:42:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r3, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 856.148719] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0xa0000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400202) prctl$PR_GET_KEEPCAPS(0x7) 15:42:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000140)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000800}, 0x800) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)={0x2, 'veth0_vlan\x00', {0x2}, 0x2}) 15:42:37 executing program 3 (fault-call:7 fault-nth:23): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 856.319558] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 856.343770] FAULT_INJECTION: forcing a failure. [ 856.343770] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 856.360553] CPU: 1 PID: 2384 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 856.368368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.377720] Call Trace: [ 856.380310] dump_stack+0x1b2/0x283 [ 856.383941] should_fail.cold+0x10a/0x154 [ 856.389134] __alloc_pages_nodemask+0x22c/0x2720 [ 856.393891] ? kasan_slab_free+0xc3/0x1a0 [ 856.398040] ? tls_push_record+0xc3b/0x1270 [ 856.402366] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 856.406514] ? inet_sendmsg+0x11a/0x4e0 [ 856.410489] ? do_syscall_64+0x1d5/0x640 [ 856.414546] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 856.419930] ? tcp_tx_timestamp+0x17/0x250 [ 856.424188] ? debug_check_no_obj_freed+0x2c0/0x674 [ 856.429205] ? lock_acquire+0x170/0x3f0 [ 856.433189] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 856.438301] ? debug_check_no_obj_freed+0x2c0/0x674 [ 856.443332] alloc_pages_current+0x155/0x260 [ 856.447746] ? tls_push_record+0xc3b/0x1270 [ 856.452094] skb_page_frag_refill+0x1bf/0x490 [ 856.456599] sk_page_frag_refill+0x4a/0x1b0 [ 856.461460] alloc_sg+0x13e/0x730 [ 856.464919] tls_sw_sendmsg+0x49a/0xfd0 [ 856.468988] ? selinux_socket_sendmsg+0x1d8/0x260 [ 856.474003] ? selinux_socket_getpeername+0x260/0x260 [ 856.479370] ? tls_sw_push_pending_record+0x30/0x30 [ 856.484412] ? __fget+0x225/0x360 [ 856.488134] inet_sendmsg+0x11a/0x4e0 [ 856.491934] ? security_socket_sendmsg+0x83/0xb0 [ 856.496777] ? inet_recvmsg+0x4d0/0x4d0 [ 856.500753] sock_sendmsg+0xb5/0x100 [ 856.504496] SyS_sendto+0x1c7/0x2c0 [ 856.508129] ? SyS_getpeername+0x220/0x220 [ 856.512375] ? lock_downgrade+0x740/0x740 [ 856.516530] ? wait_for_completion_io+0x10/0x10 [ 856.521199] ? vfs_write+0x319/0x4d0 [ 856.524911] ? fput+0xb/0x140 [ 856.528011] ? SyS_write+0x14d/0x210 [ 856.531750] ? SyS_read+0x210/0x210 [ 856.535384] ? SyS_clock_settime+0x1a0/0x1a0 [ 856.539794] ? do_syscall_64+0x4c/0x640 [ 856.543785] ? SyS_getpeername+0x220/0x220 [ 856.548042] do_syscall_64+0x1d5/0x640 [ 856.551940] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 856.557139] RIP: 0033:0x45dd99 [ 856.562320] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 15:42:37 executing program 3 (fault-call:7 fault-nth:24): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 856.570201] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 856.577467] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 856.584732] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 856.592006] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000017 [ 856.599622] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 856.685710] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 856.698717] FAULT_INJECTION: forcing a failure. [ 856.698717] name failslab, interval 1, probability 0, space 0, times 0 [ 856.711509] CPU: 1 PID: 2392 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 856.719315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.728688] Call Trace: [ 856.731279] dump_stack+0x1b2/0x283 [ 856.734910] should_fail.cold+0x10a/0x154 [ 856.739079] should_failslab+0xd6/0x130 [ 856.743053] __kmalloc+0x2c1/0x400 [ 856.746623] ? tls_push_record+0xfa/0x1270 [ 856.750859] tls_push_record+0xfa/0x1270 [ 856.754946] ? sk_page_frag_refill+0x56/0x1b0 [ 856.759477] tls_sw_sendmsg+0xbb0/0xfd0 [ 856.763468] ? selinux_socket_sendmsg+0x1d8/0x260 [ 856.768313] ? selinux_socket_getpeername+0x260/0x260 [ 856.773509] ? tls_sw_push_pending_record+0x30/0x30 [ 856.778529] ? __fget+0x225/0x360 [ 856.781990] inet_sendmsg+0x11a/0x4e0 [ 856.785793] ? security_socket_sendmsg+0x83/0xb0 [ 856.790565] ? inet_recvmsg+0x4d0/0x4d0 [ 856.794543] sock_sendmsg+0xb5/0x100 [ 856.798294] SyS_sendto+0x1c7/0x2c0 [ 856.801922] ? SyS_getpeername+0x220/0x220 [ 856.806161] ? lock_downgrade+0x740/0x740 [ 856.810315] ? wait_for_completion_io+0x10/0x10 [ 856.814986] ? vfs_write+0x319/0x4d0 [ 856.818721] ? fput+0xb/0x140 [ 856.821827] ? SyS_write+0x14d/0x210 [ 856.825562] ? SyS_read+0x210/0x210 [ 856.829198] ? SyS_clock_settime+0x1a0/0x1a0 [ 856.833607] ? do_syscall_64+0x4c/0x640 [ 856.837576] ? SyS_getpeername+0x220/0x220 [ 856.841814] do_syscall_64+0x1d5/0x640 [ 856.845706] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 856.850886] RIP: 0033:0x45dd99 [ 856.854064] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 856.861769] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 856.869039] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 856.876308] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 856.883578] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000018 [ 856.890932] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)) socket$inet_sctp(0x2, 0x1, 0x84) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 856.950319] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x1}) 15:42:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) socketpair(0x0, 0xa, 0x7ff, &(0x7f0000000680)) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 857.093677] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00'}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xffffffffffffffa2, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) socketpair(0x1d, 0x1, 0x367a, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, 0x0, 0x7, 0x201, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x80000001}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0xe3}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xb7}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x4000845) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x1f}, 0x1) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f00000002c0)={{0x3, 0x0, 0x80, {0x2000, 0x4}}, "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", "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"}) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) r1 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:38 executing program 3 (fault-call:7 fault-nth:25): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 857.383714] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 857.402612] FAULT_INJECTION: forcing a failure. [ 857.402612] name failslab, interval 1, probability 0, space 0, times 0 [ 857.448387] CPU: 0 PID: 2422 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 857.456220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.465579] Call Trace: [ 857.468176] dump_stack+0x1b2/0x283 [ 857.471805] should_fail.cold+0x10a/0x154 [ 857.475988] should_failslab+0xd6/0x130 [ 857.479962] __kmalloc+0x6d/0x400 [ 857.483428] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 857.488707] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 857.493727] ? generic_gcmaes_encrypt+0xf4/0x130 [ 857.498480] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 857.503331] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 857.508351] ? __kmalloc+0x3a4/0x400 [ 857.512096] ? tls_push_record+0xfa/0x1270 [ 857.516333] ? cryptd_aead_child+0x9/0x40 [ 857.520486] ? tls_push_record+0x938/0x1270 [ 857.524829] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 857.528990] ? selinux_socket_sendmsg+0x1d8/0x260 [ 857.533839] ? selinux_socket_getpeername+0x260/0x260 [ 857.539043] ? tls_sw_push_pending_record+0x30/0x30 [ 857.544093] ? __fget+0x225/0x360 [ 857.547565] ? inet_sendmsg+0x11a/0x4e0 [ 857.551552] ? security_socket_sendmsg+0x83/0xb0 [ 857.556332] ? inet_recvmsg+0x4d0/0x4d0 [ 857.560315] ? sock_sendmsg+0xb5/0x100 [ 857.564208] ? SyS_sendto+0x1c7/0x2c0 [ 857.568006] ? SyS_getpeername+0x220/0x220 [ 857.572329] ? lock_downgrade+0x740/0x740 [ 857.576485] ? wait_for_completion_io+0x10/0x10 [ 857.581162] ? vfs_write+0x319/0x4d0 [ 857.584872] ? fput+0xb/0x140 [ 857.587974] ? SyS_write+0x14d/0x210 [ 857.591682] ? SyS_read+0x210/0x210 [ 857.595314] ? SyS_clock_settime+0x1a0/0x1a0 [ 857.599720] ? do_syscall_64+0x4c/0x640 [ 857.603690] ? SyS_getpeername+0x220/0x220 [ 857.607926] ? do_syscall_64+0x1d5/0x640 [ 857.611992] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 857.885212] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000340)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x40, 0x100, 0x0, @remote, @ipv4={[], [], @local}, 0x1, 0x8, 0x1, 0x3}}) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000380)={@dev={0xfe, 0x80, [], 0x1a}, r3}, 0x14) 15:42:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) r1 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:39 executing program 3 (fault-call:7 fault-nth:26): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 858.079025] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 858.089947] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 858.104883] FAULT_INJECTION: forcing a failure. [ 858.104883] name failslab, interval 1, probability 0, space 0, times 0 15:42:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) shutdown(0xffffffffffffffff, 0x1) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="01000090720c3f34c433691011caa14100", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)={r7, 0x1, '!'}, &(0x7f0000000000)=0x3e2) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000040)={r7, 0x9, 0x4, 0x401, 0x5, 0x9}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r8, 0x1, '!'}, &(0x7f0000000000)=0x3e2) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000000)={r8, 0x1000, 0x2}, 0x10) [ 858.136646] CPU: 1 PID: 2435 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 858.144479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.153835] Call Trace: [ 858.156432] dump_stack+0x1b2/0x283 [ 858.160070] should_fail.cold+0x10a/0x154 [ 858.164256] should_failslab+0xd6/0x130 [ 858.168596] __kmalloc+0x2c1/0x400 [ 858.172119] ? tls_push_record+0xfa/0x1270 [ 858.176351] tls_push_record+0xfa/0x1270 [ 858.180415] ? sk_page_frag_refill+0x56/0x1b0 [ 858.184940] tls_sw_sendmsg+0xbb0/0xfd0 [ 858.189024] ? selinux_socket_sendmsg+0x1d8/0x260 [ 858.194137] ? selinux_socket_getpeername+0x260/0x260 [ 858.199342] ? tls_sw_push_pending_record+0x30/0x30 [ 858.204628] ? __fget+0x225/0x360 [ 858.208095] inet_sendmsg+0x11a/0x4e0 [ 858.212853] ? security_socket_sendmsg+0x83/0xb0 [ 858.217615] ? inet_recvmsg+0x4d0/0x4d0 [ 858.221596] sock_sendmsg+0xb5/0x100 [ 858.225316] SyS_sendto+0x1c7/0x2c0 [ 858.228948] ? SyS_getpeername+0x220/0x220 [ 858.233200] ? lock_downgrade+0x740/0x740 [ 858.237358] ? wait_for_completion_io+0x10/0x10 [ 858.242029] ? vfs_write+0x319/0x4d0 [ 858.245743] ? fput+0xb/0x140 [ 858.248847] ? SyS_write+0x14d/0x210 [ 858.252561] ? SyS_read+0x210/0x210 [ 858.257146] ? SyS_clock_settime+0x1a0/0x1a0 [ 858.261558] ? do_syscall_64+0x4c/0x640 [ 858.265533] ? SyS_getpeername+0x220/0x220 [ 858.269787] do_syscall_64+0x1d5/0x640 [ 858.273684] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 858.278872] RIP: 0033:0x45dd99 15:42:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) r1 = openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000880)={0x0, 0x2}, &(0x7f00000008c0)=0x8) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 858.282066] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 858.289805] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 858.297082] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 858.304357] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 858.311659] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000001a [ 858.319023] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='squashfs\x00', 0x800000, &(0x7f00000001c0)='+^\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x7, 0x200) ioctl$USBDEVFS_GET_CAPABILITIES(r2, 0x8004551a, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000000)={0x0, 0x4}, 0x8) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) openat$hwrng(0xffffffffffffff9c, 0xffffffffffffffff, 0x404200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:39 executing program 3 (fault-call:7 fault-nth:27): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 858.498454] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 858.517762] FAULT_INJECTION: forcing a failure. [ 858.517762] name failslab, interval 1, probability 0, space 0, times 0 [ 858.549414] CPU: 0 PID: 2455 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 858.557268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.566617] Call Trace: [ 858.569233] dump_stack+0x1b2/0x283 [ 858.572868] should_fail.cold+0x10a/0x154 [ 858.577024] should_failslab+0xd6/0x130 [ 858.580999] __kmalloc+0x6d/0x400 [ 858.584451] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 858.589651] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 858.594672] ? generic_gcmaes_encrypt+0xf4/0x130 [ 858.599428] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 858.604270] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 858.609283] ? __kmalloc+0x3a4/0x400 [ 858.612995] ? tls_push_record+0xfa/0x1270 [ 858.617226] ? cryptd_aead_child+0x9/0x40 [ 858.621376] ? tls_push_record+0x938/0x1270 [ 858.625704] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 858.629857] ? selinux_socket_sendmsg+0x1d8/0x260 [ 858.634699] ? selinux_socket_getpeername+0x260/0x260 [ 858.639893] ? tls_sw_push_pending_record+0x30/0x30 [ 858.644916] ? __fget+0x225/0x360 [ 858.648371] ? inet_sendmsg+0x11a/0x4e0 [ 858.652348] ? security_socket_sendmsg+0x83/0xb0 [ 858.657106] ? inet_recvmsg+0x4d0/0x4d0 [ 858.661083] ? sock_sendmsg+0xb5/0x100 [ 858.664970] ? SyS_sendto+0x1c7/0x2c0 [ 858.668768] ? SyS_getpeername+0x220/0x220 [ 858.673007] ? lock_downgrade+0x740/0x740 [ 858.677167] ? wait_for_completion_io+0x10/0x10 [ 858.681854] ? vfs_write+0x319/0x4d0 [ 858.685569] ? fput+0xb/0x140 [ 858.688694] ? SyS_write+0x14d/0x210 [ 858.692406] ? SyS_read+0x210/0x210 [ 858.696033] ? SyS_clock_settime+0x1a0/0x1a0 15:42:39 executing program 2: socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 858.700446] ? do_syscall_64+0x4c/0x640 [ 858.704428] ? SyS_getpeername+0x220/0x220 [ 858.708661] ? do_syscall_64+0x1d5/0x640 [ 858.712726] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:42:39 executing program 3 (fault-call:7 fault-nth:28): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:39 executing program 2: socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 858.805283] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 858.818092] FAULT_INJECTION: forcing a failure. [ 858.818092] name failslab, interval 1, probability 0, space 0, times 0 [ 858.833010] CPU: 0 PID: 2472 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 858.840823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.850200] Call Trace: [ 858.852789] dump_stack+0x1b2/0x283 [ 858.856421] should_fail.cold+0x10a/0x154 [ 858.860574] should_failslab+0xd6/0x130 [ 858.864555] kmem_cache_alloc_node+0x263/0x410 [ 858.869143] __alloc_skb+0x5c/0x510 [ 858.872777] sk_stream_alloc_skb+0xb1/0x760 [ 858.877097] ? tcp_send_mss+0x9f/0x2e0 [ 858.881000] ? ipv6_frag_exit+0x40/0x40 [ 858.884983] do_tcp_sendpages+0x835/0x1750 [ 858.889230] ? sk_stream_alloc_skb+0x760/0x760 [ 858.893819] tls_push_sg+0x1ee/0x760 [ 858.897537] tls_push_record+0xa81/0x1270 [ 858.901722] tls_sw_sendmsg+0xbb0/0xfd0 [ 858.905703] ? selinux_socket_sendmsg+0x1d8/0x260 [ 858.910547] ? selinux_socket_getpeername+0x260/0x260 [ 858.915740] ? tls_sw_push_pending_record+0x30/0x30 [ 858.920762] ? __fget+0x225/0x360 [ 858.924218] inet_sendmsg+0x11a/0x4e0 [ 858.928013] ? security_socket_sendmsg+0x83/0xb0 [ 858.932764] ? inet_recvmsg+0x4d0/0x4d0 [ 858.936739] sock_sendmsg+0xb5/0x100 [ 858.940452] SyS_sendto+0x1c7/0x2c0 [ 858.944085] ? SyS_getpeername+0x220/0x220 [ 858.948321] ? lock_downgrade+0x740/0x740 [ 858.952481] ? wait_for_completion_io+0x10/0x10 [ 858.957149] ? vfs_write+0x319/0x4d0 [ 858.960861] ? fput+0xb/0x140 [ 858.963965] ? SyS_write+0x14d/0x210 [ 858.967681] ? SyS_read+0x210/0x210 [ 858.971309] ? SyS_clock_settime+0x1a0/0x1a0 [ 858.975717] ? do_syscall_64+0x4c/0x640 [ 858.979687] ? SyS_getpeername+0x220/0x220 [ 858.983919] do_syscall_64+0x1d5/0x640 [ 858.987810] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 858.992996] RIP: 0033:0x45dd99 [ 858.996180] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 859.003885] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 859.011150] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 859.018504] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 859.025780] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000001c [ 859.033050] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 859.050905] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f00000002c0)=""/4096, &(0x7f0000000000)=0x1000) 15:42:40 executing program 2: socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:40 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 859.169921] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000000), 0x401, 0x4) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_KEEPCAPS(0x7) 15:42:40 executing program 3 (fault-call:7 fault-nth:29): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:40 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000000c0)=0x5, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 859.843138] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 859.859333] FAULT_INJECTION: forcing a failure. [ 859.859333] name failslab, interval 1, probability 0, space 0, times 0 15:42:40 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 859.893396] CPU: 1 PID: 2503 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 859.901238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.910591] Call Trace: [ 859.913191] dump_stack+0x1b2/0x283 [ 859.916848] should_fail.cold+0x10a/0x154 [ 859.921007] should_failslab+0xd6/0x130 [ 859.924989] kmem_cache_alloc_node_trace+0x25a/0x400 [ 859.930098] __kmalloc_node_track_caller+0x38/0x70 [ 859.935030] __alloc_skb+0x96/0x510 [ 859.938655] sk_stream_alloc_skb+0xb1/0x760 [ 859.942976] ? tcp_send_mss+0x9f/0x2e0 [ 859.946860] ? ipv6_frag_exit+0x40/0x40 [ 859.950834] do_tcp_sendpages+0x835/0x1750 [ 859.955102] ? sk_stream_alloc_skb+0x760/0x760 [ 859.955346] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 859.959689] tls_push_sg+0x1ee/0x760 [ 859.959708] tls_push_record+0xa81/0x1270 [ 859.959728] tls_sw_sendmsg+0xbb0/0xfd0 [ 859.981847] ? selinux_socket_sendmsg+0x1d8/0x260 [ 859.986693] ? selinux_socket_getpeername+0x260/0x260 [ 859.991892] ? tls_sw_push_pending_record+0x30/0x30 [ 859.996924] ? __fget+0x225/0x360 [ 860.000382] inet_sendmsg+0x11a/0x4e0 [ 860.004180] ? security_socket_sendmsg+0x83/0xb0 [ 860.008934] ? inet_recvmsg+0x4d0/0x4d0 [ 860.012911] sock_sendmsg+0xb5/0x100 [ 860.016623] SyS_sendto+0x1c7/0x2c0 [ 860.020248] ? SyS_getpeername+0x220/0x220 [ 860.024484] ? lock_downgrade+0x740/0x740 [ 860.028641] ? wait_for_completion_io+0x10/0x10 [ 860.033305] ? vfs_write+0x319/0x4d0 [ 860.037011] ? fput+0xb/0x140 [ 860.040111] ? SyS_write+0x14d/0x210 15:42:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "7f09d2630645a972", "55f03ee93687907eaaf69bfd14b9612a62e9e602a50b31cb1740bfb46b8b5fec", "d47ebc00", "d5e6f31b8b780318"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 860.043819] ? SyS_read+0x210/0x210 [ 860.047453] ? SyS_clock_settime+0x1a0/0x1a0 [ 860.051860] ? do_syscall_64+0x4c/0x640 [ 860.055832] ? SyS_getpeername+0x220/0x220 [ 860.060088] do_syscall_64+0x1d5/0x640 [ 860.063982] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 860.069169] RIP: 0033:0x45dd99 [ 860.072352] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 860.080060] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 15:42:41 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 860.084227] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 860.087324] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 860.087330] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 860.087335] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000001d [ 860.087341] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:41 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:41 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:41 executing program 0 (fault-call:0 fault-nth:0): openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) 15:42:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:41 executing program 3 (fault-call:7 fault-nth:30): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 860.584052] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 860.598000] FAULT_INJECTION: forcing a failure. [ 860.598000] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 860.623413] CPU: 0 PID: 2548 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 860.631244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.640606] Call Trace: [ 860.643201] dump_stack+0x1b2/0x283 [ 860.646856] should_fail.cold+0x10a/0x154 [ 860.651006] __alloc_pages_nodemask+0x22c/0x2720 [ 860.655759] ? kasan_slab_free+0xc3/0x1a0 [ 860.659904] ? tls_push_record+0xc3b/0x1270 [ 860.664220] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 860.668363] ? inet_sendmsg+0x11a/0x4e0 [ 860.672339] ? do_syscall_64+0x1d5/0x640 [ 860.676398] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 860.681759] ? tcp_tx_timestamp+0x17/0x250 [ 860.685992] ? debug_check_no_obj_freed+0x2c0/0x674 [ 860.691876] ? lock_acquire+0x170/0x3f0 [ 860.695853] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 860.700724] ? debug_check_no_obj_freed+0x2c0/0x674 [ 860.705751] alloc_pages_current+0x155/0x260 [ 860.710205] ? tls_push_record+0xc3b/0x1270 [ 860.714528] skb_page_frag_refill+0x1bf/0x490 [ 860.719026] sk_page_frag_refill+0x4a/0x1b0 [ 860.723349] alloc_sg+0x13e/0x730 [ 860.726805] tls_sw_sendmsg+0x49a/0xfd0 [ 860.730782] ? selinux_socket_sendmsg+0x1d8/0x260 [ 860.735620] ? selinux_socket_getpeername+0x260/0x260 [ 860.740828] ? tls_sw_push_pending_record+0x30/0x30 [ 860.745932] ? __fget+0x225/0x360 [ 860.749386] inet_sendmsg+0x11a/0x4e0 [ 860.753189] ? security_socket_sendmsg+0x83/0xb0 [ 860.757943] ? inet_recvmsg+0x4d0/0x4d0 [ 860.761918] sock_sendmsg+0xb5/0x100 [ 860.765628] SyS_sendto+0x1c7/0x2c0 [ 860.769251] ? SyS_getpeername+0x220/0x220 [ 860.773491] ? lock_downgrade+0x740/0x740 [ 860.777664] ? wait_for_completion_io+0x10/0x10 [ 860.782332] ? vfs_write+0x319/0x4d0 [ 860.786066] ? fput+0xb/0x140 [ 860.789171] ? SyS_write+0x14d/0x210 [ 860.792881] ? SyS_read+0x210/0x210 [ 860.796507] ? SyS_clock_settime+0x1a0/0x1a0 [ 860.800915] ? do_syscall_64+0x4c/0x640 [ 860.804908] ? SyS_getpeername+0x220/0x220 [ 860.809143] do_syscall_64+0x1d5/0x640 [ 860.813036] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 860.818220] RIP: 0033:0x45dd99 [ 860.821402] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 15:42:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) [ 860.829110] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 860.836376] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 860.843638] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 860.850902] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000001e [ 860.858166] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0xd0, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1a}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xfff}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}], @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}], @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x3}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2c7}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}], @NL80211_ATTR_OPER_CLASS={0x5, 0xd6, 0x6}, @NL80211_ATTR_OPER_CLASS={0x5}, @NL80211_ATTR_OPER_CLASS={0x5, 0xd6, 0x2}, @NL80211_ATTR_OPER_CLASS={0x5}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x6}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1707}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x171b}]]}, 0xd0}, 0x1, 0x0, 0x0, 0x20080001}, 0x40044) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e02, 0x0, @private0}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$MON_IOCX_GET(r3, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000140)=""/148, 0x94}) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) prctl$PR_GET_FP_MODE(0x2e) ioctl$SOUND_MIXER_WRITE_RECSRC(r3, 0xc0044dff, &(0x7f0000000400)=0x6) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 860.880928] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:42 executing program 3 (fault-call:7 fault-nth:31): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 860.941897] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2562 comm=syz-executor.1 [ 860.973911] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2562 comm=syz-executor.1 15:42:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 861.024713] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 861.061400] FAULT_INJECTION: forcing a failure. [ 861.061400] name failslab, interval 1, probability 0, space 0, times 0 [ 861.124257] CPU: 0 PID: 2569 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 861.132085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.141437] Call Trace: [ 861.144025] dump_stack+0x1b2/0x283 [ 861.147654] should_fail.cold+0x10a/0x154 [ 861.151803] should_failslab+0xd6/0x130 [ 861.155775] kmem_cache_alloc_node+0x263/0x410 [ 861.160359] __alloc_skb+0x5c/0x510 [ 861.163988] sk_stream_alloc_skb+0xb1/0x760 [ 861.168304] ? tcp_send_mss+0x9f/0x2e0 [ 861.172207] ? ipv6_frag_exit+0x40/0x40 [ 861.176186] do_tcp_sendpages+0x835/0x1750 [ 861.180427] ? sk_stream_alloc_skb+0x760/0x760 [ 861.185023] tls_push_sg+0x1ee/0x760 [ 861.188759] tls_push_record+0xa81/0x1270 [ 861.192914] tls_sw_sendmsg+0xbb0/0xfd0 [ 861.196891] ? selinux_socket_sendmsg+0x1d8/0x260 [ 861.201818] ? selinux_socket_getpeername+0x260/0x260 [ 861.207011] ? tls_sw_push_pending_record+0x30/0x30 [ 861.212025] ? __fget+0x225/0x360 [ 861.215477] inet_sendmsg+0x11a/0x4e0 [ 861.219271] ? security_socket_sendmsg+0x83/0xb0 [ 861.224020] ? inet_recvmsg+0x4d0/0x4d0 [ 861.227994] sock_sendmsg+0xb5/0x100 [ 861.231711] SyS_sendto+0x1c7/0x2c0 [ 861.235360] ? SyS_getpeername+0x220/0x220 [ 861.240466] ? lock_downgrade+0x740/0x740 [ 861.244624] ? wait_for_completion_io+0x10/0x10 [ 861.249292] ? vfs_write+0x319/0x4d0 [ 861.253004] ? fput+0xb/0x140 [ 861.256103] ? SyS_write+0x14d/0x210 [ 861.259986] ? SyS_read+0x210/0x210 [ 861.263622] ? SyS_clock_settime+0x1a0/0x1a0 [ 861.268035] ? do_syscall_64+0x4c/0x640 [ 861.272013] ? SyS_getpeername+0x220/0x220 [ 861.276253] do_syscall_64+0x1d5/0x640 [ 861.280146] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 861.285336] RIP: 0033:0x45dd99 [ 861.288519] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 861.296228] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 861.303494] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 861.310767] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 861.318037] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000001f 15:42:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) [ 861.325332] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:42 executing program 3 (fault-call:7 fault-nth:32): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @remote}, 0x1c) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="030000000000000065b86879430a8b13b4d1cbf6d91c0519e2a81e9fbce38b295afe3f9ed115dd255715f7c90f67dcc49fda4e51a1e1705d3e3b7fde53bb4af70d4473ec9d2b32ad9412422bbddfd55476358a2b1a58b8f85e555bd43e84c2b83b46e1369d6077a722b4fa283b9e56d328750b4f989c47190a56a3f912bd8af867450c36d1507897b2f635f84e86d3e95b727c54d231a59592cfb583cd8a7ba6865e00cff9d7395e8e167a0b004c0fbf261bf24978158f72d31f774a025e04f6a126d09bd4530c4b3b1b32cd89"], 0x8, 0x0) r3 = msgget$private(0x0, 0x0) msgsnd(r3, &(0x7f0000000140)=ANY=[@ANYRES16], 0x8, 0x0) msgctl$IPC_INFO(r3, 0x3, &(0x7f0000002880)=""/132) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) bind$phonet(r0, &(0x7f00000000c0)={0x23, 0x0, 0x4, 0xc0}, 0x10) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x0, 0x24000024, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) dup(r4) dup2(r4, 0xffffffffffffffff) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmsg$inet6(r5, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000000200)="cc4d39442135ef65dadf93179f3b0911cebcb49c42ed2f22dd3c24f1ea38de086253719bbfb5045b9ec42039628f88c34c7c1b81a5f354ad41", 0x39}, {&(0x7f00000002c0)="5c4b032ecb9013b76d1a2c93653393642acf332988d0c70ede4aa55b51c4848e7784e84a45d5950b528f9fe1089efb8f530e035bb5c4ebf2fd7800317544ab7bd032e09d87c9ff1d647067a11a58b9bca3e48b723d752d10487d3d83843b9c1afef75176574f285bb4417857ca3ef01f", 0x70}, {&(0x7f0000000240)="5c3031ed347ec5ffe89a5e6f90b6f7cf3315f4027db21ad04f7000c9efafb62ee3376b2ef047344cc4", 0x29}, {&(0x7f0000000340)="0b762ae1fa192376bac4165eefa3e28b1cab47a5c267482fb6039cce8608f5036423f57e25cd6514c42010659e0d3d", 0x2f}, {&(0x7f0000000380)="df62787d34d0af1b4cf16f6b4f42e27e277b9b666d4e98071f3038386f4a2f60248657afb462390d12077e1b24d2e96c1e0be922c666f7c02d67fc53ffc980257883513cd4d212d320c7b4799a1b8f5abce3d47a6b08452c1d62a8f0f160d3e72468ff171c6451fe57712c254878571a7b35d320097459f8432fc56641012b10fd6de316139e12ccc62b0e7c07a2f73de17acb9ddd2d72", 0x97}, {&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000000440)="5db0b984fdd3481ddc5bb8984c0ce774b7e6cba2f9af99335aaeddad0224bfb78739e315895411f3b106c1c76a78cd3405ae8e1416decfa98b236b21f39cafd1ca0376825aba410ef2630a3c6bdbe474957c0a7e703287edea8df68acde161cd0a2789f53550d8e1c3c489fed8c15695dac8f9c30575a00d1fde34f4a79e46d46a54529662c3b08c31d80695cdec5853bda59fb047104419937cefc488970015e948558ab5042c11536064e0d978b2d2e2e78baa15aed9c53af8", 0xba}, {&(0x7f0000000500)="f7f8f7182055f2c60d61bc7d8bc14d66295d1ce56145ab3d2d00cd456b40795ad02e097d8c9ac0278eff563d62daf50e1809d33aaed39e28d98373240a5ae5d306858032111a3a8dafe5a033c9d07f526dc378de150b19ee3dc0f2260c9307a483d442a6746bd58b83", 0x69}, {&(0x7f0000002680)="694400bf4b93d9dcdaf7216d92a2df7576a343cf4e1a73a62955753093ee7a9ee845ade5d8b33d3ff002590c6d18f022932577f9dd2215362b33bddf86d4553e49cfef1064b5ac0f8a9b156cd7082ae0419318036082118233be80f76e348912e4ecb0a455053408802674e81237f36b1745e4cce41de9dae5b6b6d27eb4925c2319feb97876755a6e11f83678535d3a05f0f8c9b4b6efc33534009c30e020c363b8498a9ed3fdd03486914d46808594bef576abf66891a9a117c73ffe73a1cd6aa87e814b4ddcfed6a103949ebda486951f2edcd85d02cdfc09", 0xda}], 0xa}, 0x40001) [ 861.405457] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 861.436182] FAULT_INJECTION: forcing a failure. [ 861.436182] name failslab, interval 1, probability 0, space 0, times 0 [ 861.468857] CPU: 0 PID: 2579 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 861.476706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.486066] Call Trace: [ 861.488663] dump_stack+0x1b2/0x283 [ 861.492301] should_fail.cold+0x10a/0x154 [ 861.496483] should_failslab+0xd6/0x130 [ 861.500461] __kmalloc+0x6d/0x400 [ 861.503938] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 861.509161] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 861.514194] ? generic_gcmaes_encrypt+0xf4/0x130 [ 861.518954] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 861.523803] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 861.529779] ? __kmalloc+0x3a4/0x400 [ 861.533496] ? tls_push_record+0xfa/0x1270 [ 861.537731] ? cryptd_aead_child+0x9/0x40 [ 861.541884] ? tls_push_record+0x938/0x1270 [ 861.546217] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 861.550370] ? selinux_socket_sendmsg+0x1d8/0x260 [ 861.555214] ? selinux_socket_getpeername+0x260/0x260 [ 861.560409] ? tls_sw_push_pending_record+0x30/0x30 [ 861.565428] ? __fget+0x225/0x360 [ 861.568885] ? inet_sendmsg+0x11a/0x4e0 [ 861.572858] ? security_socket_sendmsg+0x83/0xb0 [ 861.577616] ? inet_recvmsg+0x4d0/0x4d0 [ 861.581601] ? sock_sendmsg+0xb5/0x100 [ 861.585488] ? SyS_sendto+0x1c7/0x2c0 [ 861.589285] ? SyS_getpeername+0x220/0x220 [ 861.593551] ? lock_downgrade+0x740/0x740 [ 861.597720] ? wait_for_completion_io+0x10/0x10 [ 861.602399] ? vfs_write+0x319/0x4d0 [ 861.606124] ? fput+0xb/0x140 [ 861.609237] ? SyS_write+0x14d/0x210 [ 861.612955] ? SyS_read+0x210/0x210 [ 861.616591] ? SyS_clock_settime+0x1a0/0x1a0 [ 861.621007] ? do_syscall_64+0x4c/0x640 [ 861.624985] ? SyS_getpeername+0x220/0x220 [ 861.629223] ? do_syscall_64+0x1d5/0x640 [ 861.633311] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 861.684540] FAULT_INJECTION: forcing a failure. [ 861.684540] name failslab, interval 1, probability 0, space 0, times 0 [ 861.696110] CPU: 0 PID: 2588 Comm: syz-executor.0 Not tainted 4.14.198-syzkaller #0 [ 861.703922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.713274] Call Trace: [ 861.715865] dump_stack+0x1b2/0x283 [ 861.719495] should_fail.cold+0x10a/0x154 [ 861.723646] should_failslab+0xd6/0x130 [ 861.727639] kmem_cache_alloc+0x28e/0x3c0 [ 861.731801] getname_flags+0xc8/0x550 [ 861.735602] do_sys_open+0x1ce/0x410 [ 861.739317] ? filp_open+0x60/0x60 [ 861.742856] ? __do_page_fault+0x19a/0xb50 [ 861.747088] ? do_syscall_64+0x4c/0x640 [ 861.751057] ? SyS_open+0x30/0x30 [ 861.754515] do_syscall_64+0x1d5/0x640 [ 861.758421] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 861.763609] RIP: 0033:0x45dd99 [ 861.766794] RSP: 002b:00007f7a84965c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 861.774500] RAX: ffffffffffffffda RBX: 0000000000024440 RCX: 000000000045dd99 [ 861.781812] RDX: 0000000000000000 RSI: 0000000020000840 RDI: ffffffffffffff9c [ 861.789083] RBP: 00007f7a84965ca0 R08: 0000000000000000 R09: 0000000000000000 [ 861.796352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 861.803622] R13: 00007fffab4927af R14: 00007f7a849669c0 R15: 000000000118bf2c 15:42:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) socket$inet6(0xa, 0x4, 0x2) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4004) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x1c}}]}, 0x4c}}, 0x0) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f0000000440)={0x3c, "d714e327982f96789ee0b3d17ca36447d73720664734dee5c87570362553fad353dfd9aa8b49ae3c0c9bde2fa0052d82b3c432f84763f8e22abe489417b445febe6b90c18dcf070cada18adf76161f1359291f1ccf265b7e2f40e4434ef62154880b87f40aa1be5cd148efab452420f8a6c4a96e805a2c1785fb79fb1fb61ceb"}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c00000024001d0f00"/20, @ANYRES32=r5, @ANYBLOB="000000000000ffff000900000800010064727200"], 0x2c}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@empty, @in6=@loopback, 0x4e21, 0xfff, 0x4e23, 0x0, 0x2, 0xa0, 0x80, 0x2f, r5, 0xee01}, {0x4b, 0x100000000, 0x9, 0xff, 0x61e9, 0x0, 0x0, 0x57}, {0x0, 0xdb81, 0x0, 0x2}, 0x3e, 0x6e6bbc, 0x1, 0x0, 0x0, 0x3}, {{@in=@local, 0x4d2, 0x18}, 0xa, @in=@rand_addr=0x64010102, 0x0, 0x4, 0x1, 0x2, 0x8, 0x2, 0x1}}, 0xe8) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) 15:42:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x3, 0x8e, &(0x7f0000000140)="b12dd2614ec7dc176d961a6af09a0fc832dd7a4ca91c73b3384f40322eb109c7c12c0e15c89685ec595f59e84641535bb50d21e844fc490e55b191732d971c9e15affbb74268a18538c80030520d7dec86e1db400d58935652878e31365a560b16ad7bbca45b75efa6545cd255819f64dd5ea6b99f448cb59aff5c53a96aa60088f55046ec6d79891d9b1a21ab3d"}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) dup2(r0, r0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:43 executing program 3 (fault-call:7 fault-nth:33): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000001c0)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r3}}]}, 0x28}}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r5, 0x0) setgroups(0x2, &(0x7f0000000080)=[r5, r5]) fchown(r0, r3, r5) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r6, 0xc0106418, &(0x7f0000000040)={0x6, 0x0, 0xc8, 0x6, 0x4, 0x100000001}) [ 862.546010] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 862.564991] FAULT_INJECTION: forcing a failure. [ 862.564991] name failslab, interval 1, probability 0, space 0, times 0 [ 862.570995] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 862.588458] CPU: 0 PID: 2599 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 862.596286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.605728] Call Trace: [ 862.608322] dump_stack+0x1b2/0x283 [ 862.611958] should_fail.cold+0x10a/0x154 [ 862.616114] should_failslab+0xd6/0x130 [ 862.620109] kmem_cache_alloc_node+0x263/0x410 [ 862.624695] __alloc_skb+0x5c/0x510 [ 862.628324] sk_stream_alloc_skb+0xb1/0x760 [ 862.632648] ? __sk_mem_schedule+0x99/0xd0 [ 862.636885] ? ipv6_frag_exit+0x40/0x40 [ 862.640861] do_tcp_sendpages+0x835/0x1750 [ 862.645126] ? sk_stream_alloc_skb+0x760/0x760 [ 862.649713] tls_push_sg+0x1ee/0x760 [ 862.653435] tls_push_record+0xa81/0x1270 [ 862.657597] tls_sw_sendmsg+0xbb0/0xfd0 [ 862.661576] ? selinux_socket_sendmsg+0x1d8/0x260 [ 862.666426] ? selinux_socket_getpeername+0x260/0x260 [ 862.671632] ? tls_sw_push_pending_record+0x30/0x30 [ 862.676671] ? __fget+0x225/0x360 [ 862.680127] inet_sendmsg+0x11a/0x4e0 [ 862.683926] ? security_socket_sendmsg+0x83/0xb0 [ 862.688680] ? inet_recvmsg+0x4d0/0x4d0 [ 862.692653] sock_sendmsg+0xb5/0x100 15:42:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) [ 862.696362] SyS_sendto+0x1c7/0x2c0 [ 862.699986] ? SyS_getpeername+0x220/0x220 [ 862.704219] ? lock_downgrade+0x740/0x740 [ 862.708375] ? wait_for_completion_io+0x10/0x10 [ 862.713044] ? vfs_write+0x319/0x4d0 [ 862.716773] ? fput+0xb/0x140 [ 862.719871] ? SyS_write+0x14d/0x210 [ 862.723576] ? SyS_read+0x210/0x210 [ 862.727202] ? SyS_clock_settime+0x1a0/0x1a0 [ 862.731612] ? do_syscall_64+0x4c/0x640 [ 862.735585] ? SyS_getpeername+0x220/0x220 [ 862.739818] do_syscall_64+0x1d5/0x640 15:42:43 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 862.743733] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 862.748921] RIP: 0033:0x45dd99 [ 862.752103] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 862.759834] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 862.767102] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 862.774370] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 862.781633] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000021 [ 862.788910] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 862.830979] FAULT_INJECTION: forcing a failure. [ 862.830979] name failslab, interval 1, probability 0, space 0, times 0 [ 862.858610] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 862.872621] CPU: 1 PID: 2617 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 862.880432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.889781] Call Trace: [ 862.892370] dump_stack+0x1b2/0x283 [ 862.895997] should_fail.cold+0x10a/0x154 [ 862.900145] should_failslab+0xd6/0x130 [ 862.904118] kmem_cache_alloc+0x28e/0x3c0 [ 862.908267] __anon_vma_prepare+0x5d/0x4f0 [ 862.912498] ? __lock_acquire+0x5fc/0x3f20 [ 862.916734] do_huge_pmd_anonymous_page+0xd3c/0x1670 [ 862.921838] ? prep_transhuge_page+0xa0/0xa0 [ 862.926250] __handle_mm_fault+0x2ac4/0x4620 [ 862.930662] ? vm_insert_page+0x7c0/0x7c0 [ 862.934815] ? avc_has_perm+0x12e/0x330 [ 862.938801] handle_mm_fault+0x306/0x7a0 [ 862.942890] __do_page_fault+0x578/0xb50 [ 862.946962] ? spurious_fault+0x640/0x640 [ 862.951162] ? do_page_fault+0x60/0x4f2 [ 862.955136] page_fault+0x25/0x50 [ 862.958588] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 862.964462] RSP: 0018:ffff88808b8e7dc8 EFLAGS: 00010206 [ 862.969821] RAX: ffffed101171cfd4 RBX: 0000000000000068 RCX: 0000000000000068 [ 862.977085] RDX: 0000000000000068 RSI: ffff88808b8e7e38 RDI: 0000000020000740 [ 862.984351] RBP: ffff88808b8e7e38 R08: 0000000000000000 R09: ffffed101171cfd3 [ 862.991618] R10: ffff88808b8e7e9f R11: ffff8880a8a58280 R12: 0000000020000740 [ 862.998882] R13: 00007ffffffff000 R14: 00000000200007a8 R15: ffff8880573cad80 [ 863.006169] _copy_to_user+0xaa/0xd0 [ 863.010036] SyS_semctl+0x164/0x220 [ 863.013698] ? SyS_semget+0x170/0x170 [ 863.017532] ? SyS_clock_settime+0x1a0/0x1a0 [ 863.021938] ? do_syscall_64+0x4c/0x640 [ 863.025921] ? SyS_semget+0x170/0x170 [ 863.029727] do_syscall_64+0x1d5/0x640 [ 863.033620] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 863.038806] RIP: 0033:0x45dd99 [ 863.041986] RSP: 002b:00007f717d9f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000042 [ 863.049689] RAX: ffffffffffffffda RBX: 0000000000027cc0 RCX: 000000000045dd99 [ 863.056957] RDX: 0000000000000012 RSI: 0000000000000000 RDI: 0000000000000000 [ 863.064222] RBP: 00007f717d9f8ca0 R08: 0000000000000000 R09: 0000000000000000 [ 863.071490] R10: 0000000020000740 R11: 0000000000000246 R12: 0000000000000000 15:42:44 executing program 3 (fault-call:7 fault-nth:34): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 863.078754] R13: 00007ffd6a633f7f R14: 00007f717d9f99c0 R15: 000000000118bf2c [ 863.107656] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 863.120881] FAULT_INJECTION: forcing a failure. [ 863.120881] name failslab, interval 1, probability 0, space 0, times 0 [ 863.132319] CPU: 1 PID: 2620 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 863.140126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.149478] Call Trace: [ 863.152069] dump_stack+0x1b2/0x283 [ 863.155706] should_fail.cold+0x10a/0x154 [ 863.159864] should_failslab+0xd6/0x130 [ 863.163840] kmem_cache_alloc_node_trace+0x25a/0x400 [ 863.168972] __kmalloc_node_track_caller+0x38/0x70 [ 863.173909] __alloc_skb+0x96/0x510 [ 863.177563] sk_stream_alloc_skb+0xb1/0x760 [ 863.181881] ? __sk_mem_schedule+0x99/0xd0 [ 863.186113] ? ipv6_frag_exit+0x40/0x40 [ 863.190087] do_tcp_sendpages+0x835/0x1750 [ 863.194362] ? sk_stream_alloc_skb+0x760/0x760 [ 863.198960] tls_push_sg+0x1ee/0x760 [ 863.202678] tls_push_record+0xa81/0x1270 [ 863.206837] tls_sw_sendmsg+0xbb0/0xfd0 [ 863.210816] ? selinux_socket_sendmsg+0x1d8/0x260 [ 863.215662] ? selinux_socket_getpeername+0x260/0x260 [ 863.220857] ? tls_sw_push_pending_record+0x30/0x30 [ 863.225873] ? __fget+0x225/0x360 [ 863.229327] inet_sendmsg+0x11a/0x4e0 [ 863.233122] ? security_socket_sendmsg+0x83/0xb0 [ 863.237871] ? inet_recvmsg+0x4d0/0x4d0 [ 863.241841] sock_sendmsg+0xb5/0x100 [ 863.245554] SyS_sendto+0x1c7/0x2c0 [ 863.249179] ? SyS_getpeername+0x220/0x220 [ 863.253411] ? lock_downgrade+0x740/0x740 [ 863.257564] ? wait_for_completion_io+0x10/0x10 [ 863.262232] ? vfs_write+0x319/0x4d0 [ 863.265951] ? fput+0xb/0x140 [ 863.269057] ? SyS_write+0x14d/0x210 [ 863.272790] ? SyS_read+0x210/0x210 [ 863.276416] ? SyS_clock_settime+0x1a0/0x1a0 [ 863.280824] ? do_syscall_64+0x4c/0x640 [ 863.284795] ? SyS_getpeername+0x220/0x220 [ 863.289031] do_syscall_64+0x1d5/0x640 [ 863.292924] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 863.298117] RIP: 0033:0x45dd99 15:42:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_SEQ_RESET(r2, 0x5100) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r4, 0x20, 0x70bd27, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x90, 0x36}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x5c}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x488c1) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x200001, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "68010400"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 863.301297] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 863.308999] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 863.316265] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 863.323536] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 863.330804] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000022 [ 863.338068] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 863.347978] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:44 executing program 3 (fault-call:7 fault-nth:35): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 863.442212] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 863.451296] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 863.468256] audit: type=1326 audit(1601653364.525:89): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=2627 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460bda code=0x0 15:42:44 executing program 2 (fault-call:3 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:44 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x40000, 0x0) [ 863.476836] FAULT_INJECTION: forcing a failure. [ 863.476836] name failslab, interval 1, probability 0, space 0, times 0 [ 863.497903] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 863.559773] CPU: 1 PID: 2632 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 863.567590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.576941] Call Trace: [ 863.579530] dump_stack+0x1b2/0x283 [ 863.583161] should_fail.cold+0x10a/0x154 [ 863.587310] should_failslab+0xd6/0x130 [ 863.591309] __kmalloc+0x2c1/0x400 [ 863.594851] ? tls_push_record+0xfa/0x1270 [ 863.599086] tls_push_record+0xfa/0x1270 [ 863.603146] ? sk_page_frag_refill+0x56/0x1b0 [ 863.607652] tls_sw_sendmsg+0xbb0/0xfd0 [ 863.611633] ? selinux_socket_sendmsg+0x1d8/0x260 [ 863.616499] ? selinux_socket_getpeername+0x260/0x260 [ 863.621699] ? tls_sw_push_pending_record+0x30/0x30 [ 863.626725] ? __fget+0x225/0x360 [ 863.630202] inet_sendmsg+0x11a/0x4e0 [ 863.634008] ? security_socket_sendmsg+0x83/0xb0 [ 863.638782] ? inet_recvmsg+0x4d0/0x4d0 [ 863.642755] sock_sendmsg+0xb5/0x100 [ 863.646467] SyS_sendto+0x1c7/0x2c0 [ 863.650092] ? SyS_getpeername+0x220/0x220 [ 863.654330] ? lock_downgrade+0x740/0x740 [ 863.658488] ? wait_for_completion_io+0x10/0x10 [ 863.663157] ? vfs_write+0x319/0x4d0 [ 863.666874] ? fput+0xb/0x140 [ 863.669985] ? SyS_write+0x14d/0x210 [ 863.673696] ? SyS_read+0x210/0x210 [ 863.677320] ? SyS_clock_settime+0x1a0/0x1a0 [ 863.681730] ? do_syscall_64+0x4c/0x640 [ 863.685708] ? SyS_getpeername+0x220/0x220 [ 863.689944] do_syscall_64+0x1d5/0x640 [ 863.693836] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 863.699024] RIP: 0033:0x45dd99 [ 863.702210] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 15:42:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, &(0x7f00000001c0)) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x101000) accept$netrom(r2, &(0x7f0000000140)={{0x3, @bcast}, [@null, @default, @null, @remote, @netrom, @netrom, @remote, @default]}, &(0x7f00000000c0)=0x48) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 863.709919] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 863.717186] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 863.724450] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 863.731718] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000023 [ 863.738990] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 863.764599] FAULT_INJECTION: forcing a failure. [ 863.764599] name failslab, interval 1, probability 0, space 0, times 0 [ 863.786756] CPU: 1 PID: 2639 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 863.794583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.803938] Call Trace: [ 863.806530] dump_stack+0x1b2/0x283 [ 863.810212] should_fail.cold+0x10a/0x154 [ 863.814369] should_failslab+0xd6/0x130 [ 863.818347] kmem_cache_alloc+0x28e/0x3c0 [ 863.822500] __anon_vma_prepare+0x2bc/0x4f0 [ 863.826821] ? __lock_acquire+0x5fc/0x3f20 [ 863.831056] do_huge_pmd_anonymous_page+0xd3c/0x1670 [ 863.836180] ? prep_transhuge_page+0xa0/0xa0 [ 863.840601] __handle_mm_fault+0x2ac4/0x4620 [ 863.845064] ? vm_insert_page+0x7c0/0x7c0 [ 863.849239] ? avc_has_perm+0x12e/0x330 [ 863.853233] handle_mm_fault+0x306/0x7a0 [ 863.857309] __do_page_fault+0x578/0xb50 [ 863.861377] ? spurious_fault+0x640/0x640 [ 863.865526] ? do_page_fault+0x60/0x4f2 [ 863.869506] page_fault+0x25/0x50 [ 863.872963] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 863.878845] RSP: 0018:ffff888082057dc8 EFLAGS: 00010206 [ 863.884206] RAX: ffffed101040afd4 RBX: 0000000000000068 RCX: 0000000000000068 [ 863.891473] RDX: 0000000000000068 RSI: ffff888082057e38 RDI: 0000000020000740 [ 863.898768] RBP: ffff888082057e38 R08: 0000000000000000 R09: ffffed101040afd3 [ 863.906065] R10: ffff888082057e9f R11: ffff88808b62e5c0 R12: 0000000020000740 [ 863.913361] R13: 00007ffffffff000 R14: 00000000200007a8 R15: ffff8880573cad80 [ 863.920683] _copy_to_user+0xaa/0xd0 [ 863.924405] SyS_semctl+0x164/0x220 [ 863.928053] ? SyS_semget+0x170/0x170 [ 863.931869] ? SyS_clock_settime+0x1a0/0x1a0 [ 863.936281] ? do_syscall_64+0x4c/0x640 [ 863.940257] ? SyS_semget+0x170/0x170 [ 863.944065] do_syscall_64+0x1d5/0x640 [ 863.947955] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 863.953157] RIP: 0033:0x45dd99 15:42:45 executing program 3 (fault-call:7 fault-nth:36): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:45 executing program 2 (fault-call:3 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 863.958282] RSP: 002b:00007f717d9f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000042 [ 863.966000] RAX: ffffffffffffffda RBX: 0000000000027cc0 RCX: 000000000045dd99 [ 863.973277] RDX: 0000000000000012 RSI: 0000000000000000 RDI: 0000000000000000 [ 863.980556] RBP: 00007f717d9f8ca0 R08: 0000000000000000 R09: 0000000000000000 [ 863.987832] R10: 0000000020000740 R11: 0000000000000246 R12: 0000000000000001 [ 863.995103] R13: 00007ffd6a633f7f R14: 00007f717d9f99c0 R15: 000000000118bf2c 15:42:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "0000c0a5515a9fc9e78400", "20040100", '\x00\x00\x00\x00\x00\x00 \x00'}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f00000000c0)=@int=0x1ff, 0x4) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 864.078176] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 864.079147] FAULT_INJECTION: forcing a failure. [ 864.079147] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 864.091969] FAULT_INJECTION: forcing a failure. [ 864.091969] name failslab, interval 1, probability 0, space 0, times 0 [ 864.148775] CPU: 0 PID: 2652 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 864.156604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.165959] Call Trace: [ 864.168556] dump_stack+0x1b2/0x283 [ 864.172192] should_fail.cold+0x10a/0x154 [ 864.176337] should_failslab+0xd6/0x130 [ 864.180305] __kmalloc+0x6d/0x400 [ 864.183754] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 864.188944] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 864.193969] ? generic_gcmaes_encrypt+0xf4/0x130 [ 864.198718] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 864.203559] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 864.208580] ? __kmalloc+0x3a4/0x400 [ 864.212298] ? tls_push_record+0xfa/0x1270 [ 864.216529] ? cryptd_aead_child+0x9/0x40 [ 864.220675] ? tls_push_record+0x938/0x1270 [ 864.225005] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 864.229166] ? selinux_socket_sendmsg+0x1d8/0x260 [ 864.234010] ? selinux_socket_getpeername+0x260/0x260 [ 864.239209] ? tls_sw_push_pending_record+0x30/0x30 [ 864.244231] ? __fget+0x225/0x360 [ 864.247688] ? inet_sendmsg+0x11a/0x4e0 [ 864.250307] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 864.251681] ? security_socket_sendmsg+0x83/0xb0 [ 864.266749] ? inet_recvmsg+0x4d0/0x4d0 [ 864.270731] ? sock_sendmsg+0xb5/0x100 [ 864.274623] ? SyS_sendto+0x1c7/0x2c0 [ 864.278423] ? SyS_getpeername+0x220/0x220 [ 864.282655] ? lock_downgrade+0x740/0x740 [ 864.286814] ? wait_for_completion_io+0x10/0x10 [ 864.291489] ? vfs_write+0x319/0x4d0 [ 864.295221] ? fput+0xb/0x140 [ 864.298317] ? SyS_write+0x14d/0x210 [ 864.302140] ? SyS_read+0x210/0x210 [ 864.305768] ? SyS_clock_settime+0x1a0/0x1a0 [ 864.310206] ? do_syscall_64+0x4c/0x640 [ 864.314177] ? SyS_getpeername+0x220/0x220 [ 864.318410] ? do_syscall_64+0x1d5/0x640 [ 864.322475] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 864.327841] CPU: 1 PID: 2653 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 864.330106] audit: type=1326 audit(1601653365.335:90): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=2627 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460bda code=0x0 [ 864.335645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.335649] Call Trace: [ 864.335665] dump_stack+0x1b2/0x283 [ 864.335680] should_fail.cold+0x10a/0x154 [ 864.376261] __alloc_pages_nodemask+0x22c/0x2720 [ 864.381095] ? ima_match_policy+0x85a/0x10e0 [ 864.385509] ? trace_hardirqs_on+0x10/0x10 [ 864.389742] ? __lock_acquire+0x5fc/0x3f20 [ 864.393984] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 864.398868] ? __anon_vma_prepare+0x28f/0x4f0 [ 864.403364] ? lock_acquire+0x170/0x3f0 [ 864.407337] ? lock_downgrade+0x740/0x740 [ 864.411490] ? anon_vma_interval_tree_insert+0x20a/0x3c0 [ 864.416937] alloc_pages_vma+0x4b3/0x6d0 [ 864.421024] do_huge_pmd_anonymous_page+0x2d6/0x1670 [ 864.426166] ? prep_transhuge_page+0xa0/0xa0 [ 864.430593] __handle_mm_fault+0x2ac4/0x4620 [ 864.435003] ? vm_insert_page+0x7c0/0x7c0 [ 864.439149] ? avc_has_perm+0x12e/0x330 [ 864.443138] handle_mm_fault+0x306/0x7a0 [ 864.447203] __do_page_fault+0x578/0xb50 [ 864.451267] ? spurious_fault+0x640/0x640 [ 864.455416] ? do_page_fault+0x60/0x4f2 [ 864.459393] page_fault+0x25/0x50 [ 864.462843] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 864.468714] RSP: 0018:ffff888056e4fdc8 EFLAGS: 00010206 [ 864.474096] RAX: ffffed100adc9fd4 RBX: 0000000000000068 RCX: 0000000000000068 [ 864.481362] RDX: 0000000000000068 RSI: ffff888056e4fe38 RDI: 0000000020000740 [ 864.488653] RBP: ffff888056e4fe38 R08: 0000000000000000 R09: ffffed100adc9fd3 [ 864.495923] R10: ffff888056e4fe9f R11: ffff888093d7a4c0 R12: 0000000020000740 [ 864.503197] R13: 00007ffffffff000 R14: 00000000200007a8 R15: ffff8880573cad80 [ 864.510499] _copy_to_user+0xaa/0xd0 [ 864.514224] SyS_semctl+0x164/0x220 [ 864.517857] ? SyS_semget+0x170/0x170 [ 864.521690] ? SyS_clock_settime+0x1a0/0x1a0 [ 864.526119] ? do_syscall_64+0x4c/0x640 [ 864.530092] ? SyS_semget+0x170/0x170 [ 864.533889] do_syscall_64+0x1d5/0x640 [ 864.537781] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 864.542968] RIP: 0033:0x45dd99 15:42:45 executing program 3 (fault-call:7 fault-nth:37): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 864.546158] RSP: 002b:00007f717d9f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000042 [ 864.553864] RAX: ffffffffffffffda RBX: 0000000000027cc0 RCX: 000000000045dd99 [ 864.561127] RDX: 0000000000000012 RSI: 0000000000000000 RDI: 0000000000000000 [ 864.568421] RBP: 00007f717d9f8ca0 R08: 0000000000000000 R09: 0000000000000000 [ 864.575681] R10: 0000000020000740 R11: 0000000000000246 R12: 0000000000000002 [ 864.582962] R13: 00007ffd6a633f7f R14: 00007f717d9f99c0 R15: 000000000118bf2c 15:42:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@remote, @rand_addr=' \x01\x00', @private0={0xfc, 0x0, [], 0x1}, 0xffffffff, 0x3, 0xffff, 0x580, 0x423, 0x880090}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000020085561852f02b93a2fef014cc0a886a6000000281e00000000020000000000000000000000ef0014006015", @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x200, 0xffff, {0xffffffffffffffff}, {r6}, 0xb26, 0x6c}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:45 executing program 2 (fault-call:3 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 864.656947] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 864.677129] FAULT_INJECTION: forcing a failure. [ 864.677129] name failslab, interval 1, probability 0, space 0, times 0 [ 864.729241] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 864.732100] FAULT_INJECTION: forcing a failure. [ 864.732100] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 864.748215] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2080 sclass=netlink_route_socket pid=2673 comm=syz-executor.1 [ 864.756403] CPU: 1 PID: 2667 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 15:42:45 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_UPLOAD(r4, 0xc06855c8, &(0x7f0000000280)={0x8, 0x8, {0x52, 0x401, 0x1000, {0x3ff, 0xffff}, {0x51e, 0x7}, @period={0x5d, 0x3d0, 0x5, 0x2, 0x1, {0x0, 0x7, 0xfff8, 0x101}, 0x1, &(0x7f0000000240)=[0x7]}}, {0x55, 0xa6b, 0x7f, {0x5, 0x100}, {0x1f, 0x200}, @rumble={0xfffb, 0x8000}}}) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYRESHEX=r2, @ANYRES64=r2, @ANYBLOB="0400276891fcbd06000a0101020400050005000400000000000400"/38], 0x2c}, 0x1, 0x0, 0x0, 0x20000081}, 0x20040000) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$RTC_ALM_SET(r6, 0x40247007, &(0x7f0000000200)={0x39, 0x0, 0x13, 0x16, 0x5, 0xdc, 0x3, 0x15d, 0x1}) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x8b2, 0x7, 0x100d, 0x6, 0xc, 0x6, 0x1, 0x7}}) [ 864.771536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 864.780889] Call Trace: [ 864.783501] dump_stack+0x1b2/0x283 [ 864.787133] should_fail.cold+0x10a/0x154 [ 864.791288] should_failslab+0xd6/0x130 [ 864.795266] kmem_cache_alloc_node+0x263/0x410 [ 864.799856] __alloc_skb+0x5c/0x510 [ 864.803481] sk_stream_alloc_skb+0xb1/0x760 [ 864.807809] ? __sk_mem_schedule+0x99/0xd0 [ 864.812039] ? ipv6_frag_exit+0x40/0x40 [ 864.816015] do_tcp_sendpages+0x835/0x1750 [ 864.820254] ? sk_stream_alloc_skb+0x760/0x760 [ 864.824838] tls_push_sg+0x1ee/0x760 [ 864.828560] tls_push_record+0xa81/0x1270 [ 864.832722] tls_sw_sendmsg+0xbb0/0xfd0 [ 864.836703] ? selinux_socket_sendmsg+0x1d8/0x260 [ 864.841540] ? selinux_socket_getpeername+0x260/0x260 [ 864.846761] ? tls_sw_push_pending_record+0x30/0x30 [ 864.851798] ? __fget+0x225/0x360 [ 864.855278] inet_sendmsg+0x11a/0x4e0 [ 864.859071] ? security_socket_sendmsg+0x83/0xb0 [ 864.863821] ? inet_recvmsg+0x4d0/0x4d0 [ 864.867801] sock_sendmsg+0xb5/0x100 [ 864.871510] SyS_sendto+0x1c7/0x2c0 [ 864.875138] ? SyS_getpeername+0x220/0x220 [ 864.879374] ? lock_downgrade+0x740/0x740 [ 864.883528] ? wait_for_completion_io+0x10/0x10 [ 864.888193] ? vfs_write+0x319/0x4d0 [ 864.891904] ? fput+0xb/0x140 [ 864.895027] ? SyS_write+0x14d/0x210 [ 864.898737] ? SyS_read+0x210/0x210 [ 864.902359] ? SyS_clock_settime+0x1a0/0x1a0 [ 864.906763] ? do_syscall_64+0x4c/0x640 [ 864.910731] ? SyS_getpeername+0x220/0x220 [ 864.914962] do_syscall_64+0x1d5/0x640 [ 864.918856] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 864.924039] RIP: 0033:0x45dd99 [ 864.927219] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 864.934927] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 864.942192] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 864.949469] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 864.956747] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000025 [ 864.964013] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:46 executing program 0: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x15, "ba5f3145103f1aa32e69c6b881c98e57e31de52afa"}, &(0x7f0000000040)=0x39) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) 15:42:46 executing program 3 (fault-call:7 fault-nth:38): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 865.063842] CPU: 1 PID: 2674 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 865.071703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.081059] Call Trace: [ 865.083651] dump_stack+0x1b2/0x283 [ 865.087299] should_fail.cold+0x10a/0x154 [ 865.091458] __alloc_pages_nodemask+0x22c/0x2720 [ 865.096239] ? trace_hardirqs_on+0x10/0x10 [ 865.100475] ? ima_match_policy+0x85a/0x10e0 [ 865.104915] ? trace_hardirqs_on+0x10/0x10 [ 865.109157] ? __lock_acquire+0x5fc/0x3f20 [ 865.113401] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 865.118249] ? get_mem_cgroup_from_mm+0xf5/0x360 [ 865.123018] ? memcg_hotplug_cpu_dead+0x50/0x50 [ 865.127727] ? lock_downgrade+0x740/0x740 [ 865.131887] ? get_mem_cgroup_from_mm+0x112/0x360 [ 865.136745] alloc_pages_current+0x155/0x260 [ 865.141160] ? mem_cgroup_try_charge+0x2db/0x840 [ 865.145930] pte_alloc_one+0x15/0x100 [ 865.149745] do_huge_pmd_anonymous_page+0x900/0x1670 [ 865.154859] ? prep_transhuge_page+0xa0/0xa0 [ 865.159279] __handle_mm_fault+0x2ac4/0x4620 [ 865.163704] ? vm_insert_page+0x7c0/0x7c0 [ 865.167861] ? avc_has_perm+0x12e/0x330 [ 865.171880] handle_mm_fault+0x306/0x7a0 [ 865.175947] __do_page_fault+0x578/0xb50 [ 865.180038] ? spurious_fault+0x640/0x640 [ 865.184189] ? do_page_fault+0x60/0x4f2 [ 865.188194] page_fault+0x25/0x50 [ 865.191648] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 865.197529] RSP: 0018:ffff88805647fdc8 EFLAGS: 00010206 [ 865.202895] RAX: ffffed100ac8ffd4 RBX: 0000000000000068 RCX: 0000000000000068 [ 865.210168] RDX: 0000000000000068 RSI: ffff88805647fe38 RDI: 0000000020000740 [ 865.217446] RBP: ffff88805647fe38 R08: 0000000000000000 R09: ffffed100ac8ffd3 [ 865.224718] R10: ffff88805647fe9f R11: ffff888055a7e2c0 R12: 0000000020000740 [ 865.231982] R13: 00007ffffffff000 R14: 00000000200007a8 R15: ffff8880573cad80 [ 865.239276] _copy_to_user+0xaa/0xd0 [ 865.243000] SyS_semctl+0x164/0x220 [ 865.246633] ? SyS_semget+0x170/0x170 [ 865.250441] ? SyS_clock_settime+0x1a0/0x1a0 [ 865.254854] ? do_syscall_64+0x4c/0x640 [ 865.258825] ? SyS_semget+0x170/0x170 [ 865.262627] do_syscall_64+0x1d5/0x640 [ 865.266523] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 865.271732] RIP: 0033:0x45dd99 [ 865.274913] RSP: 002b:00007f717d9f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000042 [ 865.282623] RAX: ffffffffffffffda RBX: 0000000000027cc0 RCX: 000000000045dd99 [ 865.289918] RDX: 0000000000000012 RSI: 0000000000000000 RDI: 0000000000000000 [ 865.297215] RBP: 00007f717d9f8ca0 R08: 0000000000000000 R09: 0000000000000000 [ 865.304488] R10: 0000000020000740 R11: 0000000000000246 R12: 0000000000000003 [ 865.311793] R13: 00007ffd6a633f7f R14: 00007f717d9f99c0 R15: 000000000118bf2c 15:42:46 executing program 2 (fault-call:3 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @null}, [@bcast, @null, @bcast, @bcast, @bcast, @netrom, @remote, @default]}, &(0x7f00000001c0)=0x48) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, '\x00', '\x00', "4af60100", "e57f00"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x2d, &(0x7f0000000000), &(0x7f00000000c0)=0x4) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 865.367589] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 865.380644] FAULT_INJECTION: forcing a failure. [ 865.380644] name failslab, interval 1, probability 0, space 0, times 0 [ 865.426547] CPU: 1 PID: 2688 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 865.434400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.443754] Call Trace: [ 865.446350] dump_stack+0x1b2/0x283 [ 865.450011] should_fail.cold+0x10a/0x154 [ 865.454169] should_failslab+0xd6/0x130 [ 865.458145] kmem_cache_alloc_node_trace+0x25a/0x400 [ 865.463272] __kmalloc_node_track_caller+0x38/0x70 [ 865.468209] __alloc_skb+0x96/0x510 [ 865.471849] sk_stream_alloc_skb+0xb1/0x760 [ 865.476189] ? __sk_mem_schedule+0x99/0xd0 [ 865.480421] ? ipv6_frag_exit+0x40/0x40 [ 865.484397] do_tcp_sendpages+0x835/0x1750 [ 865.488639] ? sk_stream_alloc_skb+0x760/0x760 [ 865.493230] tls_push_sg+0x1ee/0x760 [ 865.496949] tls_push_record+0xa81/0x1270 [ 865.501112] tls_sw_sendmsg+0xbb0/0xfd0 [ 865.505095] ? selinux_socket_sendmsg+0x1d8/0x260 [ 865.509933] ? selinux_socket_getpeername+0x260/0x260 [ 865.515129] ? tls_sw_push_pending_record+0x30/0x30 [ 865.520148] ? __fget+0x225/0x360 [ 865.521537] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 865.523600] inet_sendmsg+0x11a/0x4e0 [ 865.523611] ? security_socket_sendmsg+0x83/0xb0 [ 865.523620] ? inet_recvmsg+0x4d0/0x4d0 [ 865.523633] sock_sendmsg+0xb5/0x100 [ 865.523642] SyS_sendto+0x1c7/0x2c0 [ 865.523651] ? SyS_getpeername+0x220/0x220 [ 865.523665] ? lock_downgrade+0x740/0x740 [ 865.535006] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2080 sclass=netlink_route_socket pid=2673 comm=syz-executor.1 [ 865.537776] ? wait_for_completion_io+0x10/0x10 [ 865.537789] ? vfs_write+0x319/0x4d0 [ 865.537799] ? fput+0xb/0x140 [ 865.537809] ? SyS_write+0x14d/0x210 [ 865.589537] ? SyS_read+0x210/0x210 [ 865.593170] ? SyS_clock_settime+0x1a0/0x1a0 [ 865.597605] ? do_syscall_64+0x4c/0x640 [ 865.601574] ? SyS_getpeername+0x220/0x220 [ 865.605806] do_syscall_64+0x1d5/0x640 [ 865.609700] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 865.614884] RIP: 0033:0x45dd99 [ 865.618085] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 15:42:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000)=0x8, 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 865.625787] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 865.633049] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 865.640317] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 865.647582] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000026 [ 865.654850] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 865.671952] FAULT_INJECTION: forcing a failure. [ 865.671952] name failslab, interval 1, probability 0, space 0, times 0 [ 865.691661] CPU: 1 PID: 2694 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 865.699505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.708886] Call Trace: [ 865.711485] dump_stack+0x1b2/0x283 [ 865.715118] should_fail.cold+0x10a/0x154 [ 865.719276] should_failslab+0xd6/0x130 [ 865.723256] kmem_cache_alloc+0x28e/0x3c0 [ 865.728367] ptlock_alloc+0x1d/0x70 [ 865.731999] pte_alloc_one+0x57/0x100 [ 865.735808] do_huge_pmd_anonymous_page+0x900/0x1670 [ 865.740946] ? prep_transhuge_page+0xa0/0xa0 [ 865.745412] __handle_mm_fault+0x2ac4/0x4620 [ 865.750260] ? vm_insert_page+0x7c0/0x7c0 [ 865.754407] ? avc_has_perm+0x12e/0x330 [ 865.758396] handle_mm_fault+0x306/0x7a0 [ 865.762460] __do_page_fault+0x578/0xb50 [ 865.766521] ? spurious_fault+0x640/0x640 [ 865.770671] ? do_page_fault+0x60/0x4f2 [ 865.774648] page_fault+0x25/0x50 [ 865.778114] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 865.783993] RSP: 0018:ffff88808ed77dc8 EFLAGS: 00010206 [ 865.789369] RAX: ffffed1011daefd4 RBX: 0000000000000068 RCX: 0000000000000068 [ 865.797677] RDX: 0000000000000068 RSI: ffff88808ed77e38 RDI: 0000000020000740 [ 865.804963] RBP: ffff88808ed77e38 R08: 0000000000000000 R09: ffffed1011daefd3 [ 865.812524] R10: ffff88808ed77e9f R11: ffff88809537e4c0 R12: 0000000020000740 [ 865.819811] R13: 00007ffffffff000 R14: 00000000200007a8 R15: ffff8880573cad80 [ 865.828168] _copy_to_user+0xaa/0xd0 [ 865.831913] SyS_semctl+0x164/0x220 [ 865.835553] ? SyS_semget+0x170/0x170 [ 865.839363] ? SyS_clock_settime+0x1a0/0x1a0 [ 865.843771] ? do_syscall_64+0x4c/0x640 [ 865.847743] ? SyS_semget+0x170/0x170 [ 865.851560] do_syscall_64+0x1d5/0x640 [ 865.855460] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 865.860643] RIP: 0033:0x45dd99 [ 865.863825] RSP: 002b:00007f717d9f8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000042 [ 865.871528] RAX: ffffffffffffffda RBX: 0000000000027cc0 RCX: 000000000045dd99 [ 865.881743] RDX: 0000000000000012 RSI: 0000000000000000 RDI: 0000000000000000 [ 865.889029] RBP: 00007f717d9f8ca0 R08: 0000000000000000 R09: 0000000000000000 [ 865.897345] R10: 0000000020000740 R11: 0000000000000246 R12: 0000000000000004 [ 865.904697] R13: 00007ffd6a633f7f R14: 00007f717d9f99c0 R15: 000000000118bf2c [ 865.918203] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:47 executing program 2 (fault-call:3 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:47 executing program 3 (fault-call:7 fault-nth:39): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000040)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/169) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000800)={r3, 0xffff, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x18080, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r6, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r7, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x51}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xf8}, @NL80211_ATTR_REG_RULES={0x2c, 0x22, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x530}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x1a1e000}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1}, @NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x81}]}, 0x70}, 0x1, 0x0, 0x0, 0x4044}, 0x20004000) sendmsg$NL80211_CMD_GET_INTERFACE(r4, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x174812006}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, r7, 0x10, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xffffffff, 0x79}}}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 866.070898] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 866.097452] FAULT_INJECTION: forcing a failure. [ 866.097452] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 866.139513] CPU: 1 PID: 2709 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 866.147373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 866.156746] Call Trace: [ 866.159352] dump_stack+0x1b2/0x283 [ 866.162995] should_fail.cold+0x10a/0x154 [ 866.167178] __alloc_pages_nodemask+0x22c/0x2720 [ 866.171957] ? kasan_slab_free+0xc3/0x1a0 [ 866.176208] ? tls_push_record+0xc3b/0x1270 [ 866.180523] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 866.184673] ? inet_sendmsg+0x11a/0x4e0 [ 866.188646] ? do_syscall_64+0x1d5/0x640 [ 866.192705] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 866.198067] ? tcp_tx_timestamp+0x17/0x250 [ 866.202320] ? debug_check_no_obj_freed+0x2c0/0x674 [ 866.207340] ? lock_acquire+0x170/0x3f0 [ 866.211316] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 866.216257] ? debug_check_no_obj_freed+0x2c0/0x674 [ 866.221310] alloc_pages_current+0x155/0x260 [ 866.225718] ? tls_push_record+0xc3b/0x1270 [ 866.230043] skb_page_frag_refill+0x1bf/0x490 [ 866.234539] sk_page_frag_refill+0x4a/0x1b0 [ 866.238946] alloc_sg+0x13e/0x730 [ 866.242490] tls_sw_sendmsg+0x49a/0xfd0 [ 866.246473] ? selinux_socket_sendmsg+0x1d8/0x260 [ 866.251488] ? selinux_socket_getpeername+0x260/0x260 [ 866.256773] ? tls_sw_push_pending_record+0x30/0x30 [ 866.261792] ? __fget+0x225/0x360 [ 866.265253] inet_sendmsg+0x11a/0x4e0 [ 866.269069] ? security_socket_sendmsg+0x83/0xb0 [ 866.273846] ? inet_recvmsg+0x4d0/0x4d0 [ 866.277838] sock_sendmsg+0xb5/0x100 [ 866.281551] SyS_sendto+0x1c7/0x2c0 [ 866.285179] ? SyS_getpeername+0x220/0x220 [ 866.289433] ? lock_downgrade+0x740/0x740 [ 866.293690] ? wait_for_completion_io+0x10/0x10 [ 866.298360] ? vfs_write+0x319/0x4d0 [ 866.302072] ? fput+0xb/0x140 [ 866.305199] ? SyS_write+0x14d/0x210 [ 866.308939] ? SyS_read+0x210/0x210 [ 866.312565] ? SyS_clock_settime+0x1a0/0x1a0 [ 866.317138] ? do_syscall_64+0x4c/0x640 [ 866.321303] ? SyS_getpeername+0x220/0x220 [ 866.325539] do_syscall_64+0x1d5/0x640 [ 866.329792] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 866.334979] RIP: 0033:0x45dd99 [ 866.338189] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 866.346530] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 866.353806] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 866.361072] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 866.368346] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000027 [ 866.375613] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xd, &(0x7f0000000000)="6f3ee8e2f5a537edbc770f1f359a5a61a1a9e7c3a834d81f2ae1f663e1faeeb8894b01d28567b5399b08214fe31d683d2f7d04fb318356b2083363a3250ece4c6e86e09687d85518504f10e27f1fa391e31e8a130f81ec", 0x57) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:47 executing program 0: ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000000)={0x0, 0x3, 0x2}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) 15:42:47 executing program 3 (fault-call:7 fault-nth:40): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) move_pages(r2, 0x8, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil], 0x0, &(0x7f0000000040)=[0x0, 0x0], 0x2) 15:42:47 executing program 4: r0 = geteuid() syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffa, 0x6, &(0x7f0000001500)=[{&(0x7f00000002c0)="6389bf287f45ed0dbe7116a373690767281070d5a66441170fc1c4b808d25ffcfef273eb8688bab4f86e7ef1423d292b76e2d6853f5a771c9da1a8f023a9f1830a2e5b24add19504621df81c1e2846f9351732847f0ae7710fa008a81e7795b9d66a12b0ce1490494b31cedcc2e329563707722241b9339b6e943dc73c7a632ece96eeb2e38bf5b0a0ce224e873691e71a344bf8a1631f99161fd57421510e26db75b1301c1a6f0eccab90d60e762ac1e0e21574482880b70cba0b06e473b69d336600a1a349f8ed7767eaaa1d7fc96b4f5677f629236e560b7ec5467e4662acfc1ccb8f04ffaa1d0525f38e5784850d2cf5a7a441bcadfa6fbf2594b589888e23348418197d9d0fbc9fcc8383ae1b313b54cb983e391fd9a6d10b649adcaa1c6a6679275f998c3ccf8eb8eaf38548d527359098a838613b9e695282c761f4b9fa94030758630089fe904c8760fb2c4bdcebf0edd67c608d78d8a469eab4378a9f787e11a470322635102a1ef73981aaf938c7dbf972c5c428f6e5cf537baf7308db05d42b7964a7aba87ff236ff46e604d746dcd726c7201bc58248a2d530b58fa58471dbaa15d8a9c204a95cbd711edf30a2e03dbd17700e02c708221e092297d78ac5a75f21eff344d1af85b4ae456eae356ab04cc8fa3486cb30d268be4d70cd2c99ea114f1ae748114f2b4292ff556cab34c59921deaaa64afe90e76e5849b844e29fa23a87442775258bbb15cd95ee7826cbce8b65b071c6eff2b81f87cb28768d92b46869caeeaf92cd42194aa8cf6340f2d425f8ba87dae90662e9227500ba98599068e85f972f2239a4ff20e007852177356a43e9f38a11dc05c38fd49c147033c3891efe8e7c17d2f11c5f9a0f4e2575e58741e7f9c933f057357f9c6d244e64b427be32a6e7280c7ca62656df60452fa39501495399a39b2883501460fbf4ae6c2a293d14e2a070e8cf66cdc12a047bc21b2578b26a2220f2764889f1e171f5cd0763a2dddf89ec4b74412909f9cc7edbfb8f83310c0e2ae9e27cdb5c6018f5a5fd68c857d552676450d982bbc5cdfc0aab6539bcbd33a039686e75079cc84f34a8ee893b7d5975baa84e3b5e2d8d0b1f5a46424f2e5a9941584833958f1c70c3bb03cc9a1ce46fbc236edd421f9fb0010a73e790352dd930ee1667735e68409cf12a1dad15316d8b7015171ca4fc55078bd8a7842be5abc2332354651f9f9f154527e3b5770ec0f736ffe4a03453aa539d2ff00af216f47d0e86c61437adbe022156d09fe4bdb8382c5cb42d06cc86c6efc5288429ae890135a0ba5ae6b9a9302c949195dbf99fc7735f3c054dd1700efaa202e17dcd55a8736edf4bd2ce74aee85136a2d0625ca19c708051cddbe4ba922f5a87ac32059bbf7d1c2fdd2545e283a6380324430d70cfe7542239383fbdc5182e4a9f7728981adf7e072da17812e255283d651af01258489e18e7d98667a5b7f051439f777edc4025c524d5ec2c0f4e8b14ffb30e4786c7f668ff3f6839bdf08998cbee4c2d09933c0adb0ab1ff1bf1bcf9df616f6b30448313a82302627b9cd167aca618dce4b9ce5cff449e8f8fcf001daab7a1c08fc811cd8bea6e2b7bf599aaa56ac6df7e01275b2dc70712bc681ea09dc0590ec7b6562a542a81e4fbdcddaa89ea20a15ba15c6fc5605deeae4e5c57a76253892216a8407b5eef137416871ca7b7fe635748fc50758195fa2df8317ef950be71070e7e2d7148b4fcefd04b00d5c0b9912139dda49f328f0b79c4d641afb9aeacc1155c7d750dc9dbe4ccfad1a6c06b90c1e4484f16e7a46ae7022c10ea1060f7fee7a0a90ba86493385b079260850c665be13a8089dca78dcb4794cfda30ebecc006491f91a3b0e8bc927f9822299cf1c462245781f5e565a186485eea32539d068c4f02d8d8155c6555ad792c809ad8d9a54b20dbf857aa5005d74fc12260c12a1f18fce90a63f9d6d11f2e7743f9f909c25ea1e9fcae292e4790b58e1426e94e5c4447fbdec81186a4f854cd76f148242e2ab49295c6730f188af3dbf77690b772be016b1a67e8c756d3883d532486ad777bc7df1a74343b57cbfe2a68ae35623ce830a320d4332a1e032495edcdcdf8ce22b6db304ad652bf6f2fbd8df9e6edd666e47125f87fd1a149fff039bae44d7c6f43371e3df66f7562d5ca4587def0feea962187f69f0ce9e4aadd3fb8d465de33737780564ce56efdd8f5bd27a9d6dc32075b6e9739bd25cf4002e0cbaa6add352745d786338ef496a3db2f9a6cd918845d8fc0b2ab7ecfd0e8d612ca6d7c85947ca350ebf8b18d9312931c93f32178bd33fa6260fd6241561bef38a03d0150e53dd1d636724761e51ee2868b80c1002b5de152356c1ab7e05ba4db41307d8a661f51acdee303429dd8b53de2218ca842d3d794f7410fe0803799f4d35b4a86cfbd450aaaf6b8c7747d3fde14b44fbe4407b24d45ef2ad5027068f0472d378a9716f8ab32909b48bea0e5effb95844ef877e05d1445b3306af81ade2f55884a452b44ce14a6cd2df9f06144c3ddfbf5bdeba22631b10cf6910a8cc9a8df26ec4e6017b78123983e68ddfa9cb1c0e2e40ba4bb2c7c461c306ed399af4e48e2b481d239ea7910fe93677ffab18c8dc0c75aaa340eb26a0089c63c6447c05c5121689b44342a99adaae0bbf93609c9541d2e9f2507e42353b920f498a083eed45bf84710a1f02c44f611314bda2561434b7077e082bff205c6fa08487f784fe2e557ac52c6b7d7f26316ca8df77848bccc8d3ef866094339b0bbc9585016bbc6d8c81dcb2f3f4746e7304159fab6fe7a6382b8c8a90380c8d7f5ecc038d81d77ad602e0460777437ba8a90848eda96897bd192f4c0bcb834939d8c17d63720c3ae028a0ca7d0235e3d2445f0906ee6c7464cb146abb7dbfda1b6364486ca705476bd9c05175b6d09d8f5bb723bff0b1c0f1df280ebeaab429b62fdcbc86aaa8e059be7d40602cf068c5f2c6193953c1e4998f2f8326a4bb2489257b8b595d90a300b91c8710421df635e9182eb25b15a3bb789223ad337829255befbb10a6fa78790a61f7b54c992519116b1bf4a5aca076354b5a7dbad51133713111684903e7872b64e66b64ee79b6ad537e2eb51686743e76d057235a6c34becdd5865f5ce5048308ee35ebbd0ccc34fe6eb433734840bc2802c2ca1889c021f7afa37b84f60a0548ffe1c4be1adf6d8724bb8991da20b418039cd922b17162f6cc6be5820f09b223fd2a4bffad16b52c9f9f7c4c80581da1f03e9e004df75be3ac3ecb96d960391bcf0a26fa3711ef514583a1a2f997e6fea4b0785420b485eacba683695b326159db27b85f4003c47edc65deef8877c7b44e84cb5ff70857a0a91e81d876475ddc10dd93778ab38f49b7c9290cfc71badb8fa231118716deb5a2bcb4c9ea99bce41a35e6b75eb6f505aad72ed54b32c4cd39bc271f901252ac5ff082d0f4cd99d3f2fb8da41b99231c49ea445579823a6c501d0b6d7add8ce1cf83f3d73d002871c979e1fe0877e4423e721b912fdf06e387307b274f1c15bf06ada17922dcb1b647058709799ce4df9a05b7a03bfd780d64ef12212dcb53f57eb9b9b7f754f5e083710bff542e2a426e40f7b24ad2f93894816dd70b69bc4a2dfb5be9c90234d095e4b30c73420cfb8f0c1671cef4fcb3bc0706a47985ddf2eed76b2c790c782d062bf3e40cd9bcded8750f2b166461ad65a6bb019918c531e24e7219cfb118823150cabf324b6750b7977b064d316bb8878e9d6d82ee17d7a66ede6078c6421c413682ce90e2de0275936e75cbb9b1cba2b4fa007d8e93a18c45701f2ef9a0052d56bc8fd592d86bd5b3c2776a73ed1cfa97a6a22d3114be65978ae75622aeb17ca23b01a363e5bba42aa99782b5a24c2f0cf21b136457af62e57c941a3a410e98d3c9a030607721b3bc4a51ff58180c3401ea984cfaddf647e3099f3757626e68c9cd9bd7cb2ed21433c0302c35dbc637b6db782412fc0fc8cdadecc6ddebe77e803e7aa330682afe516ea42a853a4793600d4cdc9539bc9f0a810c7bc44dfca580b52183e70d02ae6879354d2d247bb9df5eb5657fc0794acdf71e24c8986ed7a19668184e4554d15e8b0271ed6318c0cf5118a69e3f038f733e4476865d2ac2be88c48f724f6d5b5801c7f85fc4f6ccb99aa37326cda9a8f90cb9b82d139ce35b144a04320d60176b34f886e6bdee99f8b6a3882d33817a578c38beb85ffdfa8e0f3165bc8adc778ea47769110e2e63bdb3c2187229986868f484214fa9bc8215b450c2186a027691bab7c6def77acacfe369b2830cc722368d3f1f992c0af7c1a5f631700717d08c38832161b3b27b7437386964bcee66180b0d4044b7954029a4d3e018652a71e45ecdbbddb17317e9a78d86b8ef7ec89fda9170dc4b714d1a7986e9b174d3b256babd09e3c1a2dbc7a1d2ece7dc8bbc6810709a430db7fcc5dea2d39fc23eca428041f12e012ce0357891d1d48863503d385414b6bdf90d83cbd46aa389ce1fa5e4fd49633a0931d952f25a6d652e44b6748ad4707ccb12c0ada78d3005a61eb824132e29da7933ae5cad62d973efbe9974f4b9af78ef3f64a7f8feff8deb28f55dd96a2a70d78c87eb921f8d84214b55ff2d3dab2d4f54e67c54a4f6749f3bd6eec04dd30b4c717c2631ef55c9f657e6a0d9a176e424d1775fc8fc9afee28af4adf7b30cb626929e73d337462e7cbf5b739ea5c0233054b675daac5f1061190faf9db2f280d6924234c83847c7d81fee8879080cdc5a46e199e7edfdea932b02f1c9f998d88f7337b2b671b7a7bcb6cbf5f2046c523a7ca95379ae0bb9f0bf8ca83ca66619456ec84e02c5cf9f8afc682f472fdd057fbd2ea01bd23a0f86c4ced152e94efe51690ac09869a46028c8a0a250c1875fef89e70ad6e967601396bdfbc1a7f8ec36aa617613175db9506415c658ebb688a21ada1674eba83e554e399be6e21cb839be907d4e872e030d5e5749c45fc7554386054c6b146eeaef894d1df77cf2a1fa08ff99ef7b72902d983880a6ed517ffea785c63a73fcc5d1518cef27c06f658e1d882ae7f6302c794a072d6cb0030aa0a4a1cfd99fb212a60b63c2ecafa3ee86ee18789e5cc5e778da1d83c0ed6cbf02fc569306e0a24a3e69ca965f57ff77972a3a4b4c7afac51cd9a842015315a3d041292de42688df8848ff4f2763c81eddaeb3e1bcee6afa2008ca99f8715e0b596f13ac3e2b3afa117f5b35eb14e1502d6964bc36d4b1b8c826af60523f24b04b6bd291ba59de78127f836dac44833a3ba73bc9f7beb5e32c7ba72e8604b5a0d90c891459a2d98c7392e457b776ece378e7937be859741b8e82769db09da015c5bd8a64e7f200fc12a33344933799c0871ce90796d8798d3f960dd7f267f9cdb4bab697172f8128bed5bc5bbec0b7daa3ad04232903e7ec747ac68198c7395ea4e2c57119d7741b456ea7e0978720ea87289043ef5713e35dfc0a810097dcf3437d5a6d2d94d155235fb8ddc1a3e8a9308f1298726caa9892250aa447c64c24490e79f337d769dd400187aff50e094c367ec4fc553a55058ed3cc9df4e786f87384248e8e1bfedc133fa8585ceb02349daba3dbe475e30309f007d43df7f14b970ef34c9a24cf54d3db187959fb17b433732e890371f19b3eee7575721896cdb6e50ab577f378a692b923e3c4fc1dfb0fa14a8bea29426488ebc23b87948c5c909797bf4e2258fae05d63d9770f9bf17ec08e22de8c5229b4c35594062a9", 0x1000}, {&(0x7f0000000140)="e388d13ed81df7feb5430782630c9b", 0xf, 0x5}, {&(0x7f0000000180)="537654969e57db3891ed1323d2aae16bd63b58f731d3560040847da71799cb87c305edc64709c650b584e41f37cab19f1fe0339d70c330749e890250efd5be05fbb2313e750b6554d0c6f227bfa1f143274b72bca41d13951e96803d317573ee4500808b9e0e83e9e8c174d0b00e2a6a94da8d61de68bfcc2eb43f377a620b37935b9aa1520f43eaacc86b0217cd496572c3d6f8865c14a3fb794f9dc2e8c1d19cc7f9ee7f55ca112bf9c4189d42e3d9cd93a27647c6ac6b793d2fda8bf5d431c6", 0xc1, 0x3}, {&(0x7f00000012c0)="8b7151353e3e411bd5068e4a9c5f553ce840fdb21218fbdc618abbfd76d4152487cbcf474a9382101d89954d32086380f7ea6d16508cb0c17e4358c3d3cf14a8a7c97f15c64712c538c2458b25188e9abd292fcc0cfa14bc74b03cb453097aa57f60933fd24bce14ba3ca2f638159940bd3d1db71997a730c69e7c0fe81b2da1e6969b8d3d4a9a79f1072fdc79454e98e40e44b96f6b090acf9ae05c0bd075253295d834941bf37c67b80e29fd2713c2df5affaaaf70b63b7311a9c298b30f92a57bca916c75f0e852d2e62da94338cb107672f52567788e", 0xd8, 0x1}, {&(0x7f00000013c0)="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", 0xfc, 0x10000}, {&(0x7f00000014c0)="9616aa9fd9549429389d031adea1b0489911c9a7c1a209f9cbd9558d51d9a1fa2b3044a09cb6a8e1926f563d498c6fa45419", 0x32, 0x5}], 0x100000, &(0x7f00000015c0)={[{'\x00'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@obj_role={'obj_role', 0x3d, '.--}'}}, {@obj_user={'obj_user', 0x3d, '&,'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@smackfshat={'smackfshat'}}, {@fowner_eq={'fowner', 0x3d, r0}}]}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000001680)='/dev/nvram\x00', 0x20000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$inet6(r4, &(0x7f00000016c0)={0xa, 0x4e24, 0xfffffffc, @empty, 0x5}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000001c0)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r7}}]}, 0x28}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@loopback, @in6=@ipv4={[], [], @rand_addr=0x64010102}, 0x4e24, 0x4, 0x4e22, 0x1, 0xa, 0x80, 0x90, 0x87, 0x0, r7}, {0x0, 0x800, 0x0, 0x8, 0x1, 0x3, 0x4}, {0xfffffffffffff000, 0x8001, 0xa000000000000, 0x81}, 0x92, 0x6e6bb2, 0x1, 0x0, 0x3, 0x3}, {{@in=@multicast2, 0x4d6, 0x2b}, 0xa, @in=@loopback, 0x0, 0x4, 0x2, 0x95, 0x8, 0x100, 0x5}}, 0xe8) sendto$inet6(r1, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 866.495176] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 866.508125] FAULT_INJECTION: forcing a failure. [ 866.508125] name failslab, interval 1, probability 0, space 0, times 0 [ 866.553944] CPU: 0 PID: 2721 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 866.561856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 866.571233] Call Trace: [ 866.574634] dump_stack+0x1b2/0x283 [ 866.578272] should_fail.cold+0x10a/0x154 [ 866.583383] should_failslab+0xd6/0x130 [ 866.587400] __kmalloc+0x2c1/0x400 [ 866.591921] ? tls_push_record+0xfa/0x1270 [ 866.596174] tls_push_record+0xfa/0x1270 [ 866.600242] ? sk_page_frag_refill+0x56/0x1b0 [ 866.604748] tls_sw_sendmsg+0xbb0/0xfd0 [ 866.608731] ? selinux_socket_sendmsg+0x1d8/0x260 [ 866.614634] ? selinux_socket_getpeername+0x260/0x260 [ 866.619830] ? tls_sw_push_pending_record+0x30/0x30 [ 866.624939] ? __fget+0x225/0x360 [ 866.628396] inet_sendmsg+0x11a/0x4e0 [ 866.632205] ? security_socket_sendmsg+0x83/0xb0 [ 866.636964] ? inet_recvmsg+0x4d0/0x4d0 [ 866.640942] sock_sendmsg+0xb5/0x100 [ 866.644659] SyS_sendto+0x1c7/0x2c0 [ 866.648296] ? SyS_getpeername+0x220/0x220 [ 866.652532] ? lock_downgrade+0x740/0x740 [ 866.656689] ? wait_for_completion_io+0x10/0x10 [ 866.661441] ? vfs_write+0x319/0x4d0 [ 866.665152] ? fput+0xb/0x140 [ 866.668274] ? SyS_write+0x14d/0x210 [ 866.671987] ? SyS_read+0x210/0x210 [ 866.675611] ? SyS_clock_settime+0x1a0/0x1a0 [ 866.680111] ? do_syscall_64+0x4c/0x640 [ 866.684083] ? SyS_getpeername+0x220/0x220 [ 866.688332] do_syscall_64+0x1d5/0x640 [ 866.692224] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 866.697419] RIP: 0033:0x45dd99 15:42:47 executing program 2: r0 = dup(0xffffffffffffffff) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x48642, 0x0) setsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f0000000040)=0x7, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/time\x00') ioctl$FITHAW(r2, 0xc0045878) r3 = dup3(r0, 0xffffffffffffffff, 0x80000) sendmsg$rds(r3, &(0x7f0000000fc0)={&(0x7f00000000c0)={0x2, 0x4e22, @local}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/37, 0x25}, {&(0x7f0000000140)=""/143, 0x8f}, {&(0x7f0000000200)=""/214, 0xd6}, {&(0x7f0000000300)=""/18, 0x12}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/189, 0xbd}, {&(0x7f0000000580)=""/62, 0x3e}], 0x9, &(0x7f0000000e80)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000680)=""/141, 0x8d}, &(0x7f0000000800), 0x2}}, @cswp={0x58, 0x114, 0x7, {{0xe74e, 0x875}, &(0x7f0000000840)=0xa7, &(0x7f0000000880)=0x8, 0x8, 0x7, 0x8a, 0x8, 0x15, 0x6}}, @rdma_args={0x48, 0x114, 0x1, {{0x101, 0x10000}, {&(0x7f00000008c0)=""/159, 0x9f}, &(0x7f0000000d80)=[{&(0x7f0000000980)=""/70, 0x46}, {&(0x7f0000000a00)=""/148, 0x94}, {&(0x7f0000000ac0)=""/26, 0x1a}, {&(0x7f0000000b00)=""/56, 0x38}, {&(0x7f0000000b40)=""/193, 0xc1}, {&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000d00)=""/69, 0x45}], 0x7, 0x24, 0x101}}, @fadd={0x58, 0x114, 0x6, {{0x100, 0x1}, &(0x7f0000000e00)=0x7, &(0x7f0000000e40)=0x1, 0x7, 0x3, 0x7, 0x0, 0xa18f37e650dfa3d7, 0x3}}], 0x128, 0x24000000}, 0x840) 15:42:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000001c0)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r6}}]}, 0x28}}, 0x0) fchownat(r3, &(0x7f0000000000)='./file0\x00', r6, 0xee01, 0x400) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 866.700605] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 866.708316] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 866.715595] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 866.722893] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 866.730160] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000028 [ 866.738062] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 866.777822] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x7) r1 = dup(r0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x1412, 0x800, 0x70bd2c, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040}, 0x54444db80b6e5bc1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:47 executing program 3 (fault-call:7 fault-nth:41): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_RUN(r1, 0xae80, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 866.906138] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 866.921274] FAULT_INJECTION: forcing a failure. [ 866.921274] name failslab, interval 1, probability 0, space 0, times 0 [ 866.941125] CPU: 0 PID: 2754 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 866.948950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 866.958300] Call Trace: [ 866.960895] dump_stack+0x1b2/0x283 [ 866.964527] should_fail.cold+0x10a/0x154 [ 866.968679] should_failslab+0xd6/0x130 [ 866.972653] kmem_cache_alloc_node+0x263/0x410 [ 866.977261] __alloc_skb+0x5c/0x510 [ 866.980888] sk_stream_alloc_skb+0xb1/0x760 [ 866.985246] ? __sk_mem_schedule+0x99/0xd0 [ 866.989478] ? ipv6_frag_exit+0x40/0x40 [ 866.993452] do_tcp_sendpages+0x835/0x1750 [ 866.997694] ? sk_stream_alloc_skb+0x760/0x760 [ 867.002308] tls_push_sg+0x1ee/0x760 [ 867.006028] tls_push_record+0xa81/0x1270 [ 867.010539] tls_sw_sendmsg+0xbb0/0xfd0 [ 867.014607] ? selinux_socket_sendmsg+0x1d8/0x260 [ 867.019447] ? selinux_socket_getpeername+0x260/0x260 [ 867.024661] ? tls_sw_push_pending_record+0x30/0x30 [ 867.029708] ? __fget+0x225/0x360 [ 867.033161] inet_sendmsg+0x11a/0x4e0 [ 867.036958] ? security_socket_sendmsg+0x83/0xb0 [ 867.041727] ? inet_recvmsg+0x4d0/0x4d0 [ 867.045721] sock_sendmsg+0xb5/0x100 [ 867.049431] SyS_sendto+0x1c7/0x2c0 [ 867.053057] ? SyS_getpeername+0x220/0x220 [ 867.057293] ? lock_downgrade+0x740/0x740 [ 867.061450] ? wait_for_completion_io+0x10/0x10 [ 867.066467] ? vfs_write+0x319/0x4d0 [ 867.070180] ? fput+0xb/0x140 [ 867.073279] ? SyS_write+0x14d/0x210 [ 867.076993] ? SyS_read+0x210/0x210 [ 867.080636] ? SyS_clock_settime+0x1a0/0x1a0 [ 867.085063] ? do_syscall_64+0x4c/0x640 [ 867.089033] ? SyS_getpeername+0x220/0x220 [ 867.093271] do_syscall_64+0x1d5/0x640 [ 867.097163] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 867.102352] RIP: 0033:0x45dd99 [ 867.105554] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 867.113269] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 867.121164] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 867.128519] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 867.135830] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000029 [ 867.143099] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r2 = shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) shmat(r2, &(0x7f0000fff000/0x1000)=nil, 0x1000) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000100)={0x7, 0xe7cb, 0x2, 0x0, 0x80, 0x5}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r4, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_getrule={0x1c, 0x22, 0x20, 0x70bd2d, 0x25dfdbfb, {0x2, 0x20, 0x20, 0x7, 0x37, 0x0, 0x0, 0x7, 0x11}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4000804) 15:42:48 executing program 3 (fault-call:7 fault-nth:42): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/155) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) [ 867.249235] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 867.282712] FAULT_INJECTION: forcing a failure. [ 867.282712] name failslab, interval 1, probability 0, space 0, times 0 [ 867.301000] CPU: 0 PID: 2771 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 867.309133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.318485] Call Trace: [ 867.321092] dump_stack+0x1b2/0x283 [ 867.324727] should_fail.cold+0x10a/0x154 [ 867.328880] should_failslab+0xd6/0x130 [ 867.333552] __kmalloc+0x2c1/0x400 [ 867.337088] ? tls_push_record+0xfa/0x1270 [ 867.341325] tls_push_record+0xfa/0x1270 [ 867.345390] ? sk_page_frag_refill+0x56/0x1b0 [ 867.349996] tls_sw_sendmsg+0xbb0/0xfd0 [ 867.353987] ? selinux_socket_sendmsg+0x1d8/0x260 [ 867.358830] ? selinux_socket_getpeername+0x260/0x260 [ 867.364029] ? tls_sw_push_pending_record+0x30/0x30 [ 867.369055] ? __fget+0x225/0x360 [ 867.372510] inet_sendmsg+0x11a/0x4e0 [ 867.376313] ? security_socket_sendmsg+0x83/0xb0 [ 867.381064] ? inet_recvmsg+0x4d0/0x4d0 [ 867.385044] sock_sendmsg+0xb5/0x100 [ 867.388782] SyS_sendto+0x1c7/0x2c0 [ 867.392408] ? SyS_getpeername+0x220/0x220 [ 867.396655] ? lock_downgrade+0x740/0x740 [ 867.400831] ? wait_for_completion_io+0x10/0x10 [ 867.405501] ? vfs_write+0x319/0x4d0 [ 867.409216] ? fput+0xb/0x140 [ 867.412348] ? SyS_write+0x14d/0x210 [ 867.417189] ? SyS_read+0x210/0x210 [ 867.420817] ? SyS_clock_settime+0x1a0/0x1a0 [ 867.425230] ? do_syscall_64+0x4c/0x640 [ 867.429216] ? SyS_getpeername+0x220/0x220 [ 867.433474] do_syscall_64+0x1d5/0x640 [ 867.437379] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 867.442570] RIP: 0033:0x45dd99 [ 867.445757] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 867.453467] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 867.460733] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 867.468007] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 867.475640] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000002a [ 867.482908] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 867.585795] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) readv(r1, &(0x7f0000000200)=[{&(0x7f0000000140)=""/180, 0xb4}, {&(0x7f0000000000)=""/8, 0x8}, {&(0x7f00000000c0)=""/49, 0x31}, {&(0x7f00000002c0)=""/161, 0xa1}], 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, "020000000600", "4aa71cb5b131ccd9ea103c068488332f", "c5cbcf9e", "98a35ac72def183f"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0) 15:42:48 executing program 3 (fault-call:7 fault-nth:43): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:ssh_keysign_exec_t:s0\x00', 0x28, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x1c}}]}, 0x4c}}, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f00000002c0)=0x40) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000800)="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", 0x1000}], 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=r5, @ANYBLOB="e0000001e000000200000000140000000000000000000000020000000900000000000000ac00000000000000000000000700000044fb42e5bd6a8b256016c7b46133e0000001000006f5ac1414320000000ee000000200000001ac1414aa000000207f0000010000df060a010101000000030194040100444c5a11ac14141100009093ffffffff00000400640101020000000900000000000092f60000000000000002ac1414aa00000003ffffffff0000004d0a010100000008047f000001000005820a3faa96eeab573a9e9408976cebc9d4af9404000000000000001100000000000000000000000100"], 0x100}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000440)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f00000003c0)=0xe8) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7fffffff}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8055}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9d}]}, 0x54}, 0x1, 0x0, 0x0, 0x48050}, 0x4048084) 15:42:48 executing program 4: lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000000)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 867.744441] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 867.751022] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 867.761295] FAULT_INJECTION: forcing a failure. [ 867.761295] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 867.775382] CPU: 1 PID: 2796 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 867.783167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.792515] Call Trace: [ 867.795124] dump_stack+0x1b2/0x283 [ 867.798757] should_fail.cold+0x10a/0x154 [ 867.802917] __alloc_pages_nodemask+0x22c/0x2720 [ 867.806018] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2798 comm=syz-executor.2 [ 867.807677] ? is_bpf_text_address+0xb8/0x150 [ 867.807689] ? kernel_text_address+0xbd/0xf0 [ 867.807697] ? __kernel_text_address+0x9/0x30 [ 867.807707] ? unwind_get_return_address+0x51/0x90 [ 867.807720] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 867.841151] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 867.843293] ? __save_stack_trace+0xa0/0x160 [ 867.843308] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 867.843319] ? depot_save_stack+0x10d/0x3e3 [ 867.843340] ? kasan_kmalloc+0x139/0x160 [ 867.843351] ? kasan_kmalloc+0xeb/0x160 [ 867.843363] ? __kmalloc+0x15a/0x400 [ 867.861560] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2801 comm=syz-executor.2 [ 867.865495] ? tls_push_record+0xfa/0x1270 [ 867.865506] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 867.865514] ? inet_sendmsg+0x11a/0x4e0 [ 867.865524] ? sock_sendmsg+0xb5/0x100 [ 867.865531] ? SyS_sendto+0x1c7/0x2c0 [ 867.865541] ? do_syscall_64+0x1d5/0x640 [ 867.865554] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 867.918553] cache_grow_begin+0x8f/0x420 [ 867.922622] cache_alloc_refill+0x273/0x350 [ 867.926948] __kmalloc+0x378/0x400 [ 867.930498] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 867.935688] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 867.940713] ? generic_gcmaes_encrypt+0xf4/0x130 [ 867.945468] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 867.950317] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 867.955333] ? __kmalloc+0x3a4/0x400 [ 867.959049] ? tls_push_record+0xfa/0x1270 [ 867.963279] ? cryptd_aead_child+0x9/0x40 [ 867.967446] ? tls_push_record+0x938/0x1270 [ 867.971786] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 867.975944] ? selinux_socket_sendmsg+0x1d8/0x260 [ 867.980785] ? selinux_socket_getpeername+0x260/0x260 [ 867.985985] ? tls_sw_push_pending_record+0x30/0x30 [ 867.991010] ? __fget+0x225/0x360 [ 867.994466] ? inet_sendmsg+0x11a/0x4e0 [ 867.998452] ? security_socket_sendmsg+0x83/0xb0 [ 868.003214] ? inet_recvmsg+0x4d0/0x4d0 [ 868.007199] ? sock_sendmsg+0xb5/0x100 [ 868.011090] ? SyS_sendto+0x1c7/0x2c0 [ 868.014918] ? SyS_getpeername+0x220/0x220 [ 868.019156] ? lock_downgrade+0x740/0x740 [ 868.023318] ? wait_for_completion_io+0x10/0x10 [ 868.027985] ? vfs_write+0x319/0x4d0 [ 868.031702] ? fput+0xb/0x140 [ 868.034804] ? SyS_write+0x14d/0x210 [ 868.038521] ? SyS_read+0x210/0x210 [ 868.042148] ? SyS_clock_settime+0x1a0/0x1a0 [ 868.046561] ? do_syscall_64+0x4c/0x640 [ 868.050529] ? SyS_getpeername+0x220/0x220 [ 868.054762] ? do_syscall_64+0x1d5/0x640 [ 868.058824] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:42:49 executing program 3 (fault-call:7 fault-nth:44): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:49 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000001c0)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r3}}]}, 0x28}}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r5, 0x0) setgroups(0x2, &(0x7f0000000080)=[r5, r5]) shmctl$IPC_SET(r0, 0x1, &(0x7f00000002c0)={{0x3, 0xee00, 0xee01, r3, r5, 0x88, 0x7ff}, 0x6, 0xcd9, 0x8, 0x3, 0x0, 0x0, 0x400}) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x10000, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r6, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="5c000008fa7f5a90f394c9f387a6c3010e97bae801986da4404815aeff0000000000000000000000000000000000000000d4e544b4dcf8050e4bf9da7d6b6ebd429153f89c83c503d8f149ec4502e818f13e9df450635bf2b0750c395056db02ee470b6549c8ccd519b924781c30af0ca53c45807625778293bb4dea038d58ec4e86279a1dd42d8cc8268e4272e724a835a426bc40ba2fc71cea37b232991078b96df7f218068240b701ccd6706ebedd7ba7ba0fd0129b5992f93c2c7f32040ac709d271825bb3844fe61d74f749b3fff46b3c8ee322fd4df7dd90bd49d262fbbc1f0b97738435d938cc8bd45640b48077531e91523281b3a81ef98050e57458eb30c4dc922412eda0437e881656e9982e69409b3cebc838e4340425058c5088775b0f9bc198557d33f30746033fc9b5264df5989e1d1d87cc8c164f4e1cb308d52491913efba29ec5206dff78aec17633011b1ee7ce9fceca95f72708fc6b6bb91a4af52bea33148ed71ebc94fef3d7d287570aedb01c50eb696df827f3105508506659ed0b1361afccb3c986608b1b40bb814cd58a551230e9eab2b4a38be90caa6628a4a00b98ba7042667004c0d76373f9dbdc1542f9631a1addf77903dbf5db9f9b078b00f9c84f8c02cc3a8a", @ANYRES16=0x0, @ANYBLOB="000126bd7000fbdbdf25150000000a001a0008021100000000000a00060008021100000000000a001a00ffffffffffff00000a00060008021100000000000a00060008021100000000000a001a000802110000010000"], 0x5c}, 0x1, 0x0, 0x0, 0x4044800}, 0x20014000) acct(0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendto$inet(r8, &(0x7f0000000000)="11cbf1924d4eddc49fba5af5abe1eba12ffa9ec43e5057ba33456c748454ded713775bd3fbb32c16fab55c044ef2c55baf5b54179c826d90b05db36e1212ab4e03e9ca0e8f8e80409096f35ea29ea54823d6f10517a5163a260cf1f286e95052ee0a59e1527af7657de4eeb9bd887379ad319ef6f58cd6253cbbeda3adb34f3f2f897c1362cb6bfb9a63805a09b37d28b8594fbe9259d53d87e16365169b5197e04c6542f204f1d3129b5af6f4aaa1b2789026f24935e569c99e3cac86ad9ed05ec0ca293409", 0xc6, 0x4008801, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) 15:42:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x1c1c41, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) dup(r5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r8, 0x0) setgroups(0x2, &(0x7f0000000080)=[r8, r8]) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r10, 0x0) setgroups(0x2, &(0x7f0000000080)=[r10, r10]) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000800)={0x320c, 0x18, 0x10, 0x70bd26, 0x25dfdbff, "", [@nested={0x20e9, 0x73, 0x0, 0x1, [@typed={0x9, 0x7c, 0x0, 0x0, @str='$-,$\x00'}, @typed={0x8, 0x79, 0x0, 0x0, @ipv4=@multicast1}, @generic="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", @generic="b05232fbcaeefd12cd141f0410b55f2c9ea95c43491de5d6a784415bc5d4c3e682abb182b155d1227dc660e5bb3ea6d99e245760bb7e7acfd61bb5148b1b90090835d38769be47774f0f", @generic="1a20ca94584a70322d070f4691cbe6982db379659d681cd4ba5d4f1d0a2a9153822e4a56cf3ca802df1688d07cc950677aed8b6c80cec1906214677b03d4762ba6e14a4c3667ad0595bd50fcfe02ad9d85b735791e81387d396219d4", @generic="b598021e8e77ae2cf58d2a74bfbe421d34918e1b08f9e64e8470ec314b8e73", @typed={0x8, 0x54, 0x0, 0x0, @fd=r2}, @typed={0x1004, 0x37, 0x0, 0x0, @binary="fdf3a908851ee66cba8833633a18860e6d15d5d427f7ac2ea6480734f3698d773595fb57394c12bd5dd4bb3260cdc3105e16ea8951240355932c52eb642d37227160c9eaef5fb7ee3dfb4e1a8bff50efd5fc77afd419718de90a263dabd0c1f41f45bcb30edf8fe62fd27d7152de35554ec62747c6fea0c954967f0597394dec871fda769cc02db37b22188b803a4851a337ec3dccca254d5847877d80df96105fcdfa5db2a964c70600e18ba118e12881dfc761212e425e8721e8b9d7c4c82d88e51b0d57c958248aebf6f72d5a9de2022991f521c1239528437866ea02940b15560784a03d11dcbd8e7515ee791bd26f40e3362b3b2c155649436e653bcee11529e4d25b95701d9adb49b098128db70ca1eb780ed6fb9e1a69c5da1c9fcf6f31b85e931a0e4085080460f939beee59d0c65e79b3be7642cf3e93be6da3e41e9c5a01b418ca22372ef328bf529b3707426dabf1f6c76afdba19a803d915c9b9a8e3811f4e1ecae28d72153aaf0b2af3239d14bc181be7a2bb293bd9a78ba651a1df8a18b3d85ee1825791d0e1847b3667df721cde360c47ce7115dbd29fc0517c7c3dffb061a82cae703106fa0424b6f83bbb4b71064190294b0121fc453db8ceac92b4c9608dc0f67263bd0709f5c74dc38a79cf3048ecfae51f8bd4d156f16fd884e4aa5af4bbc8d3f55922ed16a2b5541968fe2133c3215a1a9ee8c42807a46725cfc4518f24dda11c9881716437958e6a86e67890f6f60036804c4967fe795dcbefd5e0c115abeb5f950f185bf910a7a8542ea249571462b65988cbca5c5bac9591c3e2d91dcccf88befb117a9e21eff4abad09add6d42babb1d3706135fbec763010dc332586ed7de21b5f2337ce7db7a917fa4c712b95a709a43d8360881ef44d092bd94476765b9ba76b9c05688b68db3db72df20ed443f6fd19a6ed9731c9617c962449431d8ca0db238f954ef32b121922ef9137d4adddd6bcf844fcb5efca2b01ed7063a7bc53ff329a8c7ef6f359b26929e2577577fbf655f67ce627392739fde4c30e1270a0c61d23fa285c1550afcfa74d024f517538b8fd766fafb1cb1162e939c402e6bcb6caedaae66bc846fe06b01645c55bf35c499eed1cb19bc2503e9c1be2ecf864dbe92c69270a53ecb0f976ea5823514a97a323714f182b48923f7e06e58a78a5d2a49d3a9c3ee2c0cdeff82f66103eedfacaf390c805c14f401d2648b21ddc43c361276ed6e66485070c7b4d8e4bc89982ebcf54ef2d10d2b8587f55768b8ee0c892965426e698a80b7f6ea8820934c93f8b89395f693f81a560ef5ce5379496913521e95b4223c029e694df63eb2065b6a5dc3778d0137a30e3057d044d0e5de801af1be1117107e612a3a8999e8164dfa6843b6b090fa731114bac39e946597f728b5e5b5844185e4644b33524ee433f866e9f76665bc6b257fc55bd33564b7a5d6ff6b22bfa23d252f31384c524e201f482bc56791f92a78cc7a689a98262fd5210ecb0a62a6bf2982b96000177cc3631da9c42aceffe46a5b43fbd4e7d7337ae45d8c56980296ac503a061ff28606afbac42a2c10ea6125c14d6d082a8c05e5e01891e328ba7c8d1141d48e89e288d2a60a1cca1d53a65c9212639eee1d7b1dde4dffc97823f7401af94b72de417ab93eff100bc785b8be49d3a780bc830dab929aa285414ed8a5336c38890e86806f36a1cd6d173339c5c0c1acde0cd3bc5d9dcabb52f792b747d553112ac57b29b6c61373ad65e7a32bf561a1ff53a28cf7babecc7d4e44c5e5f0359817ce04372265f228f25bac1ae828f88d0c1c4ca67ce1bbd93a27975e9a2e9342a6b102d0773a26baba1f52525bfc256bb411824159c8001b349d2d2fcd06e1e1c00a479b8f4cef714e9ce6469d75b3aa971a13de9592c03f858fd9fcdeef2b68e0ec3b52b3525b5887735918c53fec7a347bbde2a58a593ad6a080dacc273599b2b760509fd4c1d3ab9f4dbe664edf609414d7912b99488ab208e8533dcb3794a8a38797bd54e34f827e0147ff307941f30d2b7bc49cd8c30e27c454b8414034bb7f8c2face49f2afe9a4550bb19be9e164d4abca2e6241023a577a3f18aa9a66957a5027952ecbd9c6023184f4d2cbbca18c1f4531c0881ed37e6afaa068d82454be7ab458b50b5507568aac4dbbe89115137279930fba65b2e5e3a84362f373f1277a6f4405938da71ca958ef1fee8238c9f92eb68f847c1da9dc37c9685cf53ca5f7ca99d7ec0ac2f004e3487ca807635924eb44522a5058022caaae8a915e98b5e1c458f8a369541fb0f7ca44afeae5593e139a2cd7e0839b07e48067838dc72abdd3ad15fb0dcdfdaf9a7369fc031e8e74571ae9fcc46525e77311fbedf8810d83abed56d6349b1ed42be71b71c8c7fe7027c1ae149e78514ad98293689447903cb2698b704e3f888ea25f5ae486f4775721fc5767243b916c271fcee4d2808d62d62acf2ee2d875bd44613fe488476d2b2d0c752a635c05773233898af8a1b938b23423c045972e094f98dbe0e4ec849933de02dd5f6af5e0dee3114479797e1966e3afe58cd8e68240b45d2fd3412ced544bf0bbc307d39127ae20329ad9ea646590eeca5adb98dc9c8ee388513064747376859fc1ef0e4f63e7a2fd25e8a6cc4a4a67e2500a19b0af3a365b5222631cb0df168c45e2c90853e0fe6e1bfb1261b1b506d779d6a9c0c7a6d622c4a5eb3f5953aec845dfa0fa80089286fda79747692611fee693ca8ebecf4ba55f9abff7ddd7f04e2f323bebc31d9eaa7f8c7d2aa64d76368bd30ade9ed84a37b05026bb9557fc39da574d355115b9f510fdf981546d1a9221181777d01416d8251ff9a01c6ab27b4e705ea899f7db896fc1c0e8017c406d524371846a3ac8a8bacb59768280c054a2c1dd7a8e639c2797dcae7f677dd0b2c704c0009279cdf2a94e254847c825b220e453269aeb4ec3c44d9154828217c981c6385785fa79ddd427f8309625190d9dd946937c046707dc10aa19cd2882dba7177abb9c1fd03313385a205f5905cc9536eec2f4112da94c7a9dd260b573a333628c22f872ce80a6e4f44018413982f522b2e1893002cc5e6a9db6d83140b88a36e48442fdb19ae957cb828bbc516156e8c0753d4961a93d147b8350d67a5aa34ee332b608cc888fd9ca90c5d22556b926dbee5e055cd7feda0df968aa530907d806e7a9ba11bc139f72519b3e69dff747008b88cb020e5933a3a58d7241e7166d458990b568a3506d32e8a9af90dfe5a48d4a06fea35cf04b080cdf0ef00e942b4f7fdae848221b0f33cf7cbee5f4ee5870e81f615e9f7236b0fb7216f7078b95a19787d9d0d70b3179be60f8ad7a26863d6b8a0e84727f8d5fab64bae65ea5cce3952b58e54bf460a9def7d006e2469cf8589fad6449ac9251c0040f3f92a47bb82f76514101ea7967f11e507137aa06f3b3d018a5695a91485ad1070b945e8dfe4e6f6db854fcc3df112c5ed101a89985476be4fbd682902315cdf29ea16c709970af73a4b4cba0312b636662c03c6d573613b576e883a13b7c46cbaa9e2d62e6a2943527207dea19674d177299e9a7d287f03b400e64aae6db77ad3c5072c2d6be5ad37162a8192b817d7ec17119515909a62e5fe82fce97d93620e51bb2ef822b23513553ad16079d63db47cb65e161a19493dd59201490873c9650070d05d040fc353983bf6cd6cc6624914678e93e3b8e62633f98cc1a7a3ba16500bd970ba8a652b63f3dd804e22c240e8920824671f9c77f7c27a2e0105bc782cde6069c8ad16ca00d98d2da998829c26076f7a2531bc415054e7ccdea74351af2fde35d79ad4af5799053c1de80eb15a86ea4207b53d6759464a7dcac39ae3a7819225522673b180f0edcb0836fd3bf33d75b338d82dd1cf02e697392e1d70a9623c88f4fa9e1361dcc77e253bd804e9fc1e04470d29701868b1ba0f2988ed0fccfcd2b1585a1d629662f2d7297c90e933933371308bc7dae76249d7c57f8d864c0fd840f1173b6eec2f95f5cab5b779f428ddde1317f28342dba107047b7e54ea46cc80b5ba650f1f992662bc6a675484e0d90580cff4493b66211643ea80ba8b3be72cff0f705b4accbb5c329cb804ba44be212a649afa78b46e4e3f01d33a2b57002205942ea9a8c5b715cce40bc702656eebceb2f0c134348cd4db080314df6188e2a2deb9c2137c83b2de322b040793a4ee88732bd7507effe26986649ba7551394bd4382169f50d85d47c40918014117af4d0cb85c4a1609cb493af6563af908ba9dfc3df076a965a91e3520fb59d167c60684e4b90af14d2b45ac814ac2dc02fb3dd8becfe4a6a2ccc51698f7895551596f9807858b98945fa65356a7b04d2a3e786ac70494fa85000e2bab814d2183397c4875b3a90fd75a52856faa4022930721659a0a51e47225e88b950cef677f4b8479cb5b49bdf6eded802f7e80a24cceb2c7d61edace2e48ee2001a25fa0cc718fd4fe0348244a4ebe40fe6323b27770563dc9d5cbe93e348be38e99984171197b4379c0baf1ce3aef21f48c976f697ebf225b3cb7f1a15347242c6a93634531d8d902a34ee514276cf48226ed784e3f53b3e72fb4d0bd12b4ba7ef693dbbc3331354b5490bd51ee09bff0d7786b19c4c6170d81e977cf925de5510dc5b52e3a66ef5c92d843781cfc7fd450c98fb902aab5ec8dbe371f3529f6f7182514d3b828a531f51a62717667b8be1a99bea787cd2128f86356a0db5cd246942d7376025c4a39d9fb2c23a31d8ed51dcdd6268dc79faa527b27351332577f6bb844699030a18e02bc0be3abaec58b6209b218c795a1dc51be4c85205a7e796301b4138d4a7a92cd8114a5e3b86ba64da227e1cd88cb43ea22ee1a150475baf29c01908a9858b10cb17cf032b00a3878d064c226c3d0428959d1547a954686796d7064ea3ea36b86a2e917e54dd7eea7a68a90443149245d700a3156c414f94c6baba97893eebe6fe4132efc2487e4aa4d93fdc1d75fdee41a57d31ec21577033ce756d887c6e831c6664caaaa50fa306f4ea7c10920a1700f6bf6564f1783ebe47e7e4185d68d3d0cae2978cb9e82ae7d48a990fbaacbc145f2bfb94a60d0cf6ba15df484858d631e7d11fa065338819d262e040e8a4ab07350d541d84e7a2eef25ac2d02bc48b543c8427abfc3a23237bb3fa778ef6172a96ec8b8b247cd14b76b1b886fad2767fa52ac3b73b11639b03be28be8117f27b81614a40f63fcf37f25616e060e7efce9fa487caa641ffb152f08c1f0226312f13392d8be551727d04fa056908f3b9c4750cf420ac4b5171bba4f17b214c23654c121f6154f7a4e58630c20292f4c7c71ca48ffa7c2882d0ed31bffa66dc48a491257baefa3118cebcead6905411089e5d882b240c6921e62a65605fae2f3903367b993cec6cb9da3b480709a1bd3f0552393634ad13e616432adc1f57d06321dc9c0de333a85267a298bead6370f5c7ea7d0c9693b48492a7576241b920766daee1f7fdf6750fe46bb5094e36b1d12f3fb7dc1b1bc9f43bea83846d2ff49f6ec630d7c61b6dbd7471b73684caae47bd52ad53071705256c36ee2d8a988a59abeab2e090dca5543ad264e4ed621eb6a43ebb93232e471bac995a328fdb060fa142f0d7ad419dfc84f8ecf39638e251f1ed4df41ae49b710e9e90745f87ce0f9d8dc7129b08437b6cb3f37998244e2435afaa4ea61bb8d2c664a3094eb7d197f6a9bdf4d6552b5143eaf6da458676a85f7395507b5281bf1e"}]}, @generic="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", @nested={0x110, 0x63, 0x0, 0x1, [@generic="88340b4b964985bf5dc6cd9dd1821d8cc7b568926e87c20e85c297a6184f22b074f359814f3d8cd00d985c087d06352252c882ceec841667cf7614e5c984e118ac4f58e8b7b97410fae084c7f5cc325d07c2fda88492b5c073e046ca1b", @typed={0xc, 0x51, 0x0, 0x0, @u64=0x5}, @typed={0x8, 0x4e, 0x0, 0x0, @pid=r3}, @typed={0x4, 0x19}, @typed={0x8, 0x64, 0x0, 0x0, @fd=r4}, @typed={0x7, 0x95, 0x0, 0x0, @str='\\%\x00'}, @generic="d56aaeb1c44f7e134099486fc6dc406c4b5880a4c71db8d8d50ed247d146e355883c7c1ac74166eaf76129b933b9418b6230fea724ca8fdf586c7fbbc1997b000f49", @generic="ba2a8ddce561f36ce4873204233095468b4244a072aa526f7629018ad6297c8166849d2cd8ec3d4421bfa92cee4ddbf470646d3bce51578b34ea1b69fb70ee9d459d25a0ca"]}]}, 0x320c}, {&(0x7f0000003a40)={0x11cc, 0x2f, 0x4, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x8, 0x4c, 0x0, 0x0, @u32=0xa83}, @generic="50cd043d5f7850ed667478365a7e2f3a8e3dc3eefeadc316048a601f0891f4823e9f6c3039005d1691ecf9a51ce8b5c05db71e613e72710fafe67a5248434773aa04a0cc6d6c8225aa9970f8b962cee78dbf4237e4e6557fab0c9b7030e3a195ae40705a1e96654600062228b6efecd14367858b6b4d4fe8f11084863c30185fe7771202451155428d2d626b", @generic="0d0aed4cb5a0e22cc94f6140c0f593b1481a07f00146c4377d8dca3ccb4e961c94e6bf957047f9808dbcc7a4e92119f610cef8397ca570b9d117", @typed={0x8, 0x3a, 0x0, 0x0, @str='-}!\x00'}, @nested={0x10e1, 0x38, 0x0, 0x1, [@generic="88a02a287c84ad06c5685a7d8751fecc6c9598b26afb4186db4984fba74398917058822b0b005d20d57f1b34ec16a0494aa63d268bae8bb763d4d09567544703815edb886cba338bc8afb6146363262b8e35f82fa02a9493149b55d6364be7cb1e37cf7214bd016223ce658514510c39178f282b13509b302fd5003dd8a93b5ae4fc968260d7ba1e89b8c35a9e2cd7270e76de3a21c2764bb2a746d34e8ec3e92ce2bbac309eed", @typed={0xc, 0x49, 0x0, 0x0, @u64=0x100000000}, @generic="3e812c40eb31ece125a9d91bd209c45e111f20d7d398", @typed={0x8, 0x8f, 0x0, 0x0, @ipv4=@remote}, @typed={0x4, 0x78}, @generic="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", @typed={0x8, 0x38, 0x0, 0x0, @u32}]}]}, 0x11cc}], 0x2, &(0x7f0000000140)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r8}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, r10}}}], 0x58, 0x4000810}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 868.150951] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 868.169336] FAULT_INJECTION: forcing a failure. [ 868.169336] name failslab, interval 1, probability 0, space 0, times 0 [ 868.219768] CPU: 0 PID: 2814 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 868.227601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.236947] Call Trace: [ 868.239541] dump_stack+0x1b2/0x283 [ 868.243170] should_fail.cold+0x10a/0x154 [ 868.247317] should_failslab+0xd6/0x130 [ 868.251289] kmem_cache_alloc_node+0x263/0x410 [ 868.255871] __alloc_skb+0x5c/0x510 [ 868.259499] sk_stream_alloc_skb+0xb1/0x760 [ 868.263822] ? tcp_send_mss+0x9f/0x2e0 [ 868.267731] ? ipv6_frag_exit+0x40/0x40 [ 868.271704] do_tcp_sendpages+0x835/0x1750 [ 868.275951] ? sk_stream_alloc_skb+0x760/0x760 [ 868.280549] tls_push_sg+0x1ee/0x760 [ 868.284270] tls_push_record+0xa81/0x1270 [ 868.288429] tls_sw_sendmsg+0xbb0/0xfd0 [ 868.292410] ? selinux_socket_sendmsg+0x1d8/0x260 [ 868.297248] ? selinux_socket_getpeername+0x260/0x260 [ 868.302463] ? tls_sw_push_pending_record+0x30/0x30 [ 868.307481] ? __fget+0x225/0x360 [ 868.310933] inet_sendmsg+0x11a/0x4e0 [ 868.314730] ? security_socket_sendmsg+0x83/0xb0 [ 868.319484] ? inet_recvmsg+0x4d0/0x4d0 [ 868.323469] sock_sendmsg+0xb5/0x100 [ 868.327186] SyS_sendto+0x1c7/0x2c0 [ 868.330818] ? SyS_getpeername+0x220/0x220 [ 868.335055] ? lock_downgrade+0x740/0x740 [ 868.339211] ? wait_for_completion_io+0x10/0x10 [ 868.343875] ? vfs_write+0x319/0x4d0 [ 868.347589] ? fput+0xb/0x140 [ 868.350688] ? SyS_write+0x14d/0x210 [ 868.354395] ? SyS_read+0x210/0x210 [ 868.358030] ? SyS_clock_settime+0x1a0/0x1a0 [ 868.362441] ? do_syscall_64+0x4c/0x640 [ 868.366414] ? SyS_getpeername+0x220/0x220 [ 868.370650] do_syscall_64+0x1d5/0x640 [ 868.374558] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 868.379740] RIP: 0033:0x45dd99 [ 868.382921] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 868.390624] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 868.397887] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 868.405150] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 868.412415] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000002c [ 868.419727] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x5], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$ax25(r4, &(0x7f0000000180)={{0x3, @null, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) sendmsg$IPCTNL_MSG_CT_GET_STATS(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x4081) 15:42:49 executing program 3 (fault-call:7 fault-nth:45): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 868.546705] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 868.568161] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 868.606409] FAULT_INJECTION: forcing a failure. [ 868.606409] name failslab, interval 1, probability 0, space 0, times 0 [ 868.644235] CPU: 1 PID: 2829 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 868.652065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.661416] Call Trace: [ 868.664029] dump_stack+0x1b2/0x283 [ 868.667661] should_fail.cold+0x10a/0x154 [ 868.671812] should_failslab+0xd6/0x130 [ 868.675789] kmem_cache_alloc_node_trace+0x25a/0x400 [ 868.680899] __kmalloc_node_track_caller+0x38/0x70 [ 868.685832] __alloc_skb+0x96/0x510 [ 868.689464] sk_stream_alloc_skb+0xb1/0x760 [ 868.693784] ? tcp_send_mss+0x9f/0x2e0 [ 868.697669] ? ipv6_frag_exit+0x40/0x40 [ 868.701642] do_tcp_sendpages+0x835/0x1750 [ 868.705888] ? sk_stream_alloc_skb+0x760/0x760 [ 868.710476] tls_push_sg+0x1ee/0x760 [ 868.714196] tls_push_record+0xa81/0x1270 [ 868.718353] tls_sw_sendmsg+0xbb0/0xfd0 [ 868.722330] ? selinux_socket_sendmsg+0x1d8/0x260 [ 868.727175] ? selinux_socket_getpeername+0x260/0x260 [ 868.732369] ? tls_sw_push_pending_record+0x30/0x30 [ 868.737384] ? __fget+0x225/0x360 [ 868.740839] inet_sendmsg+0x11a/0x4e0 [ 868.744637] ? security_socket_sendmsg+0x83/0xb0 [ 868.749389] ? inet_recvmsg+0x4d0/0x4d0 [ 868.753365] sock_sendmsg+0xb5/0x100 [ 868.757082] SyS_sendto+0x1c7/0x2c0 [ 868.760707] ? SyS_getpeername+0x220/0x220 [ 868.764973] ? lock_downgrade+0x740/0x740 [ 868.769125] ? wait_for_completion_io+0x10/0x10 [ 868.773786] ? vfs_write+0x319/0x4d0 [ 868.777492] ? fput+0xb/0x140 [ 868.780595] ? SyS_write+0x14d/0x210 [ 868.784299] ? SyS_read+0x210/0x210 [ 868.787918] ? SyS_clock_settime+0x1a0/0x1a0 [ 868.792347] ? do_syscall_64+0x4c/0x640 [ 868.796315] ? SyS_getpeername+0x220/0x220 [ 868.800546] do_syscall_64+0x1d5/0x640 15:42:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0xa) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 868.804432] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 868.809610] RIP: 0033:0x45dd99 [ 868.812787] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 868.820489] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 868.827750] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 868.835013] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 868.842295] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000002d [ 868.849562] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:49 executing program 0: setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000000)=0x6b, 0x4) prctl$PR_GET_TIMERSLACK(0x1e) r0 = socket$netlink(0x10, 0x3, 0x14) r1 = dup(r0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x800, 0x4}, 0x90) 15:42:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e22, @empty}}, 0x0, 0x0, 0x9, 0x0, "33edbaf5713650622e80c24fc25901043482d6cdbbc0dc8288e5e4474ae73d49a03fc0e9758ffa596b73e83e6819a8feced1adeb7c62f3b46b36b1eb7a42bc9f456f83d4457705cf5d1d65ded17be9c2"}, 0xd8) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, 0xffffffffffffffff) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:50 executing program 4: ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x8f3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0xff, @any, 0x2, 0x2}, 0xe) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000000)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000001c0)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r4}}]}, 0x28}}, 0x0) setreuid(r4, 0x0) 15:42:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000000)={0x2, 0x0, 0x3, 0x3, '\x00', 0x7f}) rmdir(&(0x7f0000000040)='./file0\x00') [ 868.972298] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x2, 0x140) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x4) semctl$SEM_STAT(r2, 0x0, 0x12, &(0x7f0000000000)=""/162) 15:42:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x1f, 0x40, 0x4, 0x80, 0x0, 0x80000001, 0x600, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x4500, 0xe8cc, 0x4, 0x8, 0x7, 0xfffffffa, 0x7fff}, r1, 0x7, r1, 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_START_NAN(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r4, 0x220, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x9}, @NL80211_ATTR_NAN_MASTER_PREF={0x5}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x5}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x20}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x801}, 0x24044000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x4000000009, 0x0) recvfrom(r0, &(0x7f0000000000)=""/253, 0xfd, 0x1, &(0x7f0000000100)=@ethernet={0x306}, 0x80) semop(r2, &(0x7f0000000280)=[{0x0, 0x0, 0x1800}], 0x1) semctl$SEM_STAT(r2, 0x0, 0x12, &(0x7f0000000740)=""/157) prctl$PR_SET_ENDIAN(0x14, 0x0) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) 15:42:50 executing program 3 (fault-call:7 fault-nth:46): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000100)="e8a6d96fc792e7e5549b9f6dc910ae0113665e0efc4b190a3f8a737e5eb6f8c42a8f3d3b9650a9594fcf85266711213a1907b5ba880f81a345be7785eeff000000000000008570c64b6c64e894e2c35ab8078cccd760fc5d1a8db58371a54b3d63b8822f0db4753ac17d6d969dc403340e", &(0x7f0000000080)=@tcp6=r1, 0x4}, 0x20) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 869.329943] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 869.349155] FAULT_INJECTION: forcing a failure. [ 869.349155] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 869.376811] CPU: 1 PID: 2872 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 869.384637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.393994] Call Trace: [ 869.396595] dump_stack+0x1b2/0x283 [ 869.400231] should_fail.cold+0x10a/0x154 [ 869.404388] __alloc_pages_nodemask+0x22c/0x2720 [ 869.409150] ? kasan_slab_free+0xc3/0x1a0 [ 869.413304] ? tls_push_record+0xc3b/0x1270 [ 869.417626] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 869.421770] ? inet_sendmsg+0x11a/0x4e0 [ 869.425747] ? do_syscall_64+0x1d5/0x640 [ 869.429806] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 869.435168] ? tcp_tx_timestamp+0x17/0x250 [ 869.439407] ? debug_check_no_obj_freed+0x2c0/0x674 [ 869.444429] ? lock_acquire+0x170/0x3f0 [ 869.448407] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 869.453267] ? debug_check_no_obj_freed+0x2c0/0x674 [ 869.458315] alloc_pages_current+0x155/0x260 [ 869.462724] ? tls_push_record+0xc3b/0x1270 [ 869.467048] skb_page_frag_refill+0x1bf/0x490 [ 869.471543] sk_page_frag_refill+0x4a/0x1b0 [ 869.475861] alloc_sg+0x13e/0x730 [ 869.479316] tls_sw_sendmsg+0x49a/0xfd0 [ 869.483294] ? selinux_socket_sendmsg+0x1d8/0x260 [ 869.488136] ? selinux_socket_getpeername+0x260/0x260 [ 869.493330] ? tls_sw_push_pending_record+0x30/0x30 [ 869.498347] ? __fget+0x225/0x360 [ 869.501798] inet_sendmsg+0x11a/0x4e0 [ 869.505594] ? security_socket_sendmsg+0x83/0xb0 [ 869.510345] ? inet_recvmsg+0x4d0/0x4d0 [ 869.514320] sock_sendmsg+0xb5/0x100 [ 869.518032] SyS_sendto+0x1c7/0x2c0 [ 869.521654] ? SyS_getpeername+0x220/0x220 [ 869.525888] ? lock_downgrade+0x740/0x740 [ 869.530043] ? wait_for_completion_io+0x10/0x10 [ 869.534712] ? vfs_write+0x319/0x4d0 [ 869.538425] ? fput+0xb/0x140 [ 869.541523] ? SyS_write+0x14d/0x210 [ 869.545240] ? SyS_read+0x210/0x210 [ 869.548864] ? SyS_clock_settime+0x1a0/0x1a0 [ 869.553310] ? do_syscall_64+0x4c/0x640 [ 869.557308] ? SyS_getpeername+0x220/0x220 [ 869.561552] do_syscall_64+0x1d5/0x640 [ 869.565447] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 869.570651] RIP: 0033:0x45dd99 [ 869.573837] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 869.581545] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 869.588811] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 869.596076] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 869.603374] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000002e [ 869.610645] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:50 executing program 2: socket$netlink(0x10, 0x3, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fb0\x00', 0x800, 0x0) r0 = syz_mount_image$nfs(&(0x7f0000000100)='nfs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x1, &(0x7f0000000280)=[{&(0x7f0000000180)="5bc29c5af0d1a6da21a52315bb57d3329df3d63dfd4b4baae4970a2aec0ec42e8c3cd5aaeb8df28c4262ae940b9421196678dac05a85daa073b5bb21672eb9887e5af9643931c9ce60e27ce76e8d9cb89a2d48b7a0adfba748f4b8dfa2f774c467803754607d174dd6ca0cf0c68966580838536b50ad2b9fcc0ab98eb18d45fedfe96a3e6955cf34454b489ac6daaa6870d0812ad7401b5ebbceae2f4f3a565eca3bae7f9397d861306be616ec61eb35b49b711627253364c423d0be9e1014220f714f63c7861acab0c0922f1a3a995ad9f005b30bb241989178cb5be215ef4dd1bdf7c9084b6a273065f2", 0xeb, 0x3ed9}], 0x1000, &(0x7f00000002c0)={[{'/dev/dlm-monitor\x00'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup(r0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x82200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x42d) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$PNPIPE_ENCAP(r6, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 15:42:50 executing program 3 (fault-call:7 fault-nth:47): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 869.773039] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 869.839317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 869.870642] FAULT_INJECTION: forcing a failure. [ 869.870642] name failslab, interval 1, probability 0, space 0, times 0 [ 869.899746] CPU: 1 PID: 2895 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 869.907595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.916949] Call Trace: [ 869.919541] dump_stack+0x1b2/0x283 [ 869.923172] should_fail.cold+0x10a/0x154 [ 869.927340] should_failslab+0xd6/0x130 [ 869.931335] __kmalloc+0x2c1/0x400 [ 869.934879] ? tls_push_record+0xfa/0x1270 [ 869.939127] tls_push_record+0xfa/0x1270 [ 869.943204] ? sk_page_frag_refill+0x56/0x1b0 [ 869.947713] tls_sw_sendmsg+0xbb0/0xfd0 [ 869.951706] ? selinux_socket_sendmsg+0x1d8/0x260 [ 869.956545] ? selinux_socket_getpeername+0x260/0x260 [ 869.961737] ? tls_sw_push_pending_record+0x30/0x30 [ 869.966778] ? __fget+0x225/0x360 [ 869.970235] inet_sendmsg+0x11a/0x4e0 [ 869.974031] ? security_socket_sendmsg+0x83/0xb0 [ 869.978788] ? inet_recvmsg+0x4d0/0x4d0 [ 869.982781] sock_sendmsg+0xb5/0x100 [ 869.986501] SyS_sendto+0x1c7/0x2c0 [ 869.990124] ? SyS_getpeername+0x220/0x220 [ 869.994358] ? lock_downgrade+0x740/0x740 [ 869.998517] ? wait_for_completion_io+0x10/0x10 [ 870.003203] ? vfs_write+0x319/0x4d0 [ 870.006934] ? fput+0xb/0x140 [ 870.010035] ? SyS_write+0x14d/0x210 [ 870.013746] ? SyS_read+0x210/0x210 [ 870.017370] ? SyS_clock_settime+0x1a0/0x1a0 [ 870.021776] ? do_syscall_64+0x4c/0x640 [ 870.025748] ? SyS_getpeername+0x220/0x220 [ 870.029988] do_syscall_64+0x1d5/0x640 [ 870.033882] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 870.039066] RIP: 0033:0x45dd99 [ 870.042248] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 870.049956] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 870.057224] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 870.064500] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 870.071766] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000002f [ 870.079029] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:51 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101801, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xb5d5) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) 15:42:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x5) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0xe43) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1000000000400203) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000000c0)=""/165) 15:42:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0xfffffffe) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x5a, 0x1, 0x2, 0x2, 0x0, 0x401, 0x8754a, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000005c0), 0x2}, 0x530, 0xfff, 0x3, 0x2, 0x6b, 0x9c46, 0x6}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0xd) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x2) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)={0x14, r4, 0xc91add0bf88807dd, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000400)={0x6, 0xffffffffffffffff, 0x1}) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r5, 0x4018f50b, &(0x7f0000000480)={0x1, 0x41, 0x5}) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x140, r4, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x140}, 0x1, 0x0, 0x0, 0x41}, 0x20044800) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x82, 0x0) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f0000000500)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000540), 0x1, 0x0) 15:42:51 executing program 3 (fault-call:7 fault-nth:48): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x4000000009, 0x0) semop(r2, &(0x7f0000000280)=[{0x0, 0x0, 0x1800}], 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000740)=""/143) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x170, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}]}, 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000240), 0x4) 15:42:51 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x30100, 0x0) [ 870.247834] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 870.264963] FAULT_INJECTION: forcing a failure. [ 870.264963] name failslab, interval 1, probability 0, space 0, times 0 [ 870.311427] CPU: 1 PID: 2911 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 870.319267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.328623] Call Trace: [ 870.331217] dump_stack+0x1b2/0x283 [ 870.334854] should_fail.cold+0x10a/0x154 [ 870.339014] should_failslab+0xd6/0x130 [ 870.342993] __kmalloc+0x6d/0x400 [ 870.346449] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 870.351667] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 870.356712] ? generic_gcmaes_encrypt+0xf4/0x130 [ 870.361464] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 870.366303] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 870.371319] ? __kmalloc+0x3a4/0x400 [ 870.375030] ? tls_push_record+0xfa/0x1270 [ 870.379260] ? cryptd_aead_child+0x9/0x40 [ 870.383407] ? tls_push_record+0x938/0x1270 [ 870.387754] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 870.391917] ? selinux_socket_sendmsg+0x1d8/0x260 [ 870.396763] ? selinux_socket_getpeername+0x260/0x260 [ 870.401961] ? tls_sw_push_pending_record+0x30/0x30 [ 870.406984] ? __fget+0x225/0x360 [ 870.410456] ? inet_sendmsg+0x11a/0x4e0 [ 870.414438] ? security_socket_sendmsg+0x83/0xb0 [ 870.419195] ? inet_recvmsg+0x4d0/0x4d0 [ 870.423212] ? sock_sendmsg+0xb5/0x100 [ 870.427111] ? SyS_sendto+0x1c7/0x2c0 [ 870.430910] ? SyS_getpeername+0x220/0x220 [ 870.435147] ? lock_downgrade+0x740/0x740 [ 870.439303] ? wait_for_completion_io+0x10/0x10 [ 870.443971] ? vfs_write+0x319/0x4d0 [ 870.447693] ? fput+0xb/0x140 [ 870.450796] ? SyS_write+0x14d/0x210 [ 870.454508] ? SyS_read+0x210/0x210 [ 870.458131] ? SyS_clock_settime+0x1a0/0x1a0 [ 870.462538] ? do_syscall_64+0x4c/0x640 [ 870.466510] ? SyS_getpeername+0x220/0x220 [ 870.470744] ? do_syscall_64+0x1d5/0x640 [ 870.474806] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 870.496560] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2922 comm=syz-executor.2 15:42:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) read(r0, &(0x7f0000000000)=""/195, 0xc3) r1 = dup(r0) read$dsp(0xffffffffffffffff, &(0x7f0000000100)=""/131, 0x83) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/157) 15:42:51 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x480, 0x0) [ 870.532870] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2926 comm=syz-executor.2 15:42:51 executing program 3 (fault-call:7 fault-nth:49): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:51 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x57f5c6, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x10) [ 870.673119] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 870.699578] FAULT_INJECTION: forcing a failure. [ 870.699578] name failslab, interval 1, probability 0, space 0, times 0 [ 870.723135] CPU: 0 PID: 2941 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 870.730960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.740310] Call Trace: [ 870.742901] dump_stack+0x1b2/0x283 [ 870.746534] should_fail.cold+0x10a/0x154 [ 870.750686] should_failslab+0xd6/0x130 [ 870.754660] kmem_cache_alloc_node+0x263/0x410 [ 870.759245] __alloc_skb+0x5c/0x510 [ 870.762870] sk_stream_alloc_skb+0xb1/0x760 [ 870.767189] ? __sk_mem_schedule+0x99/0xd0 [ 870.771418] ? ipv6_frag_exit+0x40/0x40 [ 870.775391] do_tcp_sendpages+0x835/0x1750 [ 870.779635] ? sk_stream_alloc_skb+0x760/0x760 [ 870.784222] tls_push_sg+0x1ee/0x760 [ 870.787945] tls_push_record+0xa81/0x1270 [ 870.792106] tls_sw_sendmsg+0xbb0/0xfd0 [ 870.796086] ? selinux_socket_sendmsg+0x1d8/0x260 [ 870.800929] ? selinux_socket_getpeername+0x260/0x260 [ 870.806135] ? tls_sw_push_pending_record+0x30/0x30 [ 870.811159] ? __fget+0x225/0x360 [ 870.814616] inet_sendmsg+0x11a/0x4e0 [ 870.818411] ? security_socket_sendmsg+0x83/0xb0 [ 870.823161] ? inet_recvmsg+0x4d0/0x4d0 [ 870.827140] sock_sendmsg+0xb5/0x100 [ 870.830849] SyS_sendto+0x1c7/0x2c0 [ 870.834475] ? SyS_getpeername+0x220/0x220 [ 870.838710] ? lock_downgrade+0x740/0x740 [ 870.842864] ? wait_for_completion_io+0x10/0x10 [ 870.847529] ? vfs_write+0x319/0x4d0 [ 870.851237] ? fput+0xb/0x140 [ 870.854341] ? SyS_write+0x14d/0x210 [ 870.858050] ? SyS_read+0x210/0x210 [ 870.861671] ? SyS_clock_settime+0x1a0/0x1a0 [ 870.866077] ? do_syscall_64+0x4c/0x640 [ 870.870046] ? SyS_getpeername+0x220/0x220 [ 870.874283] do_syscall_64+0x1d5/0x640 [ 870.878177] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 870.883362] RIP: 0033:0x45dd99 [ 870.886544] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 870.894254] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 870.901516] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 870.908781] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 870.916045] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000031 15:42:52 executing program 3 (fault-call:7 fault-nth:50): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:52 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) fadvise64(r1, 0x62c2, 0xaa, 0x2) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) [ 870.923314] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 871.007473] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 871.022492] FAULT_INJECTION: forcing a failure. [ 871.022492] name failslab, interval 1, probability 0, space 0, times 0 [ 871.055661] CPU: 1 PID: 2950 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 871.063503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.072850] Call Trace: [ 871.075447] dump_stack+0x1b2/0x283 [ 871.079078] should_fail.cold+0x10a/0x154 [ 871.083230] should_failslab+0xd6/0x130 [ 871.087203] __kmalloc+0x6d/0x400 [ 871.090655] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 871.095846] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 871.100870] ? generic_gcmaes_encrypt+0xf4/0x130 [ 871.105627] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 871.110471] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 871.115492] ? __kmalloc+0x3a4/0x400 [ 871.119206] ? tls_push_record+0xfa/0x1270 [ 871.123465] ? cryptd_aead_child+0x9/0x40 [ 871.127631] ? tls_push_record+0x938/0x1270 [ 871.131957] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 871.136112] ? selinux_socket_sendmsg+0x1d8/0x260 [ 871.140954] ? selinux_socket_getpeername+0x260/0x260 [ 871.146175] ? tls_sw_push_pending_record+0x30/0x30 [ 871.151195] ? __fget+0x225/0x360 [ 871.154644] ? inet_sendmsg+0x11a/0x4e0 [ 871.158615] ? security_socket_sendmsg+0x83/0xb0 [ 871.163366] ? inet_recvmsg+0x4d0/0x4d0 [ 871.167340] ? sock_sendmsg+0xb5/0x100 [ 871.171220] ? SyS_sendto+0x1c7/0x2c0 [ 871.175012] ? SyS_getpeername+0x220/0x220 [ 871.179249] ? lock_downgrade+0x740/0x740 [ 871.183404] ? wait_for_completion_io+0x10/0x10 [ 871.188071] ? vfs_write+0x319/0x4d0 [ 871.191803] ? fput+0xb/0x140 [ 871.194907] ? SyS_write+0x14d/0x210 [ 871.198615] ? SyS_read+0x210/0x210 [ 871.202236] ? SyS_clock_settime+0x1a0/0x1a0 [ 871.206639] ? do_syscall_64+0x4c/0x640 [ 871.210607] ? SyS_getpeername+0x220/0x220 [ 871.214838] ? do_syscall_64+0x1d5/0x640 [ 871.218918] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:42:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$IOC_PR_RESERVE(r3, 0x401070c9, &(0x7f0000000000)={0xd528802, 0x20}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$x25(r3, &(0x7f0000000000)={0x9, @remote={[], 0x2}}, 0x12) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$CHAR_RAW_BSZSET(r3, 0x40081271, &(0x7f00000000c0)=0x6) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto$inet6(r5, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0) [ 871.359184] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 871.383738] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:52 executing program 3 (fault-call:7 fault-nth:51): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r2, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x1f}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x8004}, 0x5) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) dup2(0xffffffffffffffff, r0) 15:42:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r8, 0x0) setgroups(0x2, &(0x7f0000000080)=[r8, r8]) sendmsg$unix(r3, &(0x7f0000000240)={&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000140)="244a2bd1e296c512615a67c23012c295", 0x10}], 0x1, &(0x7f00000001c0)=[@rights={{0x28, 0x1, 0x1, [r4, r1, 0xffffffffffffffff, r6, r1, r2]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r8}}}], 0x48, 0x51}, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000000)=""/123, &(0x7f0000000080)=0x7b) r9 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 871.566021] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 871.581934] FAULT_INJECTION: forcing a failure. [ 871.581934] name failslab, interval 1, probability 0, space 0, times 0 [ 871.599425] CPU: 1 PID: 2980 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 871.607237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.616587] Call Trace: [ 871.619198] dump_stack+0x1b2/0x283 [ 871.622842] should_fail.cold+0x10a/0x154 [ 871.626990] should_failslab+0xd6/0x130 [ 871.630959] __kmalloc+0x2c1/0x400 [ 871.634495] ? tls_push_record+0xfa/0x1270 [ 871.638736] tls_push_record+0xfa/0x1270 [ 871.642801] ? sk_page_frag_refill+0x56/0x1b0 [ 871.647304] tls_sw_sendmsg+0xbb0/0xfd0 [ 871.651278] ? selinux_socket_sendmsg+0x1d8/0x260 [ 871.656168] ? selinux_socket_getpeername+0x260/0x260 [ 871.661361] ? tls_sw_push_pending_record+0x30/0x30 [ 871.666378] ? __fget+0x225/0x360 [ 871.669829] inet_sendmsg+0x11a/0x4e0 [ 871.673624] ? security_socket_sendmsg+0x83/0xb0 [ 871.678373] ? inet_recvmsg+0x4d0/0x4d0 [ 871.682344] sock_sendmsg+0xb5/0x100 [ 871.686049] SyS_sendto+0x1c7/0x2c0 [ 871.689668] ? SyS_getpeername+0x220/0x220 [ 871.693901] ? lock_downgrade+0x740/0x740 [ 871.698056] ? wait_for_completion_io+0x10/0x10 [ 871.702724] ? vfs_write+0x319/0x4d0 [ 871.706436] ? fput+0xb/0x140 [ 871.709538] ? SyS_write+0x14d/0x210 [ 871.713247] ? SyS_read+0x210/0x210 [ 871.716872] ? SyS_clock_settime+0x1a0/0x1a0 [ 871.721279] ? do_syscall_64+0x4c/0x640 [ 871.725251] ? SyS_getpeername+0x220/0x220 [ 871.729485] do_syscall_64+0x1d5/0x640 [ 871.733374] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 871.738556] RIP: 0033:0x45dd99 [ 871.741740] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 871.749447] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 871.756712] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 871.763978] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 871.771242] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000033 [ 871.778503] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 871.800393] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x25492b5b087e906f) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:52 executing program 3 (fault-call:7 fault-nth:52): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:53 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x80800) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x800000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport='privport'}, {@loose='loose'}, {@mmap='mmap'}], [{@dont_measure='dont_measure'}, {@obj_type={'obj_type', 0x3d, '/dev/full\x00'}}]}}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x3c1800, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 871.936960] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 871.973990] FAULT_INJECTION: forcing a failure. [ 871.973990] name failslab, interval 1, probability 0, space 0, times 0 [ 872.010807] CPU: 1 PID: 2999 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 872.018632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.027983] Call Trace: [ 872.030575] dump_stack+0x1b2/0x283 [ 872.034206] should_fail.cold+0x10a/0x154 [ 872.038374] should_failslab+0xd6/0x130 [ 872.042346] __kmalloc+0x6d/0x400 [ 872.045799] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 872.050991] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 872.056016] ? generic_gcmaes_encrypt+0xf4/0x130 [ 872.060769] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 872.065607] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 872.070619] ? __kmalloc+0x3a4/0x400 [ 872.074329] ? tls_push_record+0xfa/0x1270 [ 872.078562] ? cryptd_aead_child+0x9/0x40 [ 872.082709] ? tls_push_record+0x938/0x1270 [ 872.087039] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 872.091279] ? selinux_socket_sendmsg+0x1d8/0x260 [ 872.096157] ? selinux_socket_getpeername+0x260/0x260 [ 872.101379] ? tls_sw_push_pending_record+0x30/0x30 [ 872.106399] ? __fget+0x225/0x360 [ 872.109856] ? inet_sendmsg+0x11a/0x4e0 [ 872.113827] ? security_socket_sendmsg+0x83/0xb0 [ 872.118576] ? inet_recvmsg+0x4d0/0x4d0 [ 872.122552] ? sock_sendmsg+0xb5/0x100 [ 872.126436] ? SyS_sendto+0x1c7/0x2c0 [ 872.130229] ? SyS_getpeername+0x220/0x220 [ 872.134461] ? lock_downgrade+0x740/0x740 [ 872.138620] ? wait_for_completion_io+0x10/0x10 [ 872.143293] ? vfs_write+0x319/0x4d0 [ 872.147001] ? fput+0xb/0x140 [ 872.150097] ? SyS_write+0x14d/0x210 [ 872.153806] ? SyS_read+0x210/0x210 [ 872.157428] ? SyS_clock_settime+0x1a0/0x1a0 [ 872.161829] ? do_syscall_64+0x4c/0x640 [ 872.165800] ? SyS_getpeername+0x220/0x220 [ 872.170029] ? do_syscall_64+0x1d5/0x640 [ 872.174092] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:42:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NL80211_CMD_START_SCHED_SCAN(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_SCAN_SSIDS={0x1c, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ap_ssid}]}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2}, 0x40) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:53 executing program 3 (fault-call:7 fault-nth:53): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 872.245368] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3015 comm=syz-executor.2 [ 872.279528] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 872.283801] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3021 comm=syz-executor.2 [ 872.332831] FAULT_INJECTION: forcing a failure. [ 872.332831] name failslab, interval 1, probability 0, space 0, times 0 [ 872.379391] CPU: 0 PID: 3020 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 872.387237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.396592] Call Trace: [ 872.399184] dump_stack+0x1b2/0x283 [ 872.402819] should_fail.cold+0x10a/0x154 [ 872.407001] should_failslab+0xd6/0x130 [ 872.410976] __kmalloc+0x2c1/0x400 [ 872.414512] ? tls_push_record+0xfa/0x1270 [ 872.418767] tls_push_record+0xfa/0x1270 [ 872.422821] ? sk_page_frag_refill+0x56/0x1b0 [ 872.427321] tls_sw_sendmsg+0xbb0/0xfd0 [ 872.431299] ? selinux_socket_sendmsg+0x1d8/0x260 [ 872.436138] ? selinux_socket_getpeername+0x260/0x260 [ 872.441344] ? tls_sw_push_pending_record+0x30/0x30 [ 872.446359] ? __fget+0x225/0x360 [ 872.449815] inet_sendmsg+0x11a/0x4e0 [ 872.453621] ? security_socket_sendmsg+0x83/0xb0 [ 872.458403] ? inet_recvmsg+0x4d0/0x4d0 [ 872.463070] sock_sendmsg+0xb5/0x100 [ 872.466791] SyS_sendto+0x1c7/0x2c0 [ 872.470526] ? SyS_getpeername+0x220/0x220 [ 872.474773] ? lock_downgrade+0x740/0x740 [ 872.478926] ? wait_for_completion_io+0x10/0x10 [ 872.483599] ? vfs_write+0x319/0x4d0 [ 872.487314] ? fput+0xb/0x140 [ 872.490422] ? SyS_write+0x14d/0x210 [ 872.494129] ? SyS_read+0x210/0x210 [ 872.497750] ? SyS_clock_settime+0x1a0/0x1a0 [ 872.503282] ? do_syscall_64+0x4c/0x640 [ 872.507252] ? SyS_getpeername+0x220/0x220 [ 872.511483] do_syscall_64+0x1d5/0x640 [ 872.515373] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 872.520557] RIP: 0033:0x45dd99 15:42:53 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)=""/80, 0x50}], 0x1, 0x1, 0x20) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) 15:42:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f00000000c0)={0xae7800000}) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 872.523739] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 872.531441] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 872.538710] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 872.545976] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 872.553250] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000035 [ 872.560520] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:53 executing program 3 (fault-call:7 fault-nth:54): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:53 executing program 2: ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f0000000000)) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$can_raw(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000140)=@canfd={{0x0, 0x1, 0x1}, 0x0, 0x1, 0x0, 0x0, "4a0377e6ffec1772b164e809701bc21552285fafb44683ef7887b53a6b758b123523404eb3749cf06a2003c2feda8a41a5a3f3988f7f5c10dae469f26c20113e"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x20040000) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000002c0)={0x8000, 0x4, 0x0, 0x8, 0x8001}, 0x14) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x4) getsockname$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000240)=0x1c) [ 872.600498] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 872.667724] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 872.680832] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 872.709316] FAULT_INJECTION: forcing a failure. [ 872.709316] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 872.755867] CPU: 0 PID: 3049 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 872.763692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.773043] Call Trace: [ 872.775632] dump_stack+0x1b2/0x283 [ 872.779264] should_fail.cold+0x10a/0x154 [ 872.783436] __alloc_pages_nodemask+0x22c/0x2720 [ 872.788195] ? kasan_slab_free+0xc3/0x1a0 [ 872.792344] ? tls_push_record+0xc3b/0x1270 [ 872.796662] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 872.800806] ? inet_sendmsg+0x11a/0x4e0 [ 872.804778] ? do_syscall_64+0x1d5/0x640 [ 872.808836] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 872.814197] ? tcp_tx_timestamp+0x17/0x250 [ 872.818433] ? debug_check_no_obj_freed+0x2c0/0x674 [ 872.823453] ? lock_acquire+0x170/0x3f0 [ 872.827427] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 872.832313] ? debug_check_no_obj_freed+0x2c0/0x674 [ 872.837339] alloc_pages_current+0x155/0x260 [ 872.841751] ? tls_push_record+0xc3b/0x1270 [ 872.846073] skb_page_frag_refill+0x1bf/0x490 [ 872.850570] sk_page_frag_refill+0x4a/0x1b0 [ 872.854891] alloc_sg+0x13e/0x730 [ 872.858347] tls_sw_sendmsg+0x49a/0xfd0 [ 872.862329] ? selinux_socket_sendmsg+0x1d8/0x260 [ 872.867176] ? selinux_socket_getpeername+0x260/0x260 [ 872.872370] ? tls_sw_push_pending_record+0x30/0x30 [ 872.877393] ? __fget+0x225/0x360 [ 872.880847] inet_sendmsg+0x11a/0x4e0 [ 872.884641] ? security_socket_sendmsg+0x83/0xb0 [ 872.889397] ? inet_recvmsg+0x4d0/0x4d0 [ 872.893369] sock_sendmsg+0xb5/0x100 [ 872.897082] SyS_sendto+0x1c7/0x2c0 [ 872.900704] ? SyS_getpeername+0x220/0x220 [ 872.904939] ? lock_downgrade+0x740/0x740 [ 872.909106] ? wait_for_completion_io+0x10/0x10 [ 872.913803] ? vfs_write+0x319/0x4d0 [ 872.917514] ? fput+0xb/0x140 [ 872.920640] ? SyS_write+0x14d/0x210 [ 872.924350] ? SyS_read+0x210/0x210 [ 872.927974] ? SyS_clock_settime+0x1a0/0x1a0 [ 872.932376] ? do_syscall_64+0x4c/0x640 [ 872.936348] ? SyS_getpeername+0x220/0x220 [ 872.940607] do_syscall_64+0x1d5/0x640 [ 872.944498] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 872.949684] RIP: 0033:0x45dd99 15:42:54 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/262]) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r1, 0xc0389423, &(0x7f0000000080)={0x8, 0x48, [0x4, 0x8, 0x800000000000ff5, 0xd], &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x80, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, &(0x7f00000002c0)={@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, {&(0x7f0000000200)=""/123, 0x7b}, &(0x7f0000000280), 0x68}, 0xa0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f00000000c0)=""/19, &(0x7f0000000100)=0x13) semctl$SEM_STAT(0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 872.952863] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 872.960566] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 872.967830] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 872.975098] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 872.982367] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000036 [ 872.989633] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:54 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000000)) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 15:42:54 executing program 3 (fault-call:7 fault-nth:55): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 873.100041] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 873.118628] FAULT_INJECTION: forcing a failure. [ 873.118628] name failslab, interval 1, probability 0, space 0, times 0 [ 873.136782] CPU: 0 PID: 3079 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 873.144628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.154002] Call Trace: [ 873.156593] dump_stack+0x1b2/0x283 [ 873.160227] should_fail.cold+0x10a/0x154 [ 873.164376] should_failslab+0xd6/0x130 [ 873.168377] kmem_cache_alloc_node+0x263/0x410 [ 873.172969] __alloc_skb+0x5c/0x510 [ 873.176601] sk_stream_alloc_skb+0xb1/0x760 [ 873.180949] ? tcp_send_mss+0x9f/0x2e0 [ 873.184839] ? ipv6_frag_exit+0x40/0x40 [ 873.188813] do_tcp_sendpages+0x835/0x1750 [ 873.193057] ? sk_stream_alloc_skb+0x760/0x760 [ 873.197648] tls_push_sg+0x1ee/0x760 [ 873.201371] tls_push_record+0xa81/0x1270 [ 873.205531] tls_sw_sendmsg+0xbb0/0xfd0 [ 873.209541] ? selinux_socket_sendmsg+0x1d8/0x260 [ 873.214383] ? selinux_socket_getpeername+0x260/0x260 [ 873.219603] ? tls_sw_push_pending_record+0x30/0x30 [ 873.224624] ? __fget+0x225/0x360 [ 873.228077] inet_sendmsg+0x11a/0x4e0 [ 873.231871] ? security_socket_sendmsg+0x83/0xb0 [ 873.236636] ? inet_recvmsg+0x4d0/0x4d0 [ 873.240612] sock_sendmsg+0xb5/0x100 [ 873.244321] SyS_sendto+0x1c7/0x2c0 [ 873.247948] ? SyS_getpeername+0x220/0x220 [ 873.252186] ? lock_downgrade+0x740/0x740 [ 873.256342] ? wait_for_completion_io+0x10/0x10 [ 873.261010] ? vfs_write+0x319/0x4d0 [ 873.264720] ? fput+0xb/0x140 [ 873.267820] ? SyS_write+0x14d/0x210 [ 873.271530] ? SyS_read+0x210/0x210 [ 873.275156] ? SyS_clock_settime+0x1a0/0x1a0 [ 873.279563] ? do_syscall_64+0x4c/0x640 [ 873.283535] ? SyS_getpeername+0x220/0x220 [ 873.287767] do_syscall_64+0x1d5/0x640 [ 873.291660] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 873.296852] RIP: 0033:0x45dd99 [ 873.300032] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 873.307761] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 873.315029] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 873.322294] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 873.329559] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000037 [ 873.336823] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$can_bcm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x4, 0x4, 0x9, {0x0, 0x2710}, {0x0, 0x2710}, {0x2, 0x0, 0x1, 0x1}, 0x1, @can={{0x0, 0x1, 0x1, 0x1}, 0x3, 0x1, 0x0, 0x0, "d2f390ff421c8476"}}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4004004) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$NL80211_CMD_SET_MAC_ACL(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)={0x80, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5d, 0x27}}}}, [@NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}]}, 0x80}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r7, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r8, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x51}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x21}, @NL80211_ATTR_REG_RULES={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1}, @NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x81}]}, 0x48}, 0x1, 0x0, 0x0, 0x4044}, 0x20004000) r9 = socket$packet(0x11, 0x2, 0x300) bind$packet(r9, &(0x7f0000000340)={0x11, 0xd, 0x0, 0x1, 0x5, 0x6, @multicast}, 0x14) sendmsg$NL80211_CMD_DISASSOCIATE(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8401}, 0xc, &(0x7f0000000040)={&(0x7f0000001240)=ANY=[@ANYBLOB='p\t\x00\x00', @ANYRES16=r8, @ANYBLOB="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"], 0x970}, 0x1, 0x0, 0x0, 0x1c000100}, 0x0) 15:42:54 executing program 3 (fault-call:7 fault-nth:56): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 873.419219] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3093 comm=syz-executor.2 [ 873.448734] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 873.466603] FAULT_INJECTION: forcing a failure. [ 873.466603] name failslab, interval 1, probability 0, space 0, times 0 [ 873.472443] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 873.491319] CPU: 1 PID: 3100 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 873.499126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.508476] Call Trace: [ 873.511068] dump_stack+0x1b2/0x283 [ 873.514700] should_fail.cold+0x10a/0x154 [ 873.518856] should_failslab+0xd6/0x130 [ 873.522827] __kmalloc+0x2c1/0x400 [ 873.526392] ? tls_push_record+0xfa/0x1270 [ 873.530629] tls_push_record+0xfa/0x1270 [ 873.534690] ? sk_page_frag_refill+0x56/0x1b0 [ 873.539204] tls_sw_sendmsg+0xbb0/0xfd0 [ 873.543188] ? selinux_socket_sendmsg+0x1d8/0x260 [ 873.548031] ? selinux_socket_getpeername+0x260/0x260 [ 873.553225] ? tls_sw_push_pending_record+0x30/0x30 [ 873.558247] ? __fget+0x225/0x360 [ 873.561708] inet_sendmsg+0x11a/0x4e0 [ 873.565510] ? security_socket_sendmsg+0x83/0xb0 [ 873.570265] ? inet_recvmsg+0x4d0/0x4d0 [ 873.574241] sock_sendmsg+0xb5/0x100 [ 873.578016] SyS_sendto+0x1c7/0x2c0 [ 873.581670] ? SyS_getpeername+0x220/0x220 [ 873.585907] ? lock_downgrade+0x740/0x740 [ 873.590064] ? wait_for_completion_io+0x10/0x10 [ 873.594732] ? vfs_write+0x319/0x4d0 [ 873.595620] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3093 comm=syz-executor.2 [ 873.598440] ? fput+0xb/0x140 [ 873.598450] ? SyS_write+0x14d/0x210 15:42:54 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xc00, 0x0) sendmsg$AUDIT_USER(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x3ed, 0x100, 0x70bd25, 0x25dfdbfc, "f538ac649019fff9ea9b657e416b647cdfea99a53e49ddbe", ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4048054}, 0x24040041) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f00000002c0)=0x1) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) dup3(r1, r2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x80000, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x2203, 0x0) accept4$tipc(r3, &(0x7f0000000200)=@name, &(0x7f0000000300)=0x10, 0x80800) ioctl$int_in(r0, 0x5452, &(0x7f0000000280)=0x3) 15:42:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) listen(r1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x24008004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:54 executing program 1: syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x1, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VT_RELDISP(r3, 0x5605) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 873.598460] ? SyS_read+0x210/0x210 [ 873.598471] ? SyS_clock_settime+0x1a0/0x1a0 [ 873.598486] ? do_syscall_64+0x4c/0x640 [ 873.629188] ? SyS_getpeername+0x220/0x220 [ 873.633439] do_syscall_64+0x1d5/0x640 [ 873.637333] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 873.642542] RIP: 0033:0x45dd99 [ 873.645722] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 873.653424] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 873.660689] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 15:42:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4623, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1}, 0x62) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:54 executing program 3 (fault-call:7 fault-nth:57): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 873.667953] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 873.675217] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000038 [ 873.682480] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:54 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x30132, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, r0, 0x8, 0xffffffffffffffff, 0x11) mount(0x0, 0x0, &(0x7f0000000280)='binfmt_misc\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'veth0_to_bond\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}) creat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x40000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r2, 0x201}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x3c, r2, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1ff}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) ptrace$cont(0x20, 0xffffffffffffffff, 0x4, 0x2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 873.739018] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 873.755012] FAULT_INJECTION: forcing a failure. [ 873.755012] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 873.796063] CPU: 1 PID: 3117 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 873.803919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.813299] Call Trace: [ 873.815889] dump_stack+0x1b2/0x283 [ 873.819523] should_fail.cold+0x10a/0x154 [ 873.823675] __alloc_pages_nodemask+0x22c/0x2720 [ 873.828432] ? kasan_slab_free+0xc3/0x1a0 [ 873.832603] ? tls_push_record+0xc3b/0x1270 [ 873.836920] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 873.841065] ? inet_sendmsg+0x11a/0x4e0 [ 873.845040] ? do_syscall_64+0x1d5/0x640 [ 873.849098] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 873.854458] ? tcp_tx_timestamp+0x17/0x250 [ 873.858694] ? debug_check_no_obj_freed+0x2c0/0x674 [ 873.863713] ? lock_acquire+0x170/0x3f0 [ 873.867688] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 873.872538] ? debug_check_no_obj_freed+0x2c0/0x674 [ 873.877567] alloc_pages_current+0x155/0x260 [ 873.881976] ? tls_push_record+0xc3b/0x1270 [ 873.886305] skb_page_frag_refill+0x1bf/0x490 [ 873.890805] sk_page_frag_refill+0x4a/0x1b0 [ 873.895128] alloc_sg+0x13e/0x730 [ 873.898588] tls_sw_sendmsg+0x49a/0xfd0 [ 873.902572] ? selinux_socket_sendmsg+0x1d8/0x260 [ 873.907416] ? selinux_socket_getpeername+0x260/0x260 [ 873.912614] ? tls_sw_push_pending_record+0x30/0x30 [ 873.917639] ? __fget+0x225/0x360 [ 873.921098] inet_sendmsg+0x11a/0x4e0 [ 873.924896] ? security_socket_sendmsg+0x83/0xb0 [ 873.929651] ? inet_recvmsg+0x4d0/0x4d0 [ 873.933628] sock_sendmsg+0xb5/0x100 [ 873.937345] SyS_sendto+0x1c7/0x2c0 [ 873.940974] ? SyS_getpeername+0x220/0x220 [ 873.945214] ? lock_downgrade+0x740/0x740 [ 873.949372] ? wait_for_completion_io+0x10/0x10 [ 873.954043] ? vfs_write+0x319/0x4d0 [ 873.957771] ? fput+0xb/0x140 [ 873.960871] ? SyS_write+0x14d/0x210 [ 873.964584] ? SyS_read+0x210/0x210 [ 873.968208] ? SyS_clock_settime+0x1a0/0x1a0 [ 873.972616] ? do_syscall_64+0x4c/0x640 [ 873.976585] ? SyS_getpeername+0x220/0x220 [ 873.980818] do_syscall_64+0x1d5/0x640 [ 873.984710] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 873.989918] RIP: 0033:0x45dd99 15:42:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendmsg$NL80211_CMD_SET_PMKSA(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x4c, 0x0, 0x401, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x101, 0x36}}}}, [@NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x4}, @NL80211_ATTR_PMKID={0x14, 0x55, "a0808e88ff1b137fe5d4f6acbad8acf1"}, @NL80211_ATTR_FILS_CACHE_ID={0x6}]}, 0x4c}}, 0x81) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f0000000040)) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 873.993097] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 874.000796] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 874.008062] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 874.015332] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 874.022602] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000039 [ 874.029871] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:55 executing program 3 (fault-call:7 fault-nth:58): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 874.115463] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 874.127740] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 874.140023] FAULT_INJECTION: forcing a failure. [ 874.140023] name failslab, interval 1, probability 0, space 0, times 0 [ 874.153988] CPU: 1 PID: 3145 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 874.161802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.171156] Call Trace: [ 874.173749] dump_stack+0x1b2/0x283 [ 874.177382] should_fail.cold+0x10a/0x154 [ 874.181531] should_failslab+0xd6/0x130 [ 874.185501] __kmalloc+0x2c1/0x400 [ 874.189036] ? tls_push_record+0xfa/0x1270 [ 874.193273] tls_push_record+0xfa/0x1270 [ 874.197336] ? sk_page_frag_refill+0x56/0x1b0 [ 874.201842] tls_sw_sendmsg+0xbb0/0xfd0 [ 874.205826] ? selinux_socket_sendmsg+0x1d8/0x260 [ 874.210669] ? selinux_socket_getpeername+0x260/0x260 [ 874.215864] ? tls_sw_push_pending_record+0x30/0x30 [ 874.220886] ? __fget+0x225/0x360 [ 874.224343] inet_sendmsg+0x11a/0x4e0 [ 874.228141] ? security_socket_sendmsg+0x83/0xb0 [ 874.232889] ? inet_recvmsg+0x4d0/0x4d0 [ 874.236864] sock_sendmsg+0xb5/0x100 [ 874.240574] SyS_sendto+0x1c7/0x2c0 [ 874.244196] ? SyS_getpeername+0x220/0x220 [ 874.248428] ? lock_downgrade+0x740/0x740 [ 874.252581] ? wait_for_completion_io+0x10/0x10 [ 874.257247] ? vfs_write+0x319/0x4d0 [ 874.260957] ? fput+0xb/0x140 [ 874.264056] ? SyS_write+0x14d/0x210 [ 874.267766] ? SyS_read+0x210/0x210 [ 874.271389] ? SyS_clock_settime+0x1a0/0x1a0 [ 874.275793] ? do_syscall_64+0x4c/0x640 [ 874.279761] ? SyS_getpeername+0x220/0x220 [ 874.283994] do_syscall_64+0x1d5/0x640 [ 874.287890] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 874.293071] RIP: 0033:0x45dd99 [ 874.296259] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 874.303967] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 15:42:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='[\x00', 0xfffffffffffffff9) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff8, r2, 0x1) semctl$SEM_STAT(0x0, 0x4, 0x12, &(0x7f0000000740)=""/154) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f00000000c0)=""/195) [ 874.311244] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 874.318517] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 874.325791] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000003a [ 874.333058] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:55 executing program 3 (fault-call:7 fault-nth:59): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 874.426623] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 874.468722] FAULT_INJECTION: forcing a failure. [ 874.468722] name failslab, interval 1, probability 0, space 0, times 0 [ 874.521165] CPU: 0 PID: 3155 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 874.528994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.538336] Call Trace: [ 874.540922] dump_stack+0x1b2/0x283 [ 874.544551] should_fail.cold+0x10a/0x154 [ 874.548700] should_failslab+0xd6/0x130 [ 874.552680] kmem_cache_alloc_node+0x263/0x410 [ 874.557267] __alloc_skb+0x5c/0x510 [ 874.560895] sk_stream_alloc_skb+0xb1/0x760 [ 874.565237] ? __sk_mem_schedule+0x99/0xd0 [ 874.569463] ? ipv6_frag_exit+0x40/0x40 [ 874.573437] do_tcp_sendpages+0x835/0x1750 [ 874.577699] ? sk_stream_alloc_skb+0x760/0x760 [ 874.582282] tls_push_sg+0x1ee/0x760 [ 874.585995] tls_push_record+0xa81/0x1270 [ 874.590148] tls_sw_sendmsg+0xbb0/0xfd0 [ 874.594130] ? selinux_socket_sendmsg+0x1d8/0x260 [ 874.598981] ? selinux_socket_getpeername+0x260/0x260 [ 874.604169] ? tls_sw_push_pending_record+0x30/0x30 [ 874.609186] ? __fget+0x225/0x360 [ 874.612638] inet_sendmsg+0x11a/0x4e0 [ 874.616435] ? security_socket_sendmsg+0x83/0xb0 [ 874.621276] ? inet_recvmsg+0x4d0/0x4d0 [ 874.625252] sock_sendmsg+0xb5/0x100 [ 874.628960] SyS_sendto+0x1c7/0x2c0 [ 874.632582] ? SyS_getpeername+0x220/0x220 [ 874.636825] ? lock_downgrade+0x740/0x740 [ 874.641000] ? wait_for_completion_io+0x10/0x10 [ 874.645663] ? vfs_write+0x319/0x4d0 [ 874.649375] ? fput+0xb/0x140 [ 874.652474] ? SyS_write+0x14d/0x210 [ 874.656186] ? SyS_read+0x210/0x210 [ 874.659806] ? SyS_clock_settime+0x1a0/0x1a0 [ 874.664232] ? do_syscall_64+0x4c/0x640 [ 874.668223] ? SyS_getpeername+0x220/0x220 [ 874.672456] do_syscall_64+0x1d5/0x640 [ 874.677059] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 874.682245] RIP: 0033:0x45dd99 [ 874.685426] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 874.693126] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 874.700386] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 874.707661] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 874.714954] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000003b [ 874.722220] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x400, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) 15:42:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) syz_emit_ethernet(0x4e, &(0x7f0000000000)={@broadcast, @random="00000da00009", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00\x00\a', 0x18, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_ra={0x86, 0x7}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400206) r2 = semget$private(0x0, 0x2, 0x3a) semctl$SEM_STAT(r2, 0x4, 0x12, &(0x7f0000000740)=""/137) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x6}, 0x8) 15:42:55 executing program 3 (fault-call:7 fault-nth:60): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x1015, 0x1, 0x2, "fd3390699dde6499a3a39e5a5c06341a", "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"}, 0x1015, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 874.848838] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. [ 874.848854] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 874.882300] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. [ 874.916502] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 874.916664] FAULT_INJECTION: forcing a failure. [ 874.916664] name failslab, interval 1, probability 0, space 0, times 0 [ 874.998131] CPU: 0 PID: 3174 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 875.005950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.015299] Call Trace: [ 875.017887] dump_stack+0x1b2/0x283 [ 875.021519] should_fail.cold+0x10a/0x154 [ 875.025678] should_failslab+0xd6/0x130 [ 875.029651] __kmalloc+0x6d/0x400 [ 875.033104] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 875.038293] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 875.043335] ? generic_gcmaes_encrypt+0xf4/0x130 [ 875.048091] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 875.052932] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 875.057946] ? __kmalloc+0x3a4/0x400 [ 875.061659] ? tls_push_record+0xfa/0x1270 [ 875.065899] ? cryptd_aead_child+0x9/0x40 [ 875.070048] ? tls_push_record+0x938/0x1270 [ 875.074374] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 875.078530] ? selinux_socket_sendmsg+0x1d8/0x260 [ 875.083804] ? selinux_socket_getpeername+0x260/0x260 [ 875.088990] ? tls_sw_push_pending_record+0x30/0x30 [ 875.094004] ? __fget+0x225/0x360 [ 875.097451] ? inet_sendmsg+0x11a/0x4e0 [ 875.101415] ? security_socket_sendmsg+0x83/0xb0 [ 875.106168] ? inet_recvmsg+0x4d0/0x4d0 [ 875.110140] ? sock_sendmsg+0xb5/0x100 [ 875.114023] ? SyS_sendto+0x1c7/0x2c0 [ 875.117840] ? SyS_getpeername+0x220/0x220 [ 875.122071] ? lock_downgrade+0x740/0x740 [ 875.126221] ? wait_for_completion_io+0x10/0x10 [ 875.130884] ? vfs_write+0x319/0x4d0 [ 875.134591] ? fput+0xb/0x140 [ 875.137689] ? SyS_write+0x14d/0x210 [ 875.141398] ? SyS_read+0x210/0x210 15:42:56 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x1d, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000420a849cc95000000153ab43e880000000000a9195ca2411747916c359c89161c857de00e0fa06fe5b529aff6ba08ed75846bb7c905dbba"], &(0x7f0000000300)='GPL\x00', 0x800, 0x5b, &(0x7f0000000340)=""/91, 0x41000, 0x4, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x4, 0x6, 0x81}, 0x10, 0xffffffffffffffff}, 0x78) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) fcntl$dupfd(r0, 0x406, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) semget$private(0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$NFT_BATCH(r5, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_DELTABLE={0x2c, 0x2, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x1c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}]}, @NFT_MSG_DELCHAIN={0x78, 0x5, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_CHAIN_HOOK={0x30, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_bond\x00'}, @NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_POLICY={0x8}]}], {0x14}}, 0xe8}, 0x1, 0x0, 0x0, 0xc004040}, 0x4000001) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 875.145024] ? SyS_clock_settime+0x1a0/0x1a0 [ 875.149434] ? do_syscall_64+0x4c/0x640 [ 875.153404] ? SyS_getpeername+0x220/0x220 [ 875.157641] ? do_syscall_64+0x1d5/0x640 [ 875.161707] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 875.182756] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:56 executing program 3 (fault-call:7 fault-nth:61): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 875.281336] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 875.299033] FAULT_INJECTION: forcing a failure. [ 875.299033] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 875.310842] CPU: 0 PID: 3209 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 875.318635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.327982] Call Trace: [ 875.330574] dump_stack+0x1b2/0x283 [ 875.334204] should_fail.cold+0x10a/0x154 [ 875.338356] __alloc_pages_nodemask+0x22c/0x2720 [ 875.343113] ? is_bpf_text_address+0xb8/0x150 [ 875.347602] ? kernel_text_address+0xbd/0xf0 [ 875.352006] ? __kernel_text_address+0x9/0x30 [ 875.356494] ? unwind_get_return_address+0x51/0x90 [ 875.361416] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 875.366774] ? __save_stack_trace+0xa0/0x160 [ 875.371179] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 875.376017] ? depot_save_stack+0x10d/0x3e3 [ 875.380340] ? kasan_kmalloc+0x139/0x160 [ 875.384398] ? kasan_kmalloc+0xeb/0x160 [ 875.388365] ? __kmalloc+0x15a/0x400 [ 875.392072] ? tls_push_record+0xfa/0x1270 [ 875.396305] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 875.400443] ? inet_sendmsg+0x11a/0x4e0 [ 875.404411] ? sock_sendmsg+0xb5/0x100 [ 875.408292] ? SyS_sendto+0x1c7/0x2c0 [ 875.412088] ? do_syscall_64+0x1d5/0x640 [ 875.416141] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 875.421526] cache_grow_begin+0x8f/0x420 [ 875.425615] cache_alloc_refill+0x273/0x350 [ 875.429937] __kmalloc+0x378/0x400 [ 875.433478] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 875.438691] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 875.443725] ? generic_gcmaes_encrypt+0xf4/0x130 [ 875.448480] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 875.453321] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 875.458337] ? __kmalloc+0x3a4/0x400 [ 875.462049] ? tls_push_record+0xfa/0x1270 [ 875.466279] ? cryptd_aead_child+0x9/0x40 [ 875.470427] ? tls_push_record+0x938/0x1270 [ 875.474764] ? tls_sw_sendmsg+0xbb0/0xfd0 15:42:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21, @local}}, 0x303d0454, 0x6, 0x9, 0x5, 0xd09a5bf7e29803fc, 0x1a83fc62, 0x2}, &(0x7f00000000c0)=0x9c) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000100)={r6, 0x3, 0x0, 0x2, 0xfffc, 0x1, 0x6, 0x443, {r7, @in={{0x2, 0x4e22, @empty}}, 0x6, 0x0, 0x0, 0x9, 0x7}}, &(0x7f00000001c0)=0xb0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 875.478917] ? selinux_socket_sendmsg+0x1d8/0x260 [ 875.483757] ? selinux_socket_getpeername+0x260/0x260 [ 875.488949] ? tls_sw_push_pending_record+0x30/0x30 [ 875.493964] ? __fget+0x225/0x360 [ 875.497414] ? inet_sendmsg+0x11a/0x4e0 [ 875.501383] ? security_socket_sendmsg+0x83/0xb0 [ 875.506273] ? inet_recvmsg+0x4d0/0x4d0 [ 875.510250] ? sock_sendmsg+0xb5/0x100 [ 875.514132] ? SyS_sendto+0x1c7/0x2c0 [ 875.517935] ? SyS_getpeername+0x220/0x220 [ 875.522172] ? lock_downgrade+0x740/0x740 [ 875.526324] ? wait_for_completion_io+0x10/0x10 [ 875.530989] ? vfs_write+0x319/0x4d0 [ 875.534698] ? fput+0xb/0x140 [ 875.537799] ? SyS_write+0x14d/0x210 [ 875.541507] ? SyS_read+0x210/0x210 [ 875.545130] ? SyS_clock_settime+0x1a0/0x1a0 [ 875.549565] ? do_syscall_64+0x4c/0x640 [ 875.553535] ? SyS_getpeername+0x220/0x220 [ 875.557763] ? do_syscall_64+0x1d5/0x640 [ 875.561823] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:42:56 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000100)={0x3, 0x1000000, 0x3, {0x3ff, 0x7}, 0x38, 0x3}) connect$rds(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) 15:42:56 executing program 3 (fault-call:7 fault-nth:62): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 875.711591] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 875.731451] FAULT_INJECTION: forcing a failure. [ 875.731451] name failslab, interval 1, probability 0, space 0, times 0 [ 875.756288] CPU: 1 PID: 3218 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 875.764105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.773459] Call Trace: [ 875.776045] dump_stack+0x1b2/0x283 [ 875.779695] should_fail.cold+0x10a/0x154 [ 875.783843] should_failslab+0xd6/0x130 [ 875.787815] __kmalloc+0x2c1/0x400 [ 875.791351] ? tls_push_record+0xfa/0x1270 [ 875.795605] tls_push_record+0xfa/0x1270 [ 875.799661] ? sk_page_frag_refill+0x56/0x1b0 [ 875.804158] tls_sw_sendmsg+0xbb0/0xfd0 [ 875.808142] ? selinux_socket_sendmsg+0x1d8/0x260 [ 875.812981] ? selinux_socket_getpeername+0x260/0x260 [ 875.818173] ? tls_sw_push_pending_record+0x30/0x30 [ 875.823201] ? __fget+0x225/0x360 [ 875.826651] inet_sendmsg+0x11a/0x4e0 [ 875.830446] ? security_socket_sendmsg+0x83/0xb0 [ 875.835199] ? inet_recvmsg+0x4d0/0x4d0 [ 875.839169] sock_sendmsg+0xb5/0x100 [ 875.842876] SyS_sendto+0x1c7/0x2c0 [ 875.846500] ? SyS_getpeername+0x220/0x220 [ 875.850733] ? lock_downgrade+0x740/0x740 [ 875.854888] ? wait_for_completion_io+0x10/0x10 [ 875.859556] ? vfs_write+0x319/0x4d0 [ 875.863270] ? fput+0xb/0x140 [ 875.866371] ? SyS_write+0x14d/0x210 [ 875.870083] ? SyS_read+0x210/0x210 [ 875.873709] ? SyS_clock_settime+0x1a0/0x1a0 [ 875.878121] ? do_syscall_64+0x4c/0x640 [ 875.882094] ? SyS_getpeername+0x220/0x220 [ 875.886333] do_syscall_64+0x1d5/0x640 [ 875.890225] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 875.895408] RIP: 0033:0x45dd99 [ 875.898588] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 15:42:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x8) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000000)="732959ccabf98a19159ce3c3c1c8745b", 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 875.906290] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 875.913559] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 875.920828] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 875.928094] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000003e [ 875.935368] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:57 executing program 3 (fault-call:7 fault-nth:63): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 875.988160] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:42:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="f3eb686d", @ANYRES16=r2, @ANYBLOB="ba8626bd7000ffdbdf2537000000080026009015000008002201cd020000050019010700000008002600711600000800270002000000050018010f0000000500180113000000050018010700000008009f000500000008005700200000000800570000000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20040841}, 0x45) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500)='/dev/hwrng\x00', 0x4000, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000300)='/dev/bsg\x00', 0x404000, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r4, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x74, 0x0, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vcan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0={0xfc, 0x0, [], 0x1}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x23}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}]}, 0x74}, 0x1, 0x0, 0x0, 0x44810}, 0x4060080) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000540)=@gcm_128={{0x303}, "3def31ce3f583757", "cef41715f66e8c2ab0cdd7126831203f", "f53c79e5", "9dd656184f7b8cb9"}, 0x28) sendto$inet6(r0, &(0x7f0000000000)="a43922bf09ec3c91d979a54d4d507af7c92aaa94be27c1", 0x17, 0x0, 0x0, 0x0) [ 876.037967] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 876.070659] FAULT_INJECTION: forcing a failure. [ 876.070659] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 876.107512] CPU: 1 PID: 3228 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 876.115344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.124700] Call Trace: [ 876.127292] dump_stack+0x1b2/0x283 [ 876.130922] should_fail.cold+0x10a/0x154 [ 876.135074] __alloc_pages_nodemask+0x22c/0x2720 [ 876.139824] ? kasan_slab_free+0xc3/0x1a0 [ 876.143970] ? tls_push_record+0xc3b/0x1270 [ 876.148283] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 876.152422] ? inet_sendmsg+0x11a/0x4e0 [ 876.156391] ? do_syscall_64+0x1d5/0x640 [ 876.160446] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 876.165828] ? tcp_tx_timestamp+0x17/0x250 [ 876.170062] ? debug_check_no_obj_freed+0x2c0/0x674 [ 876.175076] ? lock_acquire+0x170/0x3f0 [ 876.179046] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 876.183889] ? debug_check_no_obj_freed+0x2c0/0x674 [ 876.188909] alloc_pages_current+0x155/0x260 [ 876.193313] ? tls_push_record+0xc3b/0x1270 [ 876.197657] skb_page_frag_refill+0x1bf/0x490 [ 876.202150] sk_page_frag_refill+0x4a/0x1b0 [ 876.206470] alloc_sg+0x13e/0x730 [ 876.209929] tls_sw_sendmsg+0x49a/0xfd0 [ 876.213911] ? selinux_socket_sendmsg+0x1d8/0x260 [ 876.218748] ? selinux_socket_getpeername+0x260/0x260 [ 876.223939] ? tls_sw_push_pending_record+0x30/0x30 [ 876.228952] ? __fget+0x225/0x360 [ 876.232406] inet_sendmsg+0x11a/0x4e0 [ 876.236203] ? security_socket_sendmsg+0x83/0xb0 [ 876.240953] ? inet_recvmsg+0x4d0/0x4d0 [ 876.244929] sock_sendmsg+0xb5/0x100 [ 876.248640] SyS_sendto+0x1c7/0x2c0 [ 876.252267] ? SyS_getpeername+0x220/0x220 [ 876.256503] ? lock_downgrade+0x740/0x740 [ 876.260659] ? wait_for_completion_io+0x10/0x10 [ 876.265329] ? vfs_write+0x319/0x4d0 [ 876.269050] ? fput+0xb/0x140 [ 876.272162] ? SyS_write+0x14d/0x210 [ 876.275873] ? SyS_read+0x210/0x210 [ 876.279495] ? SyS_clock_settime+0x1a0/0x1a0 [ 876.283904] ? do_syscall_64+0x4c/0x640 [ 876.287875] ? SyS_getpeername+0x220/0x220 [ 876.292131] do_syscall_64+0x1d5/0x640 [ 876.296021] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 876.301209] RIP: 0033:0x45dd99 [ 876.304391] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 876.312100] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 876.319368] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 876.326654] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 876.333919] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000003f [ 876.341184] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$netlink(0x10, 0x3, 0x14) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_MSG_GETRULE(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x1098, 0x7, 0xa, 0x3, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_RULE_USERDATA={0x34, 0x7, 0x1, 0x0, "2e066e01f4b41736b41e88f31421a8b1ec5d8be816c1395ded55b9b5b0beb5f5a095c1921bf9a9bc1a52f43c7921fd62"}, @NFTA_RULE_COMPAT={0x34, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x33}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x11}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0xff}, @NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0xec}, @NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}]}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x5}, @NFTA_RULE_USERDATA={0x1004, 0x7, 0x1, 0x0, "b1df3e5b75759aba19ab29d5ef4b872b3adfe821ff11aeb62eb72a09e69902cda4cf4faf756dbf8fbb605677b256faaebc66c6cba705c222a65464865f189a725c506e31da514887dbeb40432b6f4c8f9d3ec4e675a1a590758b8b0f3d0898a3ab387f816ae3bc2d93d34b30c65827d747fa6410ff3519220fed4eaa8bf9a257322fd2b384f877c9cdc052d162e9728adccc708c8d46f5702bc1db6e40cc4a1edc5cc2a39cbfb293f72ce5ea5bb83c0f0050fee4cbed631098474b6e5d1f031eb3a8f7f4fe0fd8d5f610eb3707e5c4a8400eb9fd14197fc233cdce188c380942920d11012b4884b7350a4ec15f28daccc46f0fd583e6b47c81137761b141af1ef5a4ed67b235ab55c83eede30132cdbd22eb6eb4181ab17bafdab2cf9967809e89c18c91b8ab3e586749c077e4ce92ecb6fcd3e04d668f4c99f67a14237c3fc0b067df1bb05e968a796b28beb9b7a495c2275208e3805b3233991f4e772d4b3852e73d26f9d67de9db741e651a356af8d2e31b12bc2422f7148f9befcf4d57f351b075d9227effab76b59b1307d4721fc0a733af1138bfbeeedf7ffee5ddc67d4e0a64907624a1fe2796007349b8212deefa5e10837f47ca5d43dde7c75f1e0041c6e6009f9e5aeb95440289f8e799b006617571045ea8cd14a38cd7a43714ca1742026e154bce9e4a27e1f0c03d2467ce7b23d23a8936d971eabb0d7654c9708e578b087f3f000771be8d985f14ae9a530fc6da4112eec92b5293872de00a4449484a0c5e3e2578662597da016f4521434511d0e07bbcb06fc02b76abfc892bdbb6fa73def04e69d72377453a5a3b4f855d661cb24e77b29d0dc73f39eed055750182c77d7e3b74de5c6e0f99fe5886183b093c37a88caca1057e05ff1d030fc7219390807bb4de576a074d46cafc1359177b1cdfe5a0a6ffda3bfb2ba246ce702fd90e0159bf9baa2e23ab6d326c63bb13f0da321cb51789b3a63e7ce15bcd666e7cc9f440acda9da873a43fef3666fba6d6e635b9c069d8e4ef8e839a3fcce0d914fa6a7b28758d6774eec117c2f09788cf8fb50bbcf95f269522bc0b5c01c3911ec091ed1d2d0656d416c5b364c9c18d3b56f5e24f994ebc2ceab8633261424a04c4ea1ae7e5da17899b6df2884b5203465f26dd015945343d23120bb2d82e54463d196533f1bbbe828a9e86c94e9beb8c7d59926dd07c4f842887e97930f372c419525da340f18bf1c87106acf241e4b69be22efaea4f912c0876199de248a5ccc2e77601f4f5627c63d39209b90b9b01e1f710c74dd4d27e2ac9868bad7b39322c7a756f1a122899f5b2d03809f5c237bd8e5d8cf235ca7c9ad8b96bbf4bf839eab0af06908ca818c173e7da2db1818138ed1738c16a399843f196e288177080f8653565361f74f7f662f5ba007414882532293a16550d655acb879410fafc1946b45609e3905f9adedadd384bfc22a2a240d9b87a71e43e9c76e4b3a68fa88ddbf550cee5de504625d2521438c2b8bc092393e7fc8866ef2ed281bda08e54715baaf47b4c802724fe6137728053522681c74f3ea4db76cbf9df67f657a526f40bbd5a99de8f09e7e43c3583cc40ba4d062b4026cf9285121ea87c4af53b8bf114d907a6600fe76b2d77bc3be0285a75ad3da42670b520d8285f5dbee570060ee0d246799f704c18b88505d6110ae255e57af2280c28d967d2e48326ad0b7889b43bcad26b4fa3d91699303f83fb543570923d5ca8960aad18de77f6a24f441101b3a1f5902b7187df0eeeaa3ca0938d5fdd05dc64115b702398a9c42a2f4d228a7ff2c5e54578b8d38c38ea5024ebd64b63696e9296369e16c035ab9eb978eb96e2edb35623e5887d8bad4bae4d668ec394b6b9a7c9cddfc9c0111ef411d7b226844b087563fd54b045957254285de3266666eedb731549e009be3936127212b76fe47c44fbb08d90ac4431b7e4e17de9ee0cf4e89bbbf4a0476f97c617457e3820122601e71c20801131c79cf981eb17f1db61ec954d0b7e38299469346e978f127095e22e37ab77ae29ab59d0fc8368733f16f5eef5759fa2fe36c983cffba7421e321a9819a2d9d990756791c1136ce236b421fc7bab503036128728c8171de79332520a136d80abe831013d512509117befca62aa9c51659a9c2575d3bf07d54d20ef8dab5023f3d1b3baed660ab1e80ce5faafc113918cf7f736485dd587fb69fafa3aaff812fd9b635c203bb0d9ad1aae1e8fbb297a146e35621fce5ef3f8f9edd91bc1c441bf7a1192089afde550bf625e83c9582038daa66d5041a3977d6f4a7e3b0df424be42093558b4145291275eee28394d037560eac15f72bc723abcf1d239e1e1c6f25ba8597ed34ea2cb080eaf67d74af302ced255f16adc950c6d27e114b94b6cb6aaaae8bc5af05ede51157159f9318adea5805180c40841c30d1ea5ffd6d9b2d526ca7783d1d526e869eec59fab384a552386b0f382d6ed738996c40867a8230d6b163be19e7554c10e03e773e33bcdde69cda1084c31f74f8a1a60177b6321563baba608cbb83afafd5a48c9f57e35a6197ebe32771a467bba77349e89d7adc1cb7bf38b7ece68c557129004e8c8d689f43db2a0313c647aa3aada90169b3868beaad5f5ac2d3cf9d55efe348ce45deb83a540e02a257dd715a5a7d63c9ce559232aca58278d0701eb02e1b5d924b5596ae0c3ae434bf740447d81d4b1b7d8b1c00f3827ee355128f363bb9f18aba1d7114fb93131f9d3eed37d72acbc8890887422fab3d49143fcfa489af75e9a552aefe1bc5bce1260425b961021e68addcf105c6533fdaef64db7f5b961f37621216cece2bc0209f6390e6ad5e1bf2b497c1cc07f32de9ac8c8d5762b1213e6e14da2d54baa792d88c557f0321f1e5aeaf78ac29d9e8cb5a437658008558c1a051f8d052f750372fa592d17f2616bcf57c61b810f8046e3fd7c30dc73af4ad907e3d452a3bba29bb5fbf7a91da4726873bebbf67b03c63a4de0696e0d842c6801d204e41fa8b5b4038a19c4ecaa84afd82e9e3d92a6eadb0e89bc105469eacd28dc505973272eaf8871fce53d90adeb2250bcc600fe5e1cf912ee620d3dfd2bcb46e6232e0686e12e4a15cc7f7c635a6b1ce8a358542f164a925031003b05ddc06a2ee1723c576c0eb3477983a8ec825997342439707021a387a149bf4a6eeaff3db9d1bcd7ef70e8b33f892e9b42ba697cc9c66bb50aa5d4ff48bdd2ac2cb22e174e72b1ea0f74a735f0b68ae55e809c8cf88b91a59ad70bdadac8492b50a9388f77db4262a6cd78b1550b80df2f3ff02bea0489004b2a5a6347f2b79d9ab5247b4dcc74925633578613f4e5db586de773fa0f344131f75cc3ffdf1c00e04047dc8c5cfec735be8ad8fac98688e74ebe3d7eabecea60f0af01e4618de129ba55f2ac5c700ac13157c800f1aedd40978ff35844e5f1f69674df838dea25588375168e6e67323ac3979cbdc9f223d935948af1bc19db34c3db03a914000b61c145eec12883827aaced6037f7083cd7ea36e394f93a9ac95e6efab6282e5dcca2dbc378f8d37dbc6761e804231d7002479bc04cf2f9aa0d4198dc16fb294746e4917acc83f89cafdd93a87cba6a8e34bd3ba2394925867b5271a17d8aaee980b3ab8b6db4e660b8fa1a6770ebea30b52e7849ecdd0e40119d1b30a70e6c745550605c18ccc08c09426369ce1dd476c9e332413bccff532c1efc2cfd3e07f9c139bb894846baad6fb9bcb4b431ff3b5aca37d19f29fb8a7ddaf5ef59031f12a3ed6d4c42ad21f05d5b49dc18d7c3f8b181807173bcdcb7edbeae87a574a1f8b7487b6446fbff878cab926c89a0315d8ecc42300d09722d6d88a3010bca4d1f8cda08996f1165ce8f374df5c795bf85ba39efe32c54cf6e5e8835aa708c61f20a00c7873d0720694951cf6ae0f3b8db48eff3988a78f63199b579504b11601b9bcd8e82e47bf87f8c3b8baea996778da1b2007a1e24d827b2f970e3d97df66f6bf5276984ac857df28a06b81a01329b6bd94ae0b0a62556815b82bcb03035591bb56c311aa8b5feb0f9505abad6aaaf2ebecd2a228382cb31de41ab26a0ca0129f7fb80b4ecb70ec7d353ece38724657a5ec5b414daeb54857a94967cfe5d50e4935aaface28ca257f58c4afad9e24e5193195850ccae6c1ab8bf91cfd0745daed5fccd3ee84f32eb4445c17c8a4ff9669ebc76737a3d307ee96f924ca6a1119ed5a8ce8d0bd0a8ebf7619ecb9153356d4a1786445cfcc6be3e3832565477e840102b9b409d5e90a0b551369b1f6aa28a99f41fcb22f91700bd3152f7ca19115fbe058107f1ab31f5315236193e353a512f587f3ffd562c43673e34c3aaa2d84ee7a1c2a3a2a752d3a05aa8dbe2bace59a2d9bc62bf464fdb6184bce0495eff3d479dc2d88323e2bee34387dfcea037a1b776b9241452c23f49d66756e31df193bf399aad1a1f32a8c486be66902fffbf649935c9da7332603875d1779171a41825e93269fa3aa44f9fe10481672e137e5cdc468dbb229d3f72263459674d389fb2f031251158b8af7e218daea4473e41e016389a3d3b7c51e770420083841133222704bc2d28acea3b9d24c34be1fcdbd5a648f889964d83e1e7baa1eaa4f723db975a34654c5921081b510a1a4d286ac1819f581d544c4f4e3df6aa3c1721ea05fd3a1acaaa86c3932abbf32928a7dda2ee138a7a1f18ba98325d01675dc11459c9c891a4cce664915c05ca82305c123dcbcd16721006db094aca353cd5c4ce202916c4832990a1aacb64af9924a7ee30df273bceb5bd9737348f9940ea3c052f395b341c94dffdcbf87ffecd71bfa3933957be8542d22c19a8603b5d009af4e7ce1ee14f5765bc67f090d3aa2ddc7e63069ad98f51bbffd15c9234b7c149c9ea8ef7ef42bad39690cde00a04177cf76cdc13b4a7dc8a96f02a482e79a670353c60cb25514b0350a4d454ca24e9fe6ff8d63bdea882ad277ed11a22219bc68f3685532a842bed430f2ce2948439f68b3c33e726e2d26712e199eb217f78fbfd668fbf87a74f3f919510b981fa367ebfa77c71b558fa296f32257661953ac67d86707c1f5b220b101b36fdef549dcb0c2be00d248d6a8b249cc3b35a416b706d3dd90b6b7503b1bb2c3fe6e99fde5f5ec33ff439be9a294ed3fdc32fc8aa8365f4b2e718e700aaeee96e4ecdce7a3b6c5eaf78588b48d7463b00bb29a0a6bfa64456ddf966d8157286c28442f62b593dcda331de289e32c74023d1d931a96a241c26de1efc71109f43593b61d5ee620040a3b20b4204f91c6df824c428f5aa3c30068a2ed4d9854f1caf90d95d7866d5cf712aa59884ac3bc5764ce53bc90124592b3f36194cd24c09835382503419226c7d120e4d226b606a438649e2bdd8a87b6d58f87e9a81e5336e489068bdb9dc149f29fdc323a02702d8113d060b69a0e7ac389fdd04e4640d56e9c14391169c23ce6905b5a9a6ecf7d5d8e8934cc0a6a386147371e78c9340eececea769d531eedd3128bfc153fff823e92301c0c9655bfe5abee3445dbc788ef1ec5770882654073c613800ba4320476fb52a908f943526401c2571ad68a341ca3e5afdb8fc71126c4f0a6cb31ebd51f7c018bbfa7a66e468b507b840dd93a5d26afed8989b044362add4b90847d3d2f27c4b11f4913a9bd8ce9f2101c515ecf6f135e7983e7688c51070a6059ef77deaeed9f86d4da4ed5379fcfe40132c5649f6131848652af404ce88d44ca4a99bb80a439afd04b1646c54c820"}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x2}]}, 0x1098}, 0x1, 0x0, 0x0, 0x4000000}, 0x400c058) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) ioctl$F2FS_IOC_GARBAGE_COLLECT(r4, 0x4004f506, &(0x7f0000000180)=0x1) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:57 executing program 3 (fault-call:7 fault-nth:64): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NL80211_CMD_LEAVE_MESH(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x2fe5f26927141bdc, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", "", "", ""]}, 0x1c}}, 0x4084) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) fcntl$getown(r0, 0x9) [ 876.445219] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 876.455761] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 876.509571] FAULT_INJECTION: forcing a failure. [ 876.509571] name failslab, interval 1, probability 0, space 0, times 0 [ 876.511640] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3247 comm=syz-executor.2 [ 876.536340] CPU: 0 PID: 3244 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 876.544150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.548102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3247 comm=syz-executor.2 [ 876.553495] Call Trace: [ 876.553514] dump_stack+0x1b2/0x283 [ 876.553530] should_fail.cold+0x10a/0x154 [ 876.553545] should_failslab+0xd6/0x130 [ 876.553554] __kmalloc+0x2c1/0x400 [ 876.553565] ? tls_push_record+0xfa/0x1270 [ 876.553577] tls_push_record+0xfa/0x1270 [ 876.553588] ? sk_page_frag_refill+0x56/0x1b0 [ 876.553607] tls_sw_sendmsg+0xbb0/0xfd0 [ 876.600102] ? selinux_socket_sendmsg+0x1d8/0x260 [ 876.604947] ? selinux_socket_getpeername+0x260/0x260 [ 876.610148] ? tls_sw_push_pending_record+0x30/0x30 [ 876.615186] ? __fget+0x225/0x360 [ 876.618642] inet_sendmsg+0x11a/0x4e0 [ 876.622447] ? security_socket_sendmsg+0x83/0xb0 [ 876.627199] ? inet_recvmsg+0x4d0/0x4d0 [ 876.631194] sock_sendmsg+0xb5/0x100 [ 876.634905] SyS_sendto+0x1c7/0x2c0 [ 876.638527] ? SyS_getpeername+0x220/0x220 [ 876.642763] ? lock_downgrade+0x740/0x740 [ 876.646917] ? wait_for_completion_io+0x10/0x10 [ 876.651582] ? vfs_write+0x319/0x4d0 [ 876.655292] ? fput+0xb/0x140 [ 876.658392] ? SyS_write+0x14d/0x210 [ 876.662106] ? SyS_read+0x210/0x210 [ 876.665730] ? SyS_clock_settime+0x1a0/0x1a0 [ 876.670136] ? do_syscall_64+0x4c/0x640 [ 876.674107] ? SyS_getpeername+0x220/0x220 [ 876.678342] do_syscall_64+0x1d5/0x640 [ 876.682231] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 876.687417] RIP: 0033:0x45dd99 [ 876.690604] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 876.698307] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 15:42:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r5, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x51}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xf8}, @NL80211_ATTR_REG_RULES={0x2c, 0x22, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x530}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x1a1e000}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1}, @NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x81}]}, 0x70}, 0x1, 0x0, 0x0, 0x4044}, 0x20004000) sendmsg$NL80211_CMD_START_NAN(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x51565bf55c9e4ee2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020022832c029d94f4cdfde712278e506530c7dc7ebd7000fddbdf257300000005eced00090000000800ef00062300000800ef44831b15b05fad00000a000000"], 0x34}, 0x1, 0x0, 0x0, 0x4004050}, 0x4) [ 876.705572] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 876.712837] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 876.720104] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000040 [ 876.727368] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:57 executing program 3 (fault-call:7 fault-nth:65): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e21, @private=0xa010100}, @in6={0xa, 0x4e22, 0xfffffc00, @private0={0xfc, 0x0, [], 0x1}, 0xc43}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e21, @private=0xa010101}], 0x91) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio1\x00', 0x20c380, 0x0) dup(r2) mq_timedsend(r1, &(0x7f0000000000)="6c30ed4bc39eb81cb5301961997d3eb28558815d73f59a", 0x17, 0x20, &(0x7f0000000040)={0x0, 0x989680}) rt_sigsuspend(&(0x7f0000000080)={[0xd05c]}, 0x8) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000180)=[{{0x4, 0x0, 0x0, 0x1}, {0x2, 0x1}}], 0x8) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="640000000108010300000000000000cd030000012c0004800800094000000017080006400000000508000640000000020800034000000003080001400000003f0600024000f720000900010073797a30000000000600024088be00000500030011000000ac4f835310412508ab437983f3e2f838ed17a5e2cfb9fa77f4410839348aa869bd7bfb48e77c9b985f2ed1d7e3674182ababc43022631c1305bdabedd81c493ec9a127f7dcffdcec6751847203a975374ab22362fd27427d84cadb1fb39554251975ab97b3a992b29fe60c12cefe35f49ff88a6564bbb662e9d0d0d012e003fe7029c12b366567271cf25ad56c6b5377652e638d5641344be5bb647204128ae98b00000000000000000000000064a410"], 0x64}}, 0x4000000) [ 876.820589] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 876.849804] FAULT_INJECTION: forcing a failure. [ 876.849804] name failslab, interval 1, probability 0, space 0, times 0 [ 876.867684] CPU: 0 PID: 3261 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 876.875496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.884849] Call Trace: [ 876.887448] dump_stack+0x1b2/0x283 [ 876.891083] should_fail.cold+0x10a/0x154 [ 876.895232] should_failslab+0xd6/0x130 [ 876.899227] kmem_cache_alloc_node+0x263/0x410 [ 876.903815] __alloc_skb+0x5c/0x510 [ 876.907470] sk_stream_alloc_skb+0xb1/0x760 [ 876.911789] ? __sk_mem_schedule+0x99/0xd0 [ 876.916021] ? ipv6_frag_exit+0x40/0x40 [ 876.919994] do_tcp_sendpages+0x835/0x1750 [ 876.924242] ? sk_stream_alloc_skb+0x760/0x760 [ 876.928833] tls_push_sg+0x1ee/0x760 [ 876.932555] tls_push_record+0xa81/0x1270 [ 876.936733] tls_sw_sendmsg+0xbb0/0xfd0 [ 876.940714] ? selinux_socket_sendmsg+0x1d8/0x260 [ 876.945557] ? selinux_socket_getpeername+0x260/0x260 [ 876.950762] ? tls_sw_push_pending_record+0x30/0x30 [ 876.955778] ? __fget+0x225/0x360 [ 876.959231] inet_sendmsg+0x11a/0x4e0 [ 876.963040] ? security_socket_sendmsg+0x83/0xb0 [ 876.967898] ? inet_recvmsg+0x4d0/0x4d0 [ 876.971872] sock_sendmsg+0xb5/0x100 [ 876.975584] SyS_sendto+0x1c7/0x2c0 [ 876.979206] ? SyS_getpeername+0x220/0x220 [ 876.983447] ? lock_downgrade+0x740/0x740 [ 876.987601] ? wait_for_completion_io+0x10/0x10 [ 876.992269] ? vfs_write+0x319/0x4d0 [ 876.995977] ? fput+0xb/0x140 [ 876.999075] ? SyS_write+0x14d/0x210 [ 877.002782] ? SyS_read+0x210/0x210 [ 877.006430] ? SyS_clock_settime+0x1a0/0x1a0 [ 877.010840] ? do_syscall_64+0x4c/0x640 [ 877.014813] ? SyS_getpeername+0x220/0x220 [ 877.019044] do_syscall_64+0x1d5/0x640 [ 877.022936] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 877.028121] RIP: 0033:0x45dd99 [ 877.031301] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 877.039005] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 877.046266] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 877.053528] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 877.060789] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000041 [ 877.068053] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:58 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x480141, 0x0) 15:42:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(0xffffffffffffffff, 0xc0385720, &(0x7f0000000240)) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r2, 0x1, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9b3e, 0x41}}}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x20, 0xf}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x4000, 0x4a}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x54}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x5b}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x4004000) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:58 executing program 3 (fault-call:7 fault-nth:66): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 877.229931] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 877.251706] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 877.255073] FAULT_INJECTION: forcing a failure. [ 877.255073] name failslab, interval 1, probability 0, space 0, times 0 [ 877.279721] CPU: 0 PID: 3283 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 877.287533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.296898] Call Trace: [ 877.299504] dump_stack+0x1b2/0x283 [ 877.303133] should_fail.cold+0x10a/0x154 [ 877.307285] should_failslab+0xd6/0x130 [ 877.311258] kmem_cache_alloc_node_trace+0x25a/0x400 [ 877.316363] __kmalloc_node_track_caller+0x38/0x70 [ 877.321293] __alloc_skb+0x96/0x510 [ 877.324922] sk_stream_alloc_skb+0xb1/0x760 [ 877.329242] ? __sk_mem_schedule+0x99/0xd0 [ 877.333473] ? ipv6_frag_exit+0x40/0x40 [ 877.337455] do_tcp_sendpages+0x835/0x1750 [ 877.341696] ? sk_stream_alloc_skb+0x760/0x760 [ 877.346276] ? tls_push_sg+0x1b5/0x760 [ 877.350163] tls_push_sg+0x1ee/0x760 [ 877.353882] tls_push_record+0xa81/0x1270 [ 877.358040] tls_sw_sendmsg+0xbb0/0xfd0 [ 877.362021] ? selinux_socket_sendmsg+0x1d8/0x260 [ 877.366862] ? selinux_socket_getpeername+0x260/0x260 [ 877.372057] ? tls_sw_push_pending_record+0x30/0x30 [ 877.377076] ? __fget+0x225/0x360 [ 877.380554] inet_sendmsg+0x11a/0x4e0 [ 877.384351] ? security_socket_sendmsg+0x83/0xb0 [ 877.389104] ? inet_recvmsg+0x4d0/0x4d0 [ 877.393076] sock_sendmsg+0xb5/0x100 [ 877.396808] SyS_sendto+0x1c7/0x2c0 [ 877.400454] ? SyS_getpeername+0x220/0x220 [ 877.404691] ? lock_downgrade+0x740/0x740 [ 877.408860] ? wait_for_completion_io+0x10/0x10 [ 877.413528] ? vfs_write+0x319/0x4d0 [ 877.417239] ? fput+0xb/0x140 [ 877.420338] ? SyS_write+0x14d/0x210 [ 877.424047] ? SyS_read+0x210/0x210 [ 877.427674] ? SyS_clock_settime+0x1a0/0x1a0 [ 877.432082] ? do_syscall_64+0x4c/0x640 [ 877.436054] ? SyS_getpeername+0x220/0x220 [ 877.440287] do_syscall_64+0x1d5/0x640 [ 877.444181] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 877.449390] RIP: 0033:0x45dd99 [ 877.452583] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 877.460302] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 877.467566] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 15:42:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@gettfilter={0x6c, 0x2e, 0x10, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, r6, {0xa, 0xe}, {0xf, 0xf}, {0xffff, 0xe}}, [{0x8, 0xb, 0x3f62}, {0x8, 0xb, 0xfffffffe}, {0x8, 0xb, 0x8}, {0x8}, {0x8, 0xb, 0x1000}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x9}, {0x8, 0xb, 0x84d}, {0x8, 0xb, 0x2}]}, 0x6c}, 0x1, 0x0, 0x0, 0x804}, 0x41) [ 877.474835] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 877.482101] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000042 [ 877.489387] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:58 executing program 3 (fault-call:7 fault-nth:67): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 877.566810] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 877.631506] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 877.633927] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 877.656246] FAULT_INJECTION: forcing a failure. [ 877.656246] name failslab, interval 1, probability 0, space 0, times 0 [ 877.681409] CPU: 0 PID: 3290 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 877.689215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.698563] Call Trace: [ 877.701238] dump_stack+0x1b2/0x283 [ 877.704870] should_fail.cold+0x10a/0x154 [ 877.709018] should_failslab+0xd6/0x130 [ 877.712990] kmem_cache_alloc_node_trace+0x25a/0x400 [ 877.718094] __kmalloc_node_track_caller+0x38/0x70 [ 877.723031] __alloc_skb+0x96/0x510 [ 877.726659] sk_stream_alloc_skb+0xb1/0x760 [ 877.730978] ? __sk_mem_schedule+0x99/0xd0 [ 877.735209] ? ipv6_frag_exit+0x40/0x40 [ 877.739181] do_tcp_sendpages+0x835/0x1750 [ 877.743423] ? sk_stream_alloc_skb+0x760/0x760 [ 877.748012] tls_push_sg+0x1ee/0x760 [ 877.751736] tls_push_record+0xa81/0x1270 [ 877.755892] tls_sw_sendmsg+0xbb0/0xfd0 [ 877.759896] ? selinux_socket_sendmsg+0x1d8/0x260 [ 877.764737] ? selinux_socket_getpeername+0x260/0x260 [ 877.769927] ? tls_sw_push_pending_record+0x30/0x30 [ 877.774948] ? __fget+0x225/0x360 [ 877.778406] inet_sendmsg+0x11a/0x4e0 [ 877.782203] ? security_socket_sendmsg+0x83/0xb0 [ 877.786954] ? inet_recvmsg+0x4d0/0x4d0 [ 877.790925] sock_sendmsg+0xb5/0x100 [ 877.794637] SyS_sendto+0x1c7/0x2c0 [ 877.798264] ? SyS_getpeername+0x220/0x220 [ 877.802500] ? lock_downgrade+0x740/0x740 [ 877.806657] ? wait_for_completion_io+0x10/0x10 [ 877.811322] ? vfs_write+0x319/0x4d0 [ 877.815033] ? fput+0xb/0x140 [ 877.818144] ? SyS_write+0x14d/0x210 [ 877.821858] ? SyS_read+0x210/0x210 [ 877.825482] ? SyS_clock_settime+0x1a0/0x1a0 [ 877.830154] ? do_syscall_64+0x4c/0x640 [ 877.834130] ? SyS_getpeername+0x220/0x220 [ 877.838364] do_syscall_64+0x1d5/0x640 [ 877.842256] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 877.847441] RIP: 0033:0x45dd99 [ 877.850621] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 877.858321] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 877.865584] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 877.872845] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 877.880114] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000043 [ 877.887382] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:59 executing program 3 (fault-call:7 fault-nth:68): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:59 executing program 2: setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e24, 0x7, @local, 0x2}, {0xa, 0x4e21, 0x0, @loopback, 0x8d12}, 0x8, [0x2, 0x0, 0xffffffff, 0x6, 0x7f, 0x7fd, 0x80000001, 0x2]}, 0x5c) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x4000000009, 0x0) semop(r2, &(0x7f00000000c0)=[{0x1, 0x7ff, 0x800}, {0x3, 0x8, 0xb1a0a1251bd665e1}, {0x3, 0x1, 0x800}, {0x1, 0x0, 0x1000}, {0x1, 0x2}, {0x1, 0x0, 0x1000}, {0x4, 0x80, 0x800}, {0x1, 0xfff, 0x800}], 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r3, 0x5000940a, &(0x7f0000000800)={{r1}, "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"}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000240)=0x6aa) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000100)={@local, @broadcast, r7}, 0xc) semctl$SEM_STAT(r2, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:42:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x4, 0x6, 0x380, 0x0, 0x0, {0xa, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20000000) [ 878.054518] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 878.087780] FAULT_INJECTION: forcing a failure. [ 878.087780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 878.127016] CPU: 0 PID: 3315 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 878.130667] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 878.134863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.134868] Call Trace: [ 878.134889] dump_stack+0x1b2/0x283 [ 878.134908] should_fail.cold+0x10a/0x154 [ 878.134927] __alloc_pages_nodemask+0x22c/0x2720 [ 878.134941] ? kasan_slab_free+0xc3/0x1a0 [ 878.134955] ? tls_push_record+0xc3b/0x1270 [ 878.134966] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 878.134974] ? inet_sendmsg+0x11a/0x4e0 [ 878.134984] ? do_syscall_64+0x1d5/0x640 [ 878.134996] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 878.135009] ? tcp_tx_timestamp+0x17/0x250 [ 878.135022] ? debug_check_no_obj_freed+0x2c0/0x674 [ 878.135037] ? lock_acquire+0x170/0x3f0 [ 878.135047] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 878.135065] ? debug_check_no_obj_freed+0x2c0/0x674 [ 878.135087] alloc_pages_current+0x155/0x260 [ 878.135096] ? tls_push_record+0xc3b/0x1270 [ 878.135109] skb_page_frag_refill+0x1bf/0x490 [ 878.230346] sk_page_frag_refill+0x4a/0x1b0 [ 878.234670] alloc_sg+0x13e/0x730 [ 878.238136] tls_sw_sendmsg+0x49a/0xfd0 [ 878.242118] ? selinux_socket_sendmsg+0x1d8/0x260 [ 878.246972] ? selinux_socket_getpeername+0x260/0x260 [ 878.252169] ? tls_sw_push_pending_record+0x30/0x30 [ 878.257192] ? __fget+0x225/0x360 [ 878.260645] inet_sendmsg+0x11a/0x4e0 [ 878.264452] ? security_socket_sendmsg+0x83/0xb0 [ 878.269209] ? inet_recvmsg+0x4d0/0x4d0 [ 878.273190] sock_sendmsg+0xb5/0x100 [ 878.276906] SyS_sendto+0x1c7/0x2c0 [ 878.280626] ? SyS_getpeername+0x220/0x220 [ 878.284869] ? lock_downgrade+0x740/0x740 [ 878.289031] ? wait_for_completion_io+0x10/0x10 [ 878.293703] ? vfs_write+0x319/0x4d0 [ 878.297428] ? fput+0xb/0x140 [ 878.300535] ? SyS_write+0x14d/0x210 [ 878.304248] ? SyS_read+0x210/0x210 [ 878.307869] ? SyS_clock_settime+0x1a0/0x1a0 [ 878.312276] ? do_syscall_64+0x4c/0x640 [ 878.316246] ? SyS_getpeername+0x220/0x220 [ 878.320486] do_syscall_64+0x1d5/0x640 [ 878.324384] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 878.329571] RIP: 0033:0x45dd99 [ 878.332756] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 878.340463] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 878.347731] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 878.354995] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 878.362269] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000044 [ 878.369533] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:59 executing program 3 (fault-call:7 fault-nth:69): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:42:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000140)={{0x1ff, 0x5, 0x4, 0xff}, 'syz0\x00', 0x34}) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x880, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e1e, 0x4, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000000)) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 878.521175] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 878.537167] FAULT_INJECTION: forcing a failure. [ 878.537167] name failslab, interval 1, probability 0, space 0, times 0 [ 878.571098] CPU: 1 PID: 3337 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 878.579006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.588355] Call Trace: [ 878.590942] dump_stack+0x1b2/0x283 [ 878.594570] should_fail.cold+0x10a/0x154 [ 878.598723] should_failslab+0xd6/0x130 [ 878.602693] __kmalloc+0x2c1/0x400 [ 878.606228] ? tls_push_record+0xfa/0x1270 [ 878.610460] tls_push_record+0xfa/0x1270 [ 878.614521] ? sk_page_frag_refill+0x56/0x1b0 [ 878.619076] tls_sw_sendmsg+0xbb0/0xfd0 [ 878.623056] ? selinux_socket_sendmsg+0x1d8/0x260 [ 878.627895] ? selinux_socket_getpeername+0x260/0x260 [ 878.633090] ? tls_sw_push_pending_record+0x30/0x30 [ 878.638106] ? __fget+0x225/0x360 [ 878.641562] inet_sendmsg+0x11a/0x4e0 [ 878.645357] ? security_socket_sendmsg+0x83/0xb0 [ 878.650113] ? inet_recvmsg+0x4d0/0x4d0 [ 878.654087] sock_sendmsg+0xb5/0x100 [ 878.657795] SyS_sendto+0x1c7/0x2c0 [ 878.661418] ? SyS_getpeername+0x220/0x220 [ 878.665659] ? lock_downgrade+0x740/0x740 [ 878.669814] ? wait_for_completion_io+0x10/0x10 [ 878.674483] ? vfs_write+0x319/0x4d0 [ 878.678195] ? fput+0xb/0x140 [ 878.681295] ? SyS_write+0x14d/0x210 [ 878.685003] ? SyS_read+0x210/0x210 [ 878.688622] ? SyS_clock_settime+0x1a0/0x1a0 [ 878.693028] ? do_syscall_64+0x4c/0x640 [ 878.697001] ? SyS_getpeername+0x220/0x220 [ 878.701234] do_syscall_64+0x1d5/0x640 [ 878.705150] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 878.710342] RIP: 0033:0x45dd99 [ 878.713525] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 878.721228] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 878.728491] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 878.735755] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 878.743016] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000045 [ 878.750284] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:42:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x200, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f00000000c0)) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x800, @loopback, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:42:59 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x20c0, 0x0) 15:42:59 executing program 3 (fault-call:7 fault-nth:70): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 878.838108] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 878.865075] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 878.880418] FAULT_INJECTION: forcing a failure. [ 878.880418] name failslab, interval 1, probability 0, space 0, times 0 [ 878.925049] CPU: 1 PID: 3343 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 878.932877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.942239] Call Trace: [ 878.944829] dump_stack+0x1b2/0x283 [ 878.948463] should_fail.cold+0x10a/0x154 [ 878.952638] should_failslab+0xd6/0x130 [ 878.956612] kmem_cache_alloc_node+0x263/0x410 [ 878.961196] __alloc_skb+0x5c/0x510 [ 878.964831] sk_stream_alloc_skb+0xb1/0x760 [ 878.969153] ? tcp_send_mss+0x9f/0x2e0 [ 878.973067] ? ipv6_frag_exit+0x40/0x40 [ 878.977047] do_tcp_sendpages+0x835/0x1750 [ 878.981289] ? sk_stream_alloc_skb+0x760/0x760 [ 878.985874] tls_push_sg+0x1ee/0x760 [ 878.989589] tls_push_record+0xa81/0x1270 [ 878.993742] tls_sw_sendmsg+0xbb0/0xfd0 [ 878.997720] ? selinux_socket_sendmsg+0x1d8/0x260 [ 879.002556] ? selinux_socket_getpeername+0x260/0x260 [ 879.007747] ? tls_sw_push_pending_record+0x30/0x30 [ 879.012759] ? __fget+0x225/0x360 [ 879.016206] inet_sendmsg+0x11a/0x4e0 [ 879.019999] ? security_socket_sendmsg+0x83/0xb0 [ 879.024774] ? inet_recvmsg+0x4d0/0x4d0 [ 879.028746] sock_sendmsg+0xb5/0x100 [ 879.032457] SyS_sendto+0x1c7/0x2c0 [ 879.036079] ? SyS_getpeername+0x220/0x220 [ 879.040333] ? lock_downgrade+0x740/0x740 [ 879.044486] ? wait_for_completion_io+0x10/0x10 [ 879.049148] ? vfs_write+0x319/0x4d0 [ 879.052858] ? fput+0xb/0x140 [ 879.055963] ? SyS_write+0x14d/0x210 [ 879.059668] ? SyS_read+0x210/0x210 [ 879.063288] ? SyS_clock_settime+0x1a0/0x1a0 [ 879.067689] ? do_syscall_64+0x4c/0x640 [ 879.071654] ? SyS_getpeername+0x220/0x220 [ 879.075886] do_syscall_64+0x1d5/0x640 [ 879.079774] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 879.084954] RIP: 0033:0x45dd99 [ 879.088133] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 879.095838] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 879.103099] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 879.110380] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 879.117662] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000046 15:43:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:43:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r1 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f000000b000)={'ip6tnl0\x00', &(0x7f000000af80)={'sit0\x00', 0x0, 0x4, 0x0, 0x8, 0x4, 0x8, @mcast2, @local, 0x7, 0x700, 0x226, 0xfffff800}}) sendmmsg(r1, &(0x7f000000b2c0)=[{{&(0x7f0000000140)=@nl=@kern={0x10, 0x0, 0x0, 0x100}, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)="5191def5a42e1450e47a453ee7c901391702e4a415", 0x15}, {&(0x7f00000001c0)="7a8ab4515f02477e5f59fceee3565b66b6a70e807e3daf3e07bf2d004af93ecc8ba6133bcfb37c9c2473e6a4244aaf27c6989351c50470c134448eaf39565319f1429bc845de073b29286c90cf268a81192e80d3565a5ba6dc195ef56cf36a22e38db3209c8d3c0569d6a3b8b044b180111028b367eb2ba4244b77642dfcb0fcf688d7eb963ab75c9eca468ccbf1977f1b0f559cc5a91c8b", 0x98}, {&(0x7f00000002c0)="08f1bd57d1010f91648564e2760a2f23521429e3cf657cab5b25a610742028acd3edf73ca67890ea424ad6ef830638b63f3af953a285b6d431251cb2c6e3c521689341bbc535fcf915e8353e5454d9976dd854c727fe1d2b2096bcdbb6e4e9cc98869a7a4dff", 0x66}, {&(0x7f0000000340)="c80501e28cfed24bf7cc45ab0afd6308ed91865b7eadf16e928c1132c8fc6d1e2d667a989ae8ed346c3553e57d21e7765d2b406333c68f0ee28cfc5ad96e6f4e550940ec7808ffbf3dadf0206891cc66ab78197166c4d383c6e06681880a219538e692abd380175318f550c7acb3b25a286a4ccd05b89b1903a72b83053848c57b1b18e23fe49f987ff9f52d3d9d8ed5b1858f0d2b94c92cc0433e7695ece30854d161e3fe363487589286d29624076163057f73a848d7e5d9", 0xb9}], 0x4, &(0x7f0000000440)=[{0xe0, 0x115, 0x70044771, "a46f24505cacf17fa2cdc0272b3ac4afc25c7fb8d3639f6b80ac26e6c215ac7664f2ae10a1c6491169751e29bdacae1f1914f3a1f7a90205b20c71157eb81056427372f561df9c73a9c55c77bddab111a97db94443086f536d8c0ade3859794d4d4c56592f4293f9f50211f97b709196aed821327b7a6f0f4192f411bc343cf6dce0d51eac5617564357ee5dac152c60466bab1de32c68f2f679cb62b3b6da21461d28968aa0d3e8249a6b0180614d56c1db6dc0ee810da5067041ec5cbf64b2cff21c98890dc9ebdc"}], 0xe0}}, {{&(0x7f0000000540)=@l2tp={0x2, 0x0, @private=0xa010100}, 0x80, &(0x7f00000008c0)=[{&(0x7f00000005c0)="524bc458a416bf3a62b0773dfc5c2ba07bc2b469604a44a3eea00ae8494b01872a8b9fd81d8c809c5e02ef4732c8a4440c84c59bf8fc3bf2e7a8db419706b3f62c5b2ede6bd455980cbcf7b3ae8defb4d3034866014075262b2b8773a4427cd1d691ee7f919ffd1d50127ad2351de86cb04dfdba035c38acb68cf6b0fd12b6f7d405b42f348d766925211950522b47cc9a35138249506f17", 0x98}, {&(0x7f0000000680)="49dca86753c458beacf54c5311374ac5257bc1aa42cfb644dc3e1bd8755b1939d056c1a9a3e1720b51680e25d0bdef4e7426bdd04543eb540f1a96b4b8074e80bf825935ed96a03c3ffc54364cad", 0x4e}, {&(0x7f0000000700)="36d1fa3f4b600da8608be6de1709d75555268ed086dff27b793c3e104cce29277d081cec78b8cc4c62c6acf820f55c4bbe13b04495cb8a611c12", 0x3a}, {&(0x7f0000000740)="3a6e0fa1e565042f560ea4106651", 0xe}, {&(0x7f0000000780)="e42e2bd161233e02b2023887d2ec7877b507d56032743a6ad2c3cb4fddaa696e9ff5e9e214474659d5de8a08a1d92caa9f30bb7c2856ef9d9e524bc612d46874f9cc134c2ebd3555bc220a6009292b5859b6d8284d7ba7976134e808f016d4a6ce40371441f343ff27c293eb16b929e0476c7399551573", 0x77}, {&(0x7f0000000800)="4eedf65517e957373bf979ba98112ab7d29ffa75e805df9547139b5ab58af0c595ac1795242b7b58535f164a939038aa6949d848b1fc5191b9fec9c68345785d7278cfa55befe1fd4cf20636352841e2c70de1fe355a61c6b3023bba31cc4a9d995c69a7034347f48931bef70ebfd5f4e2ed677fe0458fc74c3e75fd9a57a7f7210b94b21215abb0fbfea4c9b6fe482b3d9a731ae694c40afdbfaa50f651e921db9d5a87a43930eba0fbf885bffec277da", 0xb1}], 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x410}}, {{&(0x7f0000000d80)=@vsock={0x28, 0x0, 0xffffffff, @my=0x0}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000e00)="1d8ad36117e3b370e085d9a2e98a9ad965036f98e360e58f0e81c3f4356729cd1c4c0917a224e15bc46b15bb1527e3f6e385e27de94812352d96950e45d744311ef60b9e22a3173221810a30b020309000ce8df8793e406aaeadd73de96247b164383d6fa5117ef3b5b4e88a438384b40012c2f5d3f6516381bd2da165", 0x7d}, {&(0x7f0000000e80)="e2474f69b74806f6f137e46356f8d4f04255493bb327286b695026191f48edc8cdd2e003ffb142217b9129e417a76dcf9ae6fb28e14b6877dafee9aee905d3c2328f", 0x42}], 0x2}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000f40)="d7053232365b1f2c6c5f4d4327b00d033d7ee7b8dad8f91a938950b40bc4c4768fd945a0c3c97955f6c7e146eb32bf677960241a1877c5246ce77a7aa4a61773880419ef77ee51f7f5a7b46f1f6257bc339fff103a1216670ce33dd9d91722915a5c6fcfbb60409e88fa886a195f65a8df164777f14dac", 0x77}, {&(0x7f0000000fc0)="49636c7dbe0adb0a5270fe3bf87763d8774838", 0x13}], 0x2, &(0x7f0000001040)=[{0x110, 0x84, 0x1000, "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"}, {0x88, 0x3, 0xffff3bf9, "e5a3574f1c5bcab22af6f92e3865960d44b1f0913a26782c562588973e2ee0c81d59f8beab6ef3746b76d9784d1c7edf166606250b483eab94c72bede2a5d0809b69738839698f359ac73646fd969d3f8e0224f3ab6ddcc9e37448c412d13d35df99349ff2dc11fdb47d36667a84c81a9136"}, {0x80, 0x110, 0x3, "6e18bd33b03e6c1986ca390fe2be08ed5e51a2f398ae632472053e0fb19cccd17a30a59faf08bbee49fa031f11f2b32ee9412f94565d4ec65d624fb6da4ab7217d392a69f69163bb0e82e07678677bf55984eb204cc23994064f4965cb1bc5993fd2fcd799a4724d2aff340ebc"}, {0xd8, 0x8b, 0x7, "4b7a02a436ed7e9f4498207ab935e1ee045b68a30db29d159bc091267f6266bf3730e801d5398bd695493c285369b16fb11a662c568920f1a8afb02c4d4ead6877427ac1b6cd1ed28df404b5726ee26add15c4080d812da77cf464a45169a2815001326a8d9834961d112930ac4933accf30faa946f5bbbe062dcfb7aa1a28061c287ff415fbf7537dbb7e03cee7409260fe1c2c9df96c2f72a626b4e0d5c5139cc56b8ffd25b964623545096749f3e2bc663fcb3ab9b73a4e92f9b15b4c1f8616ec27461ed7bb"}, {0x1010, 0x105, 0xe4, "8fecc7097b983b281c0513d1fc27a466dc1ead4749d750e14e82c42a0d7ebbc590c30da825e5651c8e200d225f19beadbebf78ef5ee44ab1491af324964d8c0ca598bf93abb7525c671c53c0269718d76103deba7212afe8b0fa4d238bc3894123bae298372810a1bf7318590b6c5be9fb0dc6658c4f49fb466e3bc010488a1f0ad0875655b269253e0df65adf6dd843605eab2aa08c204bb3c0ad3355ab47fa61a2f22f41dace02ba6ad3c26003f5b892e774d683db60258e63190e9d719202f8423179d769e4c2a40e1726ec26282a0a0e42caedcadc19afed4a65fbad63fbb28c94c2f9f2645a39b5d525bdc630ae04de0cf7ed19e8c698a4385e1c3b94228dc0a3a0d675d2b022ca42e0bee8934025fe05853d2bd6a741a2cf4ce1dfe6ad533b704f3ae285b306c0870239bf1b87970bf3b248d4ee200ad81a1141700c71dba800a883b5419977a77c42db7198442d22d1eafda149b618759f33369eff94cdba87c9dabfd5e87db64a968856df4edb628ddf6fd1cc83efe9724d68c8c0c1eb30ed477b0ac45254bfee030c8b4a2f55f84e279bedd3e3de73eee55e3ad67c5012fcc0c5611d46ca16276c6a859449d09a2ec9c48a17f756241c43737a69210f1b08667f338c8c73dc118285e0ec54b9c5600306cb6d9a3413f1810401eb30378b3cea46e22f806b1890cbb5fcdfcd894bc02bdf0b1c940782e982f4eec0d9f5f999cafe1ae8a071b2cd3f7a45bb883788b7f61e91f4d67f090bd440bd05bfdd1f6b34f7e4528b881768e3e9a64b75ab78f4d4b270278e1b4fb46abfa0fee6c250c22e00dacda07c57f7a1272d98528fb363e5443f886560cbdc81a399282730f52c4c8238ca65bc2b479c5ada05dcb37b02d1a02aa1236b41e15715431c6f11e80ab2c5d5ed5ba4fc0cd16726757f81641f4c2cc6bb0d6c47e484519897f0c7158cfadfee4a3a003133157c7712387f2ecd6fd37549ce411839b230f3c7b804b33365f1d52cd66a6f7e28afce63652fd58194b5c82fd2fbaf9c22ca0ffff624401cb5b66ff0aba72a6dd0efdc444c8fe3b6dc76672de341184ce577fdf740707c7a0205ae0dd7ffda444985e9a652c16acf1da65e3f76038ac06ab00d47b3ca68028f60025498e59630f7fb68e70fce20e958ffd4fe0278d27c63904ca2fd023f3beec716ca6144f0747230f04f02c4cf47b048e9a16644b4b513dcbb5026123253395b17f0aa2fa3ab9b6a36d94d26357a697859e00c088c78297b4087591723cb3cb425dea7e4f3441b1630cbb37b059b5287b3f6f833be0e4d4273985127820ca3016d5f33b5e88ac0f5e9dcc51398008a9c28a462b09f6469b47b0be0f207f7a72ea85dc7848bafc1080f42a31b9193a337be591bc0dcbce6f070904f951d1dfc9f7a1a8492e9b2a8ad153e55ef7368b8a38953cf1f960fcc0bc558945e8ca47c3d94adf8f96885b66a0c46c8db9f453f8d1da564fb1b1eb8c3ee0bb56ec9d04e5032eab252140d464a9d6201792a6c085acd9c88abd71834f9e7991f9b0a0a303a2e54691a099e3260701a2c49c36a1af9e4aad1e32d726960f0ca44fc5e9945ca3089121911f33058974387aeca2972cb4fee6fb43a78ec586ff6b76d916a724ecbe56923706f61d0c6b632d20bf87daddcb4f9f6985d03bb14178e043e349c2d5554724f2a60357adac527058b6851e38ad2c0ff91692d5a1e110dba3fe582c3668e618ef73bbf44ba57be5bf4d897d1cfcbc90965e2c405247f548c254458782419fd18ccae240d66ef11b3b56949c35a8886cb776e03414506066b7b6e47a6eec4530152ac8c431efdd8c32cfb77f18762ee11321ab5aa32c44b7b0e053714b9f410d37943cd8627543a8bef5e86178004e562ef36d8564a93874296e023784b7944b319a807103d33280251e781976811958266ee162f58b08ba8c3c570c907bbaaac2876f85306438bafcc7b3fa40aa78d9dda7ca43ea04b0df0b05989741fe8d306e43174553f7fc5d856ea69464ccd5e3c9fd4ffae73c4b8720dfac093783df8e96b0a8df30a17dc5d4bee7c85cebb9827053e3cf0ca00d85959c5c369d3340263ab2cd464336c374235a95ddca47297ed0621b700cc136fe227318dbdb077afbc4d80f8f5d0d8fa5a2778cb0c6e1c4dbc261af197a5b71794bf596bb7238e3d6f563764ec1e0b199e6b050a704b5175f366bc61084ffef0dfbad32a204f4ee77ac0f423c4edd5dfdc0eb13cf56dd5b5ed9060333d1777e958a9ecfd01320497cf1498e4ed959f83faaa4e84adcb1b98dbc3e5b3cd69d292b5a7cd241644610afd071d592276208b2aed02538e6f6bb7c5cae03ae75ebcb255801bcb718fbdfaa1aa20c741a0a1c5385cb9b45611a894ab1e192a5bee5e1ad0e38625989ab5e867dbd2346fc89f0d7bdd28f3a43e4921255cd46a7ebd4f143af691b9ac0fe0d5aa1b3596d43452afa283cb91135743e93cdb9784435bebd9c9aca7f729c10d96075c67f17db6ffe57bdba4df6971a96d481a513c0d0d5fdc388ec4a52060e16c771c5b95cc5dccbca3fc103df68ae38dced9849182fd2bc55884eec971ffacdf6c2e25011b600d5ae5b752a5f9ec18584d5c85f9484341610520672a600f6bed829cb46d9a2d282a9fc1f2b05789b9d00e3d18d929f49b0aff69f1f472711e1ceb884f29d2cb4195beb01ebfac7933723d18bcc88be7c19b9a2f25170d827f3e31099867613b9948a2b306324c76751fead8827711d527e45b187f31ffd0565bad53262a688e17616cb7651e8ea930384f55f1018c205447d1414ef1fa60e9f6499b542871c149fee0b53636c3549c7eaf26c073371f414260fb0c40b1fb2b49ce6e4fecc4c321c330b316ed43f6204a36dc5c1664416e72f3759b3857a66993d952a7454625e9bc28270a4973dcf90871b6594c60cd35261568c079102b8c4638fbade8c5ef356dfb02e1ca6de49699e68ee525cd2ecff08217450f55719cd5a5cd557bca203e9b897eec73987d5c27139c8d4c135144bdeaf92daad3e6c6282645a204f7340d3a7605736140c3e61182a8e95778d1bb215091da3f0efb60ad33313b81b660c79daa4b6b1a85e2376dce913dd67ed824f1f28eb00765500d443382bc700cb159228eaa9c2cfc1a69321e9207f4933b21cc083adc7b62efb42e3f6dae1478adac7e35d495dc606617aec129d63b862e749f7efb81a7c5804e3d28d0ee0113d9e57a9f1aaf63515990d667e799abdb23def1a6b7d9ae88f9de87250810ccdf034fea4f1b684077a1c78ff0aebd2603963924b3bae0b75954b1a324a64c2e80b27cd8a9e1fad3d15314c822d080f144b1c8fe1aa2f90b8c7a7a9ef64e7f63dccd144acb27f6ae80fedee4eff709638829fd76294d230dd47ae9d4446f3159aadf0ee8b9fa362334b6739502abd7240222fa66be64cee561eca35340a8a905b8862ca1d9a336d42b2653ae0ab92a84c4f7c2cdbe1175cc2af0cfb90983ffd704a603c4b3e53f08911e211b824b5ce664a7bc588b809f0f9e1b3654ba6ebcd9bfd5d0df7d27f988f59662f246fc353afb394846ae5aeba25ee0a449b85a90387620761652852ecd1e3aa03916ab47ffd73bbd40921f4baf33a8b53d2a8e110239f2854aa80cd56758b8322ddd170a9dec334b202c9d0d63a06098112a45d62ee84c941ad9e9f0a30bf5d260cae41a844ec2f5ddd4b621abcffc9ce23772bd44b56574f9b230903d01acc4b07a5264e4a54b3f07c0665f4e55ea92b837973c508972e6259d349797e9cd835a8a9dbb9227e00624517974474ec0fdac90b0939c143890f568a02f3bc9f78589e126cd76348776aeb81eb28c45c8fbf97b5f34f4a403934c4bab850e498718e35697cf12294863edbee18f12ef574748612450541a71e2325dffe2dfd3852db9fca4c634ab7bf621715767088456449623827dec9bc3d7f39219757184964d73daf5300e119b1168a5038d931e2b7fd3bbd21b53b0305d4beb2f4c48ca9ddad4d03183a53d5bbe8d85858738570de6719a8b2b824a99b180f4c1796ec9b80f593a01815c5d5ceb13155b91b5245a33fb31b9e62e5d333c95f7841972055fd304cad01d986893561bb08cdf1837e034eab98a1e43e7f4358e2328a7d7ef1d798266f5bd3fe6c29699df7eecf0eb9b71a701d7cb3c45a4b8b0054b4c469a63891f7d10a1d84ddd36ab9862abbbb544957bd76189a94348d241d5afcc338a24adebf085c3bd1ea179bd9a6fb85988325b5c5387f17af237311de8f404c3c963ec49f33849537715d8a0962be443cb76d96d61a5a97ebad71ccfc4a72c932fd7044e4f4d0642e35d90960407e69f61545057f7dacc34b51460c54de40c1eb13f46011f18b880fb6d89e9cb8a3feb6400f194428c0b427b0e3a3bb57f0e7dcebaff2d6dd0c627bb93df5fdbe063d84e6e01c7b3cb39f77dd3723e994428aff0c49349a678b8bd691a74cfb443334c1aba9dfd93dcd2578aeddeff2785f437d16a0d1101c3280b773215622c318c4837872ea4c73c23a58c7bdd7083cf21f7e6befc3c8b1b5b19fe3a818c6626f61c423746c0913a55573ec2d6e9db29a0ad687af510ce3c452ff4825092a835fd221d1cdce4822cd54c3004c717f23106a2270b8ce5fa0e1a185af95c82965d3b5384c60f7dfa87d45d8b070b4140c667ae3a51ffbb932f1cdd063086d5ed7733725b2bd080ae8442ab4577aadb4189152f277a38a6eec7ecf57d19021ea6ddf6fb76f887a726706cd3f2dd9fe6e8ad69127091baee3809c0b6be712fab931c8792d3125022b0ebbc61ea928671795051e86e9ce2dcbce4da4a938f3c174226d747db6f984f1cc2cb69eec7655fff018cfdeaf58e6d2e168110b2497b6385afbe4b45b8dba89d2c4572a529b30923a59f560047e169a548998102778ef3cc1585465219ba2df5714ab84c3bd079117f99fb7b163c1091afd3beea95de8675bb42d88d9c65af9bed7f2c232a1174bb4f0ded3f979f43da3f6cbc0fc79ea796de22f23d98b28ebdc64b5fbc12a961cde3a3d6b70de58d8e9b5f223ac2b3a3a3ec811df3d0ccd71c1dd86025d8725c85baaabe970816c1057141614dbf34444bfae39e6182d68b2edf41df2dae37ea13aba1bf5e63427adf70c4e3e9ca7d3612cdf035884afe1b94e1887b8edb41f453c0afb66ad761a070b72da0bf7a298b795ff0b33cbef3d9b688198f5ef4548afc4e4588862171b767d542c7d677b031e93eecf0fedb89d1fa3a59fc1eec8530e2932c8c0644e549786353000684898eea877eedc5020e9534de40165474b62737f4c5750ae66260a5ae2fb4d2c00b85bd45ccb4b61914d0ed64065eabc894050c69f213429aad6672c3f8f75f388c3da5479845756d3b667ffde5f837ec372277b7d608b13ad53eaa18df499a3e9f1088c400e60efdce77c8e4f39de411ac8ecc4499ea97e9e09a13614ccde3766a1b9183dcc8db74ed98eedbbe716514d72675519c0aaaee68d19a48f89bd88931cd474fff25866ee03c02b4cd4febf40bbefc797c2b868805924ab1be8eac14b12f6b87330be13b571024b362731769566a158f8f172d7464e2a0a37e97a96013fb68f24abb810ec99828d3a834a4765e98de53505d81b9cac2dabbf0176e4e98184d6926009f5667963435c43e938cf602df3b6fed8aa7decb790e28d4a5918cf84e0e3ca0e5a2367f2371181d7b38200a864942b6a9448743e66e74b8a7262c1ab5cab538cc1e434a93b7369d201342b0e3449e988c56d7e0af197ee770c6df04"}, {0x40, 0x10c, 0x800, "856ab7b09022c07bfc4a0e5f269ba2dd32c29721490f1d2687fd987b87938e70f8f4ea256b9e711c5f7ab7c7"}, {0xf0, 0x101, 0x1000000, "a25c7d2597e5a7b4ae81eafeb1eb25b6336bfc6ed861d608129e98afab7e966ffb525f21b02311e4661e7036e91645ca14f7fc5d816514b0324cada165f82df19a04ff93c2e182ab46e04b26a609b2a91ec389a908ecb791fe22ac7166cf88d8a780d45fa463367ef3af42ebd9fd2090d701f7d84d62d584b8bd186f62d0eeabac7d819454939e87c8fa1c88479397c3c2575a9d546539ee952c690949723a41923315817d406b92a52c570eade257bb7cb167bcade7b83c22a9a12c376232649a9aec0bbeef30d35c26ee17f9fd72080f84cc0d78dea9a3ed90"}, {0x1010, 0x104, 0x64d, "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"}, {0x68, 0x0, 0x1, "1d07443340fb85b3574a574c47696b06adce1d78dbafce9755ed328a1de8bf3b7bd3b678f71f107f112ed386815d34c2d86daf71127c2657464283a39e417919a0ce0fc90b25fb99695706f321bbd550d1"}, {0x58, 0x110, 0x80000000, "04322e1b78f4e42fa2df82fd8d70b40fd7d0473e0546241e05dc22c0d9072d86c3a9de39d9d13fa97af78d2e2bdd2bd7b65be888dcd4ec73ebff7aa895ffb45c4999"}], 0x2500}}, {{&(0x7f0000003540)=@phonet={0x23, 0x40, 0x8, 0xbb}, 0x80, 0xffffffffffffffff, 0x0, &(0x7f00000035c0)=[{0x90, 0x112, 0x5bcd, "81df620ed10baa64293e7c6bc6491198939700e1756927b32460a6cfdacb969497ec85c2f66d967e191a1375413bb331957e5059eab6d577642d0ed7ec3cac2fb969f2f32f3b3b1bfc9e92817076c50786bc394dc3d72cdf6a810d8c13c3047179276ada48739471c5c3d46b89247adf4512e91c195c8489066463d98dd07083"}, {0x10, 0x118, 0xc0000000}, {0xb0, 0x103, 0x4, "7c079a3a5b1191a836491f787835937b568960fba1b1e0102344e67b1121cb36b02fdf1fda682bd294228ab7e051786d3adb7be4e951c75954a6c2a8b0ca338c67cdd43907d43f34658e3ec35414a6de03a7ad278ab405cb9512aad03eae7b70c96eb95f168cdacff5a944e80f281a1520664054b09b98b0b741bee9ae4572a6e5f93bba4362c701ea086ed7f31978a6b40536f150bacf96f042eb2c"}, {0x100, 0x10f, 0xbf1, "5e71529bb2531ec0c0225277f82d5b372496f4f010846ec6702bfffdb4697e66dfbecf4665785a77af3eaf3a0efc40a81e9dba7135397a6db712ae8bcdcc11d0d91a17290f715da1499f9541d20544bea5813a4656f221a78746ea840a70fbc54e6db98bc6aea9baf4e24909f2667fdac1670738b3b06632cf807f0b20c30fe4a9c643afd3f938e622415c4532af6e5638c0cb31faf1477c04e7a0e082ba1f5f48c87d7e009b60d35ce4913ece5ab757ded142f683301fd2e7d64f070db1933b492182a086ed81b6ee8cbe3c394db4d723300891ee61f4e75f0fba4c3dcac48de318754596cd4f7ad26c27babd0b"}, {0x80, 0x10b, 0x800, "9ba5d6e866d4fdda63040ce7bd0bd9603d7a1ca572b1d62a4a724bf82f9d79fcc3070179ae3b9a3368009b75adac43dbf1480e4dfd1666c033396d189dba1d7e197ad1a2942d2ee0932808b35395802d54e93eff618f213204cdfe86d68ab0218cd1ee01bfadb199b07582"}, {0x110, 0x109, 0x80000001, "9c3190b8a5192ac781f60d0d64e0a7459baf7acd247629073b0aa485000821cdc6e0a0335c009d49fccf2cb6b5b908dc9ac4a14b5c454d6b023eba92f0bd45af69887f589c18676e9740a3d07690017657497789ff86a833e27701e81ed4d721c432a36cbc9db0960d6727670be2d661db10590a5b9bd06244f90c13961f6a508cc93f7923351c4f0b73fbf9f170eb3f63b9cc17cba3e8eea1f650aaa27d797fcd1812807db12cc43977ca55ec9b1bf6bf3a738c611896ddceac5fa0b130effa84e1ad72425aa6e7fe1f5410103805853eb44db213cda3f10fcfd34a6793d6185a0e51d29c28e1abaa0893fca4eec00173ceb6211d4797ad039885fe4a39e3"}, {0x50, 0x105, 0x8, "066ccac778d577cfe29609121cc86976bb040a4e0cfe44000de5b448922d3cb5c6d87097d0e23be4f0ef1191fe493cde3ea131fa745e8a16e1"}, {0xc8, 0x109, 0x89, "0bb268f44e2e02560d4ab8a132094f5152687e8ffc27f0325529b2ed98c4f7027e9e6573069ca4a3c0f2f25299d7d6611a972d0c0b4b51d8a0b703257bc733f66732ce0ac9dbd9f79101e1494256b1494fbd81593dfc369e8abf3ea903013eddc69b016e9fff01339fb88375b01709c3be4bfe5128d4804878a5981aea29643f14086fca777bc1bd2d130fb8dc606d11d76a3dafa2edf355470e8cb5a6bbb13c90b17c5f1a398fa70142e92425386e55c5eb4be51aaf"}, {0x28, 0x3a, 0x3f, "aca52536a79c7b3bdc8115bac8dedf96aa084fafa6cd3a"}], 0x520}}, {{0x0, 0x0, &(0x7f0000004c40)=[{&(0x7f0000003b00)="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", 0x1000}, {&(0x7f0000004b00)="df2485be954dc9820802ab003580581211eb396cee18fe9943f57689c15a3f002f5315759fab360dc241e5c22487d67a9e6e54236dacb16893a1cf2cb906d1ea519c62b716ac53c6f840fe909371323daf882c93221e6a11", 0x58}, {&(0x7f0000004b80)="5f61f210512337ca2eff3ba23ec4c02d808d8ed0de57c79be2fcb5a177fda2ed7b8bc65af85655293d8b844fd187de5543dd10d0578c768a7971872a37d665332b2477ac484e999c20e2cae47a30bae6def322f0d6ae48b52a261c1626abe7326e80c44e713c1cd3480c05439176175265", 0x71}, {&(0x7f0000004c00)="b5291e0e203630e267736b75a63ff54452bfb39bfc3b986327a2ecf418080a2e52260f4572ce44041d06035b662b267ddcc498c211", 0x35}], 0x4, &(0x7f0000004c80)=[{0x48, 0xff, 0x2ee, "66884ed9005f961f5efbef1a59b15fc46b781489f31a4b040c65e912efa947a652f9180dac8447271fdc70b65c086590f701aa4d"}, {0x60, 0x116, 0x10001, "06aff59d04128cd34e68ee32793b99d3b7cd9fb88aeca1b69d8f627f252f4650cb5c9427d9981f7a0bced258c5e776aa5e5dc8364cb8bc6fb6cc9a58451b9aeee99837b196649bc6b553422f"}, {0x100, 0x7, 0xfffe, "a998e7d765a45aa60fa4513d0859dfbb2ead4ea605466c5f025b7d7085cb43181fc44722c6e0cc329ca012719cf22a5b83e490ad56ff87c695cffe19ca17259ecb6d5b26aad7b5855fad494d22eece16f29d59b67a87dc0258155d19951054e9e7d2d51f7408430b73c8226261dc9f41fed1b81031efc6ac6014d790efb24eb169540fe34297ef4f846f336f0e32eac78a0401f89a59908c6406ab470e9c4f6d11a1716fbc6c36875e609e74d299d031fea0b013c253a77a001db2a888ecb566e3ad01756311dc9092d33aa5e6fb026a5769bf5b4302e24971c7190be4570fc65cd71be4767688b6ecf4a8"}, {0x40, 0x101, 0x5, "37e891f2b8fabe99e1998892c84a19cd0e280ac79ff90ec719cbd5af69c66865f47538fed640343abdfa57b9d09bc9"}, {0x110, 0x117, 0xedebafb, "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"}], 0x2f8}}, {{&(0x7f0000004f80)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1, 0x1, 0x4}}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000005000)="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", 0xfa}, {&(0x7f0000005100)="631368300eff1fc3ae53ac71ad71ba2128c6abb4043ed8b1a0af0753302e77e1788d7d5472c53221c2cc248fedc3d2e6975225202b0101ea6c0ba702f95489290fe790f56737e996c0c72d06ce5132551699022a0375ef7918c54d01a36c543dfa210e2c75d4571f23eef26fca84bf79756e805050c24abd8ff451d7b7857e0cf43fd705c0dd92cb8763b38d131458e97b4beb752b737ff70b1679fdd4680c941ed42f98de0f3b28fb1a0587d0a73ff25f7553c4ecb2e3c600fface6d7b6", 0xbe}], 0x2, &(0x7f0000005200)=[{0xa8, 0x10c, 0x99a, "4c93ab58eca6e20c561eecb5ee22b2c2c1f41745ff81e518a840a876cc83f51f467d039fbd56b43da93c613e44ee39ebb91f894ea7f41a9585bc80b2a4c52f9941dee311061778963f93f77521aa57fb5c4cb9aef84f26914958af07a8b12423a21b75ba5a28590da67374dcad167976b08d409fb65f0c8034d575de1fa6f8ef9ed1bb908cc9acc5f1c80a339e5e8cb5bcffa911cda5"}, {0xd8, 0x103, 0x3ff, "a6ae95b9d496bf7320f3c88bb6cdf7f43d63b16b956860a9957cbe3942e5ff69fd1b21bbb53cd0926c5988a24df4ebecf6e475919c6f4d6ef8cd45fdaceac7dabcea4addb4c994eb223751b305b08aee6dfb5ccfaf5a1aa3ff6ba3829119235e4b8c25fe924232b6e8ac8ee21fe9bf607652f6ffbeb657962a988c8d7273fe07486a59fe1457e4fe60d5c9f1ef0c23d427952e3969097f662774647dac0fc6744b57b2a6080e6298506eb4202fca6586ba721762861c6382ea74adb6c2482d9fee1891010e7d"}, {0x78, 0x119, 0x0, "2b186952d7be9d58e7460122987de3223be2e411a375d20b17d39ffcae01e524c09ac8cb889f1bb6a54cd046d6e4c655c5d1e41235eaac2309cd26356a54542402087e07b782404583b54e89b48e476283dc6d9652ccb43d7fb78ecc0e0f518e1188f39fd29159"}, {0x18, 0x10a, 0x800, "8be8663445cf"}, {0x1010, 0x10e, 0x9, "0be8b8da14a61b37c52aff5dee4bad91f918aa9850435b081026189d2292e6db240eba1a9b3aa1f677d23aac61c721733dae62aca49660f67f081cdc7703380d4f80e018655d99982fff824a7b591aec4dd07f65d35a3c33e0f8a12fb67f149e2285f7a6d4dcf2b67c5e10dfa718fa6fdc3b4f37d9976078833d44e4ee99761ab7be3d412ce74fb64a45ca4fbcbde056138f39fde1472132bb4221cc8a17557869ce242777d0466ce0da9112eb3b3931085f80153c61fc472c928f93bea4eb632e6ae5f154d42df0c850df0eae4d5c16257a2b5eed5bfd2cfe17f52efdc2905da16cc8aad3e477a72c9eca9fdd58bd4ee567ddc5f8f8eb0cb07ff313539e48fd4f88041cd13d8d7345c7ce709183eb55727e09aca3a05de92fba67620e59e115f1a2ad26568a8640077a2433bede4722acb67a14a33d8796e264c81f22f26390c0aca630f2a1424bbd59c4072655b701a23ba2176918624a231e6c7ea74a097507f1cfeb0955ec55563e442e55b41156d1d96da434b7fcdb75ddd463d5a7d6b1c77365e8c3660ad3778b85af3eecaecefeb51f130a1ed75cda1f6d5f7df527ead679b6ad615ff330f82f8d787f311f64db011f93dc970011d16795032a4ec256948a49f5c3f2234474cc81a724bfb369f8f9ca494bebd7f6b7794f473ac7b6aeede4188446345d20c57cfa1769e0a6a101173ed4c2a68373552d83ee60782089d78482936a44c832e3944548d824835a323a3427259f63c2dd9a1cf2729a02f20df4bf4e2f59efe69ebe01cae6ebc67768bd57eba60e18524f17cbb24447d1e7f53e101474fa3107e0e4eac12d9cf9ef7926e1ecffdc0b43737f558f1ee507c3ea5a16b7be85502774227b5aca54db028eb189202f645efc7c6edc66c03b9036658cf309ded6ae74aeb08a362af71a14602a1f097e235d89dc9367fdb376fafe4edfcd8470a4b7065b5d6ae8b998e175ba56de89079e92d3299a5f43f893d041ead2a8f36fcf4d7d6fe2463c1c25be9f91e4c1228c236ba682b9b16f419bd96a28363af7319ba2223b81c90b051a1ec93e26e1f9cb67661962e749852fbf581070263fb6a50813644ee7406f2a99aa28e9579abff4678bf5c4722803edc487b1c4182b89fc53902c13bda8ca3fceb0276d3953aca92d85edfe93ecff8c764968e431682acf1db544f119b6a90a0296b64ed203080c5f07e187d4f83e60769948787e43b22a8d4f510a41efe7120a3b7942f406b9571c6f7fe1dc8589b4ab69cda53bd7e0aab5a56576a0a29b45085d3dede0a09646666c91d876cfac298e88dbc1065a12abc06f1be3a09b8e526a789d39f0f7379dd3eeda25c8db1132c20ee9678a41e7dff3f3e9126dc8b4f709eaa11b5776ddab6babc35a43451ce3f2d68512f7cc858996f7e2320768ef5cef69d81f4749441508f87c42a8e147012d04f442f4d34358bf985f48ef60c8b64e2333118fb91b4da619e5cbe3ea6bbdedf03eb3324c5db218ab00c1461a4dc3a02d80aa8f617775d34947a66205e391f67d9d0b85bd99e1074d4a6af8ab56df32184a7f23052ad152910b72740817212b8b6d3bd1666e4dd492ea76cc1dd062e3d0cb82ada668518d4f2deb2733628115fc486e0142361247030e3de3a66b757b22d28afc277eeec308f47d4252e7e317ef537bfdf41490786e4d75c337fd48227e0202a2f35aefb603e29a3930ba745a2e63f750a8b5bceefa63fda023a5660ec59c9af0ab714c3df06f58eed488ef883f502d0e6055b459df5973e47a7014fd0736af32014aa8e620d3769a051b6557edb8b8eccbbae9cc0f54daac919be0e3a2bf4a217edbe1eb92c1f9a832585c86900d06ba8329eb9b2389c8121f06907c8d81227455d9811ebe2eb972b55ce89d0a55b6e486931318f685c96f6e0afeb0c0bbc4ed7f89014820af31b37dda1638438871bfd9aa33e5b6e0f2b3e332b0cb5475c4d6905bd5d9ca565d9ecf0a94ea9595e3ae36a2bce1ba62ea94f17331323d6982c1aeec63973401a12ae233e1bee30703f327f69ba308f90e34eb5de979ce3d267e0601749859f5216e019873e16af68045541de83e080e238a2043c4afd47157fe0900d22c6ddc40822ad750d0db6bd872d05627f1a36710fa8919904dc52d30cda4a7bb20eab8cf4291a3fe9cd9c83d0a45ac0b1802047412285786def427a9af23698dd7a6341cb5bec45defcc0a4a8c095ecfd5d4a52fc15c2a624628ab657c982e94965e7dcd0d2f03f967019f79eff9df6f7801f1362161124b52752a9dff299c9c0b95382eaab76f3702a402b09830d74899a7699f917c34293a6b54172bdb27514dca81c3dd1ea11fa00a07a71134427381d98b9c78ec93abc26a3f244525ac76062960c5ef778369afd049ef3f5a8ff3b0e29ff94d81c166f909632a081ef9482daf7a6e164b0d8875e60a0e8ded53d60682d0c23f3e647c43adeda326aea6ab376cf33557eda258c1f842739a341b47d53aabbfe6ee9f5373a26668fff0bf192fe621a962e16c317fa1402a25e235202a6e607b073fdac57d9edb6a316534630ffa9c3da4cc9cb2b541ec775165e057873ba3d5405b24d2238b66faf6fd569cc0452d93034a4cb3a29756b9c6d24c8874efd262477d4301009eb1d27a39a2c6904c778b3b3dc76a390a2d1668b91268ab5f6fe5bf459752dac2ee242e7412c3db5ba111d1ead8baba48720f9b54c6c274d69294e3e4af1dac222d7cfdeab56032af92fe52d4d430b5172124abd939c46c8bf2d033fa7533296a95366ec95bd814601452772897f9a9827a2203b352defe0da12d5248fcd8ddeaabe09ee8c32da05de06e9249d34f11d8919cdac86a88659a568827cb1ed5952b7a04218798b37bd6dcd6a119cf5d367aa55a8ff68c622129f45595c0cbe5ffbdc7bf312656cd7a1f90ce7da0b2bc30731e20bf4e4d736b1e1e275ee8914c872699eb8151370dc5637b26ff18acf4ae8e64d9cb4c2447402755271d1ddb9978cfc7245e6e8d6c732cbf14f3ea7cdfdac9dbbc172745bbc894c08ab493c3a55e61b3dc3ad247ea0fe07c25a483a3861ee50d7a2e8d44e898808a636dfc4c1fe366adefa7cae95d21f2a3a0c3e6dd161f4c9b1c76dc5a2e6123e5b45f652027a5dfb5204d4775445aa5b99d87a23278d72c1b2d674611f5807dffa6cfab51d165fe9aa5fd2a049fa980d17e4cf3689de3e492bd14e15c44062cf9585b25f495b950fdd7c2863f70b1c65f46ffab35cea5de1aba5fb17b49951bd02957637fc96699a5ae79883eba129c970aa0a24841cc09cb54ad85fc5c504ae2cf0de11cf6691d1645ce66fa85df5f53761401405345ca9933209c980c48712362149e6b209714f664c98a65542e61d0b8098a4e5a3ab9faec06938eb8dbd4a8c754cdaff97eb5340d214c8a54b564d16557504578e74bd904411b2ace26b3b6bc81c855c61285df03788429042dc5148eaebaafeeb6391f74c1f3525d4cf455ea1e06e7deb4d11f165619a2ea7ad9af20f127cf5931d3f61eda60af21a4c98b78e21ef40d3bc65149a27909ec50218ed190a7650b19d70d35f9c3ed79753c15b463fb1115bf10618fa8ca418ff4992a4c2c2f55aaadda74a8b0fb4babfca497924175de5f383a158983bb898fa9a96e4752ee5d284be1bba861cb673dc8b3cae9539d7b252b77e96a3d70b29db930b97418e0302dcefbb9f00e39ee601f36e77b4133d6d67ec0cebabbb84f14e22447c57ce4fca19b3c6e855a56ed877d22b66578d46f4e1702782b135c6008d86ba22567068ae06d9cd5f35b6fbff672d48c2f4de99dcd9f80375a567929ef32a1d9b5d42dbd0355775eab4f9dcb692b83ec31ab895328bd7e5d7ee34f60c68a0c0848d59be6c1a8908d363d9bd46a7f3a6363b4b5cc2ebae5b031f0214bbf0220ef2ffc86a513f248417fd6e661a16dda85fccdddc64972c7c7b4ffe2200f6c18dcd89b401231615b2cd76c02f8a3b3da4d8ab14c57fb8a62fbc2f0253fa551b6411e3473eeb68b53687ccf95b0090ca9503df2a3c0c226e587b9d2666a10be993217ddbc3a5e0abe34fe4b9ab4b8c9b38814990d75ea7eccd27b774daaa0267e7de62676017cb5997a2d6c3601e42fb34e9e28fcad633b40eae80e9910ff23152d5708c1153c57e35725b110b9b053ba3aaf0683fcf3fd83e2a45a56f49e55c64aa0308e3ce29738b457f6ee8571605604ed54404d54184bdc2836b5f1facafc3bf6bbfae38ee1b76a631172073b9a32d35d1685956477dc9daf83c8f08acf50a0bbb4f92db37993eaf24d1af07172b8dd70f8524cb798d14cba0300ea8f66816833b67dcb7d82923c88a852406d03c103fbdf831fc702807283f10fed727d62fb3fb180a688ce8080d623a047e46fdc2e243d2980297ddd9d0af6d981002b9b7ae0e458afda9a341b807dc0e0e04cd34e9512efd1fa6f6b4dddc88d29a951f3ffb444eeb722c5f3758377c2f9a744bd10be5c05d63ab7ca23fee8f6c6ab8e9dfaa08d8525f944f7e84cb375d6d9b3eeff81f483e741b4414e949563ad73e00c2e539037b0cbefb773f0de48b613d53c428cd30764bba365f36f1045036896a81b80d151e2e89187d1367f243c6f1c8162b4ca2b48fb915ae37ec0727adfa63c583b64a06502014dd0f91f42bf625e5c80eda451c6cd34b1ee406b760a23134b6eb29db655a22ef77d9b57cf69161353b214bc0aa589fbdf101fd70818ca7a0c09d896c545c75790b7b01ec57a6cade1c6aff47eae616e7fb270f86f5f49045e0c2baae23d7271be5c74f1587aeedbb19748bdaba121a261e91a639dcf4cf829ace9d6252133569c43badfc131dc839f7db1019bea4285c0b665a9b7684a5d86dc45314abc618e1f47f2939900d354dedbec444e484bdfcbb0bbb31d869472e605dd3d2fe2f1ffe940992f4a1c76276820c76005212f98c233eb3e88e9dc9252236802d48319551d935fa6112a331be547437c7fb41d297c6fe0d0902460854ad96a75e067a0dfe980948e7a22ce99e1ec5fbe61946385e3f12a4f13e11529a9fcb17be0345e05e808e42ff1e86b791739c3f2eb0b6eed0a20b45049c934134e496e0fa099874166432191df44b2fd4d69205d2b2abca4f53f3a790f5049bd4d9c7aa9223228f55871ff8be8e0d101e2cf047df799d644bd785f74dce8e17044e44ec5892823b3deea916da40bd20dfc248b6df6ec24b4c81f34c9cd33ae3f7ede2f32a724b9c20597d905f09bd8278baa196fb173393e2b2a3ecb159a2c6ecfbfbf44f428e280fa4c2d7b93fdd268c07c18cd0f29515d4dc6082758f46e6a271d64b61828e6220d45aaae37302e9aa210806ed90e3ae4781c7c566cbdb9d11585d4c9a178f91411c82256a769d74e84cbceed5c221be12d7d16f83bed03dac7347d966f2c831af9d4d0730527b6516b35d0b8e09cd7c4f858182a325a7e1394980b14d4d49cf5bf419fd88cb8e6b67503149a579c2be124e403930cbeebef5589cdc1c22e2b0a74ee5f7d3872afa53d3b40cc6fef66d9e398dd76960bf41d6f946dbad299c8cdc159d02edef3fb352359a1596b132403c3fec29a856f85df17d4ba51b3be43b46c783efa433ae18f052dd2ade008923875768f4864399f3733b755fbac23e5f89ba01c96460475dd06177d6be615cb446915b0cb4bdff6fc14aa533dee427feda007a6c95934770ee8d81e00a05aada7d873ef6117818db477e841ca2a3a9c5a2b6baf16563f1198ac02ca2211ed57c5c5cd7c40dc3cdbbe536209fdd04e210421c7"}, {0x98, 0x88, 0x8, "b79ec5464ee412595de2b90975d438a43bf9f1f55758fe2a556575635ad8148ac9f2fd18659f1230fcec3e308fe078f501f87b1461b9737eb6da57ccdbb4472e5626b30ffc9e3d725e4d9b58a2efb72100cdf44ee2c7c7ce5f01850b57338758c54187d3ee76aa19f812064a7f916841f3f2548a47e590a1df386cd3483832e67b6f"}, {0x108, 0x29, 0xfffffffa, "df09fdeaaa75017729363b820638344c958268a371fa14f87f2874bac255dd07940ac9aa2ffb8254d71dedf220a018492a13f7470cd5d173fd0773f6ec170ac5245a1db33eb178dffdefa9195f9058f33e6479c8846936c5b082ade0586c47be4bf46e5211f3480f3eafa49c3a6c2f182621ab6fca2aee0554841d3b895f45adab9ec0d28bf99249898b7d5c19f54211b376dd6a11d4af6ae70f378be92fa2b603c2070fe187f5b999d43bc3fc5dced5171dd9a89277b1af6bb9b51f00594ab75bd940ade3cc12439a159f078d72a797bed892eda7fbf2fa28dd1519a462475c2d623646158e4f37d2dec87c4d942cc0dd1ed3786f"}, {0x90, 0x111, 0x28c8, "d62753242abffa33356a6c4c46e445e3e08387ec98831d54ab1673f207e55e5029fd4229f2eb7a5d971363ae481ab80e8da9f19608c35cfd04c7dbf2cb086ec863c04bd014aede977924bfc4ebceb7929329cdfadd199d27dcd0b48c0417245d1468a0007cc92660b4f8d5d72ed41639d767c2be93ef35abb9"}, {0x58, 0x116, 0x47fff, "3acc920514a860e608594599457b5ba9cb1640f4455bc06d4c50d009d5c1ea05aaf9a7e38eb452b3a45a87ccdc5dc8d2f574938f25055b9e233922fb6f3fd8c7618025b0ae95db02"}], 0x14a8}}, {{&(0x7f000000b040)=@ll={0x11, 0x0, r2, 0x1, 0x80, 0x6, @broadcast}, 0x80, &(0x7f000000b280)=[{&(0x7f000000b0c0)="2440affaa3b1380b1dd6cb596e19dfbef5100d56972a2ba0946ff0d3553a5c23dce157205fd30bb62a9ba14b9201c4ace39235e92ed6965cc15ba1295c769a4287a861981861df48ccb84c25a6c73bc19a447f29af22cd0e26fafa1a7fb448cdefde2e00ce6d1270553c83c00fe7b3a0ecd7f23f67f28d5c36efd615b540ce102edd5715d5db773045", 0x89}, {&(0x7f000000b180)="d8ac24c4f5c3c841690036a2070be681d7a9c511397084fa02d5f486b71ef624462b6a596af1daf2aee1f0a74c2bdf41f9b5ae67f25c93cfe727e73fe0093b3bd3ba3551459c74f5c051ff5312a265232fda82f6738850c1e80cd3d5260447b5e1ea145b7fb95d3c2c53585ca5747928cf1b1f5e19a67ef9de84d05770db4ce0e6b03927e4ce0bc53b97f693cc8b221b2a78efa1a9fbba07fe7ab8e0f248134b5b2217baecaed7ccb4eef91011c8bedb6e8d710484abf4b50fde852c38c4b2c249ec089067f7ceb5b72e3da55faf49fcf2900de1e6e2a41d6b201486fc374825951b9a708b3b023e0f", 0xe9}], 0x2}}], 0x8, 0x8000) [ 879.124925] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:43:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x4080, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f00000000c0)='macvlan1\x00') bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0xffff7fff}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @local}, 0x1c) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000002c0)={0x8, @sliced={0xd2f4, [0x40, 0x4, 0x2, 0x3e78, 0xd82, 0x5, 0x3, 0x7, 0x3, 0x1, 0x66b, 0x3, 0x0, 0x1f, 0x3, 0x8, 0x20, 0x6, 0x2, 0xd6f5, 0x1f, 0x6, 0x3ff, 0x2, 0xf5b, 0x0, 0x6, 0x5a3b, 0x9, 0x8, 0x7fff, 0x7, 0x3ff, 0xfeff, 0x3ff, 0x6be, 0x3, 0xc81, 0x1, 0x6, 0x8, 0x8000, 0xf, 0x7f, 0x9, 0x401, 0x5, 0x9], 0x725d}}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r3 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000000)={@broadcast, @multicast2, @private=0xa010102}, 0xc) prctl$PR_SET_UNALIGN(0x6, 0x3) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @remote}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f00000000c0)=0x80, 0x1) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x2, 0x0, 0xc5, 0x9}, 0x10) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x4, 0xd7}, 0x90) fcntl$setsig(r2, 0xa, 0x15) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x2, 0x12, &(0x7f00000000c0)=""/137) 15:43:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x200000000011000}], 0x0, &(0x7f0000000140)) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0/file0\x00', 0x1415c2, 0x0) pwritev(r2, &(0x7f0000002880)=[{&(0x7f0000000580)="12", 0x7ffff000}], 0x1, 0x0, 0x0) truncate(&(0x7f0000000080)='./file0/file0\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000000)={{0x3, 0x0, 0xfffffffe, 0x0, 0x5ff}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 879.322383] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:00 executing program 3 (fault-call:7 fault-nth:71): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "d78a13ee35d3e825", "1fb29137a1e6c74b086e36e2159b0820", "731f7c18", "5333dc16eaefdde6"}, 0x28) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 879.469535] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 879.500884] FAULT_INJECTION: forcing a failure. [ 879.500884] name failslab, interval 1, probability 0, space 0, times 0 [ 879.517194] CPU: 0 PID: 3382 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 879.524993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 879.534342] Call Trace: [ 879.536934] dump_stack+0x1b2/0x283 [ 879.540597] should_fail.cold+0x10a/0x154 [ 879.545360] should_failslab+0xd6/0x130 [ 879.549333] kmem_cache_alloc_node_trace+0x25a/0x400 [ 879.554441] __kmalloc_node_track_caller+0x38/0x70 [ 879.559379] __alloc_skb+0x96/0x510 [ 879.563013] sk_stream_alloc_skb+0xb1/0x760 [ 879.567335] ? __sk_mem_schedule+0x99/0xd0 [ 879.571581] ? ipv6_frag_exit+0x40/0x40 [ 879.575569] do_tcp_sendpages+0x835/0x1750 [ 879.579817] ? sk_stream_alloc_skb+0x760/0x760 [ 879.584449] tls_push_sg+0x1ee/0x760 [ 879.588167] tls_push_record+0xa81/0x1270 [ 879.592325] tls_sw_sendmsg+0xbb0/0xfd0 [ 879.596313] ? selinux_socket_sendmsg+0x1d8/0x260 [ 879.601157] ? selinux_socket_getpeername+0x260/0x260 [ 879.606352] ? tls_sw_push_pending_record+0x30/0x30 [ 879.611465] ? __fget+0x225/0x360 [ 879.614919] inet_sendmsg+0x11a/0x4e0 [ 879.618716] ? security_socket_sendmsg+0x83/0xb0 [ 879.623473] ? inet_recvmsg+0x4d0/0x4d0 [ 879.627450] sock_sendmsg+0xb5/0x100 [ 879.631161] SyS_sendto+0x1c7/0x2c0 [ 879.634784] ? SyS_getpeername+0x220/0x220 [ 879.639019] ? lock_downgrade+0x740/0x740 [ 879.643182] ? wait_for_completion_io+0x10/0x10 [ 879.647850] ? vfs_write+0x319/0x4d0 [ 879.651561] ? fput+0xb/0x140 [ 879.654665] ? SyS_write+0x14d/0x210 [ 879.658379] ? SyS_read+0x210/0x210 [ 879.662008] ? SyS_clock_settime+0x1a0/0x1a0 [ 879.666416] ? do_syscall_64+0x4c/0x640 [ 879.670393] ? SyS_getpeername+0x220/0x220 [ 879.674624] do_syscall_64+0x1d5/0x640 [ 879.678513] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 879.683698] RIP: 0033:0x45dd99 [ 879.686876] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 879.694577] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 879.701862] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 879.709123] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 15:43:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f0000000000)) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 879.716385] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000047 [ 879.723649] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:43:00 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x400c00, 0x0) 15:43:00 executing program 3 (fault-call:7 fault-nth:72): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x12) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x8c, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_team\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_team\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team_slave_0\x00'}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000}, 0x8001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 879.875711] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SNDRV_PCM_IOCTL_STATUS32(r1, 0x806c4120, &(0x7f00000002c0)) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f00000000c0)=0x1f) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r4, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x98, r5, 0x20, 0x70bd25, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_OPER_CLASS={0x5, 0xd6, 0x36}, @NL80211_ATTR_MAC={0xa}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x9}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x4}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xbe62}], @NL80211_ATTR_OPER_CLASS={0x5, 0xd6, 0x1}, @NL80211_ATTR_OPER_CLASS={0x5, 0xd6, 0x2}, @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2f9}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x27}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x4}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}], @NL80211_ATTR_OPER_CLASS={0x5, 0xd6, 0x1}]}, 0x98}, 0x1, 0x0, 0x0, 0x4880}, 0x20000044) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000040)) [ 879.918233] FAULT_INJECTION: forcing a failure. [ 879.918233] name failslab, interval 1, probability 0, space 0, times 0 [ 879.956167] CPU: 1 PID: 3397 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 879.963997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 879.973348] Call Trace: [ 879.975940] dump_stack+0x1b2/0x283 [ 879.979576] should_fail.cold+0x10a/0x154 [ 879.983726] should_failslab+0xd6/0x130 [ 879.987721] kmem_cache_alloc_node_trace+0x25a/0x400 [ 879.992848] __kmalloc_node_track_caller+0x38/0x70 [ 879.997778] __alloc_skb+0x96/0x510 [ 880.001408] sk_stream_alloc_skb+0xb1/0x760 [ 880.005752] ? __sk_mem_schedule+0x99/0xd0 [ 880.009985] ? ipv6_frag_exit+0x40/0x40 [ 880.013968] do_tcp_sendpages+0x835/0x1750 [ 880.018220] ? sk_stream_alloc_skb+0x760/0x760 [ 880.022812] tls_push_sg+0x1ee/0x760 [ 880.026533] tls_push_record+0xa81/0x1270 [ 880.030718] tls_sw_sendmsg+0xbb0/0xfd0 [ 880.034702] ? selinux_socket_sendmsg+0x1d8/0x260 [ 880.039544] ? selinux_socket_getpeername+0x260/0x260 [ 880.044740] ? tls_sw_push_pending_record+0x30/0x30 [ 880.049759] ? __fget+0x225/0x360 [ 880.053215] inet_sendmsg+0x11a/0x4e0 [ 880.057015] ? security_socket_sendmsg+0x83/0xb0 [ 880.061767] ? inet_recvmsg+0x4d0/0x4d0 [ 880.065738] sock_sendmsg+0xb5/0x100 [ 880.069449] SyS_sendto+0x1c7/0x2c0 [ 880.073074] ? SyS_getpeername+0x220/0x220 [ 880.077311] ? lock_downgrade+0x740/0x740 [ 880.081469] ? wait_for_completion_io+0x10/0x10 [ 880.086137] ? vfs_write+0x319/0x4d0 [ 880.089849] ? fput+0xb/0x140 [ 880.092957] ? SyS_write+0x14d/0x210 [ 880.096841] ? SyS_read+0x210/0x210 [ 880.100466] ? SyS_clock_settime+0x1a0/0x1a0 [ 880.104871] ? do_syscall_64+0x4c/0x640 [ 880.108843] ? SyS_getpeername+0x220/0x220 [ 880.113081] do_syscall_64+0x1d5/0x640 [ 880.116992] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 880.122181] RIP: 0033:0x45dd99 [ 880.125363] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 880.133069] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 880.140455] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 880.147721] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 880.154986] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000048 15:43:01 executing program 2: setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080)=0x108, 0x4) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 880.162284] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 880.184428] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$pptp(r3, &(0x7f0000000180)={0x18, 0x2, {0x2, @private=0xa010100}}, 0x1e) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r5, 0x40082102, &(0x7f00000001c0)) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "00000000001000", '\x00', "0870010c"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0xbdcc8000) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f00000000c0)=0x1, &(0x7f0000000140)=0x4) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) 15:43:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0xc80140, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r2, 0x80044d13, &(0x7f00000000c0)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x240380, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:01 executing program 3 (fault-call:7 fault-nth:73): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000740)=""/157) 15:43:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x0, 0x10, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x200000}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x200000d0}, 0x48000) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget(0x3, 0x1, 0x14) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000740)=""/151) [ 880.362544] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 880.392660] FAULT_INJECTION: forcing a failure. [ 880.392660] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 880.402783] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 880.404978] CPU: 0 PID: 3427 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 880.422923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 880.432282] Call Trace: [ 880.434910] dump_stack+0x1b2/0x283 [ 880.438539] should_fail.cold+0x10a/0x154 [ 880.442698] __alloc_pages_nodemask+0x22c/0x2720 [ 880.447482] ? kasan_slab_free+0xc3/0x1a0 [ 880.451630] ? tls_push_record+0xc3b/0x1270 [ 880.455949] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 880.460093] ? inet_sendmsg+0x11a/0x4e0 [ 880.464073] ? do_syscall_64+0x1d5/0x640 [ 880.468143] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 880.473511] ? tcp_tx_timestamp+0x17/0x250 [ 880.477747] ? debug_check_no_obj_freed+0x2c0/0x674 [ 880.482769] ? lock_acquire+0x170/0x3f0 [ 880.486745] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 880.491594] ? debug_check_no_obj_freed+0x2c0/0x674 [ 880.496618] alloc_pages_current+0x155/0x260 [ 880.501026] ? tls_push_record+0xc3b/0x1270 [ 880.505350] skb_page_frag_refill+0x1bf/0x490 [ 880.509932] sk_page_frag_refill+0x4a/0x1b0 [ 880.514254] alloc_sg+0x13e/0x730 [ 880.517711] tls_sw_sendmsg+0x49a/0xfd0 [ 880.521699] ? selinux_socket_sendmsg+0x1d8/0x260 [ 880.526573] ? selinux_socket_getpeername+0x260/0x260 [ 880.531767] ? tls_sw_push_pending_record+0x30/0x30 [ 880.536788] ? __fget+0x225/0x360 [ 880.540246] inet_sendmsg+0x11a/0x4e0 [ 880.544045] ? security_socket_sendmsg+0x83/0xb0 [ 880.548804] ? inet_recvmsg+0x4d0/0x4d0 [ 880.552791] sock_sendmsg+0xb5/0x100 [ 880.556530] SyS_sendto+0x1c7/0x2c0 [ 880.560162] ? SyS_getpeername+0x220/0x220 [ 880.564403] ? lock_downgrade+0x740/0x740 [ 880.568563] ? wait_for_completion_io+0x10/0x10 [ 880.573232] ? vfs_write+0x319/0x4d0 [ 880.576945] ? fput+0xb/0x140 [ 880.580046] ? SyS_write+0x14d/0x210 [ 880.583760] ? SyS_read+0x210/0x210 [ 880.587385] ? SyS_clock_settime+0x1a0/0x1a0 [ 880.591795] ? do_syscall_64+0x4c/0x640 [ 880.595777] ? SyS_getpeername+0x220/0x220 [ 880.600008] do_syscall_64+0x1d5/0x640 [ 880.603901] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 880.609086] RIP: 0033:0x45dd99 [ 880.612267] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 880.619971] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 880.627237] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 880.634505] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 880.641773] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000049 [ 880.649045] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:43:01 executing program 3 (fault-call:7 fault-nth:74): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 880.737727] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 880.756569] FAULT_INJECTION: forcing a failure. [ 880.756569] name failslab, interval 1, probability 0, space 0, times 0 [ 880.791620] CPU: 0 PID: 3446 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 880.799454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 880.808842] Call Trace: [ 880.811437] dump_stack+0x1b2/0x283 [ 880.815072] should_fail.cold+0x10a/0x154 [ 880.819229] should_failslab+0xd6/0x130 [ 880.823216] kmem_cache_alloc_node+0x263/0x410 [ 880.827804] __alloc_skb+0x5c/0x510 [ 880.831437] sk_stream_alloc_skb+0xb1/0x760 [ 880.835755] ? tcp_send_mss+0x9f/0x2e0 [ 880.839635] ? ipv6_frag_exit+0x40/0x40 [ 880.843607] do_tcp_sendpages+0x835/0x1750 [ 880.847850] ? sk_stream_alloc_skb+0x760/0x760 [ 880.852436] tls_push_sg+0x1ee/0x760 [ 880.856172] tls_push_record+0xa81/0x1270 [ 880.860327] tls_sw_sendmsg+0xbb0/0xfd0 [ 880.864311] ? selinux_socket_sendmsg+0x1d8/0x260 [ 880.869154] ? selinux_socket_getpeername+0x260/0x260 [ 880.874375] ? tls_sw_push_pending_record+0x30/0x30 [ 880.879392] ? __fget+0x225/0x360 [ 880.882867] inet_sendmsg+0x11a/0x4e0 [ 880.886664] ? security_socket_sendmsg+0x83/0xb0 [ 880.891416] ? inet_recvmsg+0x4d0/0x4d0 [ 880.895390] sock_sendmsg+0xb5/0x100 [ 880.899110] SyS_sendto+0x1c7/0x2c0 [ 880.902735] ? SyS_getpeername+0x220/0x220 [ 880.906975] ? lock_downgrade+0x740/0x740 [ 880.911139] ? wait_for_completion_io+0x10/0x10 [ 880.915816] ? vfs_write+0x319/0x4d0 [ 880.919527] ? fput+0xb/0x140 [ 880.922628] ? SyS_write+0x14d/0x210 [ 880.926338] ? SyS_read+0x210/0x210 [ 880.929965] ? SyS_clock_settime+0x1a0/0x1a0 [ 880.934370] ? do_syscall_64+0x4c/0x640 [ 880.938339] ? SyS_getpeername+0x220/0x220 [ 880.942576] do_syscall_64+0x1d5/0x640 [ 880.946467] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 880.951653] RIP: 0033:0x45dd99 [ 880.954837] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 880.962540] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 880.969808] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 880.977074] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 880.984342] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000004a [ 880.991611] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:43:02 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x4000, 0x0) 15:43:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'gretap0\x00', &(0x7f00000001c0)={'erspan0\x00', 0x0, 0x700, 0x700, 0xfffffff8, 0x5, {{0x7, 0x4, 0x2, 0x24, 0x1c, 0x64, 0x0, 0x3, 0x2f, 0x0, @loopback, @remote, {[@noop, @ra={0x94, 0x4}]}}}}}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={r1, 0x1, 0x6, @broadcast}, 0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fadvise64(r0, 0x3, 0x9, 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r4, &(0x7f0000000180)={r4, r4, 0x3f}) socketpair(0x23, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) r6 = socket$netlink(0x10, 0x3, 0x0) dup(r6) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0x401, 0x4, 0x4, 0x0, 0x0, [{{r4}, 0x2}, {{r5}, 0x1cc}, {{}, 0x2}, {{r6}, 0x80}]}) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x20000, 0x0) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) 15:43:02 executing program 3 (fault-call:7 fault-nth:75): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 881.188602] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 881.222044] FAULT_INJECTION: forcing a failure. [ 881.222044] name failslab, interval 1, probability 0, space 0, times 0 [ 881.244240] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 881.271913] CPU: 0 PID: 3457 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 881.279738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.289089] Call Trace: [ 881.291673] dump_stack+0x1b2/0x283 [ 881.295300] should_fail.cold+0x10a/0x154 [ 881.299453] should_failslab+0xd6/0x130 [ 881.303427] __kmalloc+0x6d/0x400 [ 881.306878] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 881.312074] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 881.317098] ? generic_gcmaes_encrypt+0xf4/0x130 [ 881.321858] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 881.326707] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 881.331722] ? __kmalloc+0x3a4/0x400 [ 881.335435] ? tls_push_record+0xfa/0x1270 [ 881.339696] ? cryptd_aead_child+0x9/0x40 [ 881.346622] ? tls_push_record+0x938/0x1270 [ 881.351003] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 881.355159] ? selinux_socket_sendmsg+0x1d8/0x260 [ 881.359996] ? selinux_socket_getpeername+0x260/0x260 [ 881.365191] ? tls_sw_push_pending_record+0x30/0x30 [ 881.370208] ? __fget+0x225/0x360 [ 881.373665] ? inet_sendmsg+0x11a/0x4e0 [ 881.377634] ? security_socket_sendmsg+0x83/0xb0 [ 881.382384] ? inet_recvmsg+0x4d0/0x4d0 [ 881.386358] ? sock_sendmsg+0xb5/0x100 [ 881.390243] ? SyS_sendto+0x1c7/0x2c0 15:43:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet6(0xa, 0x0, 0x7) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) syz_open_dev$ptys(0xc, 0x3, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000140)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, r2, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 881.394039] ? SyS_getpeername+0x220/0x220 [ 881.398273] ? lock_downgrade+0x740/0x740 [ 881.402422] ? wait_for_completion_io+0x10/0x10 [ 881.407084] ? vfs_write+0x319/0x4d0 [ 881.410793] ? fput+0xb/0x140 [ 881.413914] ? SyS_write+0x14d/0x210 [ 881.417636] ? SyS_read+0x210/0x210 [ 881.421274] ? SyS_clock_settime+0x1a0/0x1a0 [ 881.425675] ? do_syscall_64+0x4c/0x640 [ 881.429642] ? SyS_getpeername+0x220/0x220 [ 881.433877] ? do_syscall_64+0x1d5/0x640 [ 881.437948] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:43:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "6a5dd831008dab77", 'Ts\x00', "db55722f", "e89f97645dd10725"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) 15:43:02 executing program 3 (fault-call:7 fault-nth:76): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 881.509091] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 881.532922] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 881.569664] FAULT_INJECTION: forcing a failure. [ 881.569664] name failslab, interval 1, probability 0, space 0, times 0 [ 881.585435] CPU: 0 PID: 3475 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 881.593233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.602579] Call Trace: [ 881.605166] dump_stack+0x1b2/0x283 [ 881.608794] should_fail.cold+0x10a/0x154 [ 881.612943] should_failslab+0xd6/0x130 [ 881.616931] __kmalloc+0x6d/0x400 [ 881.620381] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 881.625567] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 881.630586] ? generic_gcmaes_encrypt+0xf4/0x130 [ 881.635336] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 881.640179] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 881.645191] ? __kmalloc+0x3a4/0x400 [ 881.648901] ? tls_push_record+0xfa/0x1270 [ 881.653128] ? cryptd_aead_child+0x9/0x40 [ 881.657275] ? tls_push_record+0x938/0x1270 [ 881.661602] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 881.665754] ? selinux_socket_sendmsg+0x1d8/0x260 [ 881.670588] ? selinux_socket_getpeername+0x260/0x260 [ 881.675778] ? tls_sw_push_pending_record+0x30/0x30 [ 881.680791] ? __fget+0x225/0x360 [ 881.684243] ? inet_sendmsg+0x11a/0x4e0 [ 881.688209] ? security_socket_sendmsg+0x83/0xb0 [ 881.692959] ? inet_recvmsg+0x4d0/0x4d0 [ 881.696929] ? sock_sendmsg+0xb5/0x100 [ 881.700814] ? SyS_sendto+0x1c7/0x2c0 [ 881.704610] ? SyS_getpeername+0x220/0x220 [ 881.708844] ? lock_downgrade+0x740/0x740 [ 881.713009] ? wait_for_completion_io+0x10/0x10 [ 881.717683] ? vfs_write+0x319/0x4d0 [ 881.721394] ? fput+0xb/0x140 [ 881.724496] ? SyS_write+0x14d/0x210 [ 881.728208] ? SyS_read+0x210/0x210 [ 881.731880] ? SyS_clock_settime+0x1a0/0x1a0 [ 881.736287] ? do_syscall_64+0x4c/0x640 [ 881.740255] ? SyS_getpeername+0x220/0x220 [ 881.744484] ? do_syscall_64+0x1d5/0x640 [ 881.748543] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:43:02 executing program 3 (fault-call:7 fault-nth:77): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, r2, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8d49}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0x44, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000001) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x148, r2, 0x300, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x120, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffff8e1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3df}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f0400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x10}, 0x4008980) [ 881.852861] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 881.874590] FAULT_INJECTION: forcing a failure. [ 881.874590] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 881.886409] CPU: 0 PID: 3480 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 881.894202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.903549] Call Trace: [ 881.906138] dump_stack+0x1b2/0x283 [ 881.909765] should_fail.cold+0x10a/0x154 [ 881.913910] __alloc_pages_nodemask+0x22c/0x2720 [ 881.918670] ? is_bpf_text_address+0xb8/0x150 [ 881.923168] ? kernel_text_address+0xbd/0xf0 [ 881.927575] ? __kernel_text_address+0x9/0x30 [ 881.932066] ? unwind_get_return_address+0x51/0x90 [ 881.937000] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 881.942368] ? __save_stack_trace+0xa0/0x160 [ 881.946800] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 881.951643] ? depot_save_stack+0x10d/0x3e3 [ 881.955970] ? kasan_kmalloc+0x139/0x160 [ 881.960059] ? kasan_kmalloc+0xeb/0x160 [ 881.964029] ? __kmalloc+0x15a/0x400 [ 881.967740] ? tls_push_record+0xfa/0x1270 [ 881.971971] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 881.976121] ? inet_sendmsg+0x11a/0x4e0 [ 881.980109] ? sock_sendmsg+0xb5/0x100 [ 881.983996] ? SyS_sendto+0x1c7/0x2c0 [ 881.987792] ? do_syscall_64+0x1d5/0x640 [ 881.991852] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 881.997215] cache_grow_begin+0x8f/0x420 15:43:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f00000001c0)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000200)=0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/adsp1\x00', 0x4c1a41, 0x0) r8 = dup(r7) ioctl$EVIOCSABS0(r8, 0x401845c0, &(0x7f0000000280)={0x6, 0x3381, 0x7, 0x80000001, 0xff, 0x9}) sendmsg$NL80211_CMD_NEW_MPATH(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x44101908}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100026bd7000fedbdf251700000008000300", @ANYRES32=0x0, @ANYBLOB="0a00060008021100000000000a001a0008021100000000000a00060008021100000100000a001a00ffffffffffff0000"], 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x24081) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x8, 0x7}, &(0x7f0000000040)=0xc) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 882.001303] cache_alloc_refill+0x273/0x350 [ 882.005628] __kmalloc+0x378/0x400 [ 882.009167] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 882.014356] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 882.019379] ? generic_gcmaes_encrypt+0xf4/0x130 [ 882.024130] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 882.028969] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 882.033983] ? __kmalloc+0x3a4/0x400 [ 882.037698] ? tls_push_record+0xfa/0x1270 [ 882.041927] ? cryptd_aead_child+0x9/0x40 [ 882.046077] ? tls_push_record+0x938/0x1270 [ 882.050406] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 882.054558] ? selinux_socket_sendmsg+0x1d8/0x260 [ 882.059398] ? selinux_socket_getpeername+0x260/0x260 [ 882.064591] ? tls_sw_push_pending_record+0x30/0x30 [ 882.069609] ? __fget+0x225/0x360 [ 882.073107] ? inet_sendmsg+0x11a/0x4e0 [ 882.077095] ? security_socket_sendmsg+0x83/0xb0 [ 882.081852] ? inet_recvmsg+0x4d0/0x4d0 [ 882.085824] ? sock_sendmsg+0xb5/0x100 [ 882.089709] ? SyS_sendto+0x1c7/0x2c0 [ 882.093530] ? SyS_getpeername+0x220/0x220 [ 882.097762] ? lock_downgrade+0x740/0x740 [ 882.101915] ? wait_for_completion_io+0x10/0x10 [ 882.106583] ? vfs_write+0x319/0x4d0 [ 882.110292] ? fput+0xb/0x140 [ 882.113392] ? SyS_write+0x14d/0x210 [ 882.117105] ? SyS_read+0x210/0x210 [ 882.120729] ? SyS_clock_settime+0x1a0/0x1a0 [ 882.125137] ? do_syscall_64+0x4c/0x640 [ 882.129106] ? SyS_getpeername+0x220/0x220 [ 882.133335] ? do_syscall_64+0x1d5/0x640 [ 882.137398] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:43:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x80, 0x0, 0x120, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:ldconfig_cache_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x80}, 0x1, 0x0, 0x0, 0x8}, 0x50000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:43:03 executing program 3 (fault-call:7 fault-nth:78): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:03 executing program 2: setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2meta(&(0x7f00000000c0)='gfs2meta\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x5, &(0x7f0000000380)=[{&(0x7f0000000140)="be5ea6528c5319b5375ec2370ff4e3004da674a3b7a1fb2d5a9f6a436b8569cca9ad2852664ff185b6963a541a62c300a1ecb10cb9c771d33e2eb618900ca5adb3699ea8104330ae30fe4b7d97bb8224f923c76434cc0537f6275c56b9676bf1495c1b967831cb15189ed492ff36798968a93d820c92f9c6a9cc467755a7ce39a31ac3cf517961955f0c939aea450997dea861faebe4eb542b0027d4d383170dd66f86d6db8046904d0bd856ba2d847d7d3fe4e7dd0cbf0a6c39d7d4f8bf5e029c77ec5eff1ad40c49624f11b9de4e16d51ff333b1ff8f182e57cfbf9d6a8dab62febb269a48a232be20b246afb5fb", 0xef, 0x1}, {&(0x7f0000000240)="6b24677fbd44", 0x6, 0x3f}, {&(0x7f0000000280)="7ddc6bbe1e8f8fc51766af1ed02b96836da28b529a3e92d53639622ea8088267a44971d38c858b4a1ed01966eed7a9df170e3d0e11c9638da21b81779def65156c1cf7c7a7f203bd87d04a709bdcfbab7830f1454c1a6f4a1c135116f3cb6b042298513185e12451ef638a0aa5026630e6c44b4e014d1215619162a128dfc9ebf9c3aa6d", 0x84}, {&(0x7f0000000800)="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", 0x1000, 0x10000}, {&(0x7f0000000340)="690f", 0x2, 0x7}], 0x2000080, &(0x7f0000000400)={[{'(#}\\@\\['}, {'#[/#)^_*'}, {}, {':,(.b#'}, {}, {',)'}, {'\x88\x00'}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute'}}]}) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x5) accept4$llc(r2, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000040)=0x10, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 882.262740] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 882.281682] FAULT_INJECTION: forcing a failure. [ 882.281682] name failslab, interval 1, probability 0, space 0, times 0 [ 882.306055] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 882.348922] gfs2: gfs2 mount does not exist [ 882.357170] CPU: 0 PID: 3499 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 882.364986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.374332] Call Trace: [ 882.376922] dump_stack+0x1b2/0x283 [ 882.380556] should_fail.cold+0x10a/0x154 [ 882.384706] should_failslab+0xd6/0x130 [ 882.388710] kmem_cache_alloc_node_trace+0x25a/0x400 [ 882.393838] __kmalloc_node_track_caller+0x38/0x70 [ 882.398802] __alloc_skb+0x96/0x510 [ 882.402441] sk_stream_alloc_skb+0xb1/0x760 [ 882.406776] ? __sk_mem_schedule+0x99/0xd0 [ 882.411017] ? ipv6_frag_exit+0x40/0x40 [ 882.415025] do_tcp_sendpages+0x835/0x1750 [ 882.419273] ? sk_stream_alloc_skb+0x760/0x760 [ 882.423866] tls_push_sg+0x1ee/0x760 [ 882.427589] tls_push_record+0xa81/0x1270 [ 882.431746] tls_sw_sendmsg+0xbb0/0xfd0 [ 882.435755] ? selinux_socket_sendmsg+0x1d8/0x260 [ 882.440600] ? selinux_socket_getpeername+0x260/0x260 [ 882.445901] ? tls_sw_push_pending_record+0x30/0x30 [ 882.450916] ? __fget+0x225/0x360 [ 882.454370] inet_sendmsg+0x11a/0x4e0 [ 882.458165] ? security_socket_sendmsg+0x83/0xb0 [ 882.462917] ? inet_recvmsg+0x4d0/0x4d0 [ 882.466893] sock_sendmsg+0xb5/0x100 [ 882.470604] SyS_sendto+0x1c7/0x2c0 [ 882.474230] ? SyS_getpeername+0x220/0x220 [ 882.478466] ? lock_downgrade+0x740/0x740 [ 882.482620] ? wait_for_completion_io+0x10/0x10 [ 882.487287] ? vfs_write+0x319/0x4d0 [ 882.491023] ? fput+0xb/0x140 [ 882.494254] ? SyS_write+0x14d/0x210 [ 882.497969] ? SyS_read+0x210/0x210 [ 882.501591] ? SyS_clock_settime+0x1a0/0x1a0 [ 882.505996] ? do_syscall_64+0x4c/0x640 [ 882.509964] ? SyS_getpeername+0x220/0x220 [ 882.514200] do_syscall_64+0x1d5/0x640 [ 882.518087] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 882.523270] RIP: 0033:0x45dd99 [ 882.526457] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 882.534168] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 882.541441] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 882.548705] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 882.555970] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000004e [ 882.563236] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:43:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000040)) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80f81, 0x0) 15:43:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x4044810, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:03 executing program 3 (fault-call:7 fault-nth:79): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000000)={0xf7}, 0x1) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:43:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x5, @mcast1}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000000), &(0x7f00000000c0)=0x10) [ 882.749718] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 882.791929] FAULT_INJECTION: forcing a failure. [ 882.791929] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 882.803788] CPU: 0 PID: 3529 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 882.811581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.820934] Call Trace: [ 882.823528] dump_stack+0x1b2/0x283 [ 882.827181] should_fail.cold+0x10a/0x154 [ 882.831331] __alloc_pages_nodemask+0x22c/0x2720 [ 882.836093] ? is_bpf_text_address+0xb8/0x150 [ 882.840593] ? kernel_text_address+0xbd/0xf0 [ 882.844994] ? __kernel_text_address+0x9/0x30 [ 882.849483] ? unwind_get_return_address+0x51/0x90 [ 882.854413] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 882.859772] ? __save_stack_trace+0xa0/0x160 [ 882.864178] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 882.869018] ? depot_save_stack+0x10d/0x3e3 [ 882.873354] ? kasan_kmalloc+0x139/0x160 [ 882.877414] ? kasan_kmalloc+0xeb/0x160 [ 882.881384] ? __kmalloc+0x15a/0x400 [ 882.885097] ? tls_push_record+0xfa/0x1270 15:43:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x143000, 0x0) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000000)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) r4 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000015c0)={&(0x7f0000001380)="a13f8a0a7a6df617d397c1ac3ecdde1527dca1c919", &(0x7f00000013c0)=""/217, &(0x7f00000014c0)="6aaf6d60a63fdd0119ed24e0c12d80406ea78b32a1a786dcab1bff308580b9eaf6d0b6f839fff2e450ec4dc84e233c383c6b2ce9", &(0x7f0000001500)="8321ff8072c7651d0e0c2e0f93bcd3dd719a739f02d86870e43357cdcb60f41ae9e9302e775eab804dcb6e137410ea29ad3c4edbe6fbffa729aa0b0149fb506a13ee37748c30144e54c1a0c2f281f516bbc2c268ba7d8b1ecb87d0e48b461bbc1454f4e4f6298a5d7c784e0ed56b693abc2ef5b5d3f829b3e5b9906117c37845705e9bace1605b096f250327b02e8c736b57268c09429cc4fbf3ddbc82e395c224a01376a99b4cd149f6b002e2", 0xaa1a, 0x1}, 0x38) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000240)) r5 = socket$kcm(0x29, 0x1, 0x0) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x3, 0x3, 0x4, 0x2, {0xa, 0x4e20, 0x8000, @ipv4={[], [], @multicast2}, 0xffffffc0}}}, 0x80, 0xfffffffffffffffe, 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], 0x1088}, 0x20008004) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x541c, &(0x7f0000000140)) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 882.889337] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 882.893480] ? inet_sendmsg+0x11a/0x4e0 [ 882.897457] ? sock_sendmsg+0xb5/0x100 [ 882.901338] ? SyS_sendto+0x1c7/0x2c0 [ 882.905137] ? do_syscall_64+0x1d5/0x640 [ 882.909194] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 882.914561] cache_grow_begin+0x8f/0x420 [ 882.918625] cache_alloc_refill+0x273/0x350 [ 882.922950] __kmalloc+0x378/0x400 [ 882.926489] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 882.931685] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 882.936707] ? generic_gcmaes_encrypt+0xf4/0x130 [ 882.941460] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 882.946301] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 882.951314] ? __kmalloc+0x3a4/0x400 [ 882.955026] ? tls_push_record+0xfa/0x1270 [ 882.959255] ? cryptd_aead_child+0x9/0x40 [ 882.963399] ? tls_push_record+0x938/0x1270 [ 882.967729] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 882.971884] ? selinux_socket_sendmsg+0x1d8/0x260 [ 882.976726] ? selinux_socket_getpeername+0x260/0x260 [ 882.981946] ? tls_sw_push_pending_record+0x30/0x30 [ 882.986962] ? __fget+0x225/0x360 [ 882.990416] ? inet_sendmsg+0x11a/0x4e0 [ 882.994385] ? security_socket_sendmsg+0x83/0xb0 [ 882.999138] ? inet_recvmsg+0x4d0/0x4d0 [ 883.003112] ? sock_sendmsg+0xb5/0x100 [ 883.006999] ? SyS_sendto+0x1c7/0x2c0 [ 883.010800] ? SyS_getpeername+0x220/0x220 [ 883.015062] ? lock_downgrade+0x740/0x740 [ 883.019220] ? wait_for_completion_io+0x10/0x10 [ 883.023882] ? vfs_write+0x319/0x4d0 [ 883.027585] ? fput+0xb/0x140 [ 883.030674] ? SyS_write+0x14d/0x210 [ 883.034377] ? SyS_read+0x210/0x210 [ 883.038008] ? SyS_clock_settime+0x1a0/0x1a0 15:43:04 executing program 2: socket$netlink(0x10, 0x3, 0x6) r0 = syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x1, 0x200) semctl$SEM_STAT(r2, 0x1, 0x12, &(0x7f0000000740)=""/153) 15:43:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) readahead(r3, 0x9, 0x2) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 883.042406] ? do_syscall_64+0x4c/0x640 [ 883.046378] ? SyS_getpeername+0x220/0x220 [ 883.050599] ? do_syscall_64+0x1d5/0x640 [ 883.054652] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:43:04 executing program 3 (fault-call:7 fault-nth:80): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x840}, 0xc0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000240)={0x0, 0x7f, &(0x7f00000001c0)="4f465d7c6b6fca0f0f9ca7e90006b83b53ec7dba2050ae73955877c081f3645712f3a4ae9f4a9e75c0d02d5aee7dc62512bd70defa3a2bb3f9114730113e17b503288fc850de583497d52c68da66f0021772679add83370bb54c004dd29fce53051dcd2e34e312680ad152d3384998bdd2ff1a0c8b2394ca07049b508331e4"}) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r3, 0x641f) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f0000000000)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000040)=0x2c) 15:43:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40426c08}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x58, 0x0, 0x2, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7, 0x54}}}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}, @NL80211_ATTR_PS_STATE={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000055}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0xa0) getsockopt$inet_dccp_buf(r3, 0x21, 0xe, &(0x7f0000000140)=""/179, &(0x7f0000000200)=0xb3) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f00000003c0), &(0x7f0000000400)=0xe) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 883.180939] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 883.197254] FAULT_INJECTION: forcing a failure. [ 883.197254] name failslab, interval 1, probability 0, space 0, times 0 [ 883.219140] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 883.235752] CPU: 0 PID: 3559 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 883.239811] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3566 comm=syz-executor.2 [ 883.243560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.243565] Call Trace: [ 883.243586] dump_stack+0x1b2/0x283 [ 883.243605] should_fail.cold+0x10a/0x154 [ 883.243623] should_failslab+0xd6/0x130 [ 883.279193] __kmalloc+0x6d/0x400 [ 883.282662] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 883.287869] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 883.292883] ? generic_gcmaes_encrypt+0xf4/0x130 [ 883.297640] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 883.302477] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 883.307577] ? __kmalloc+0x3a4/0x400 [ 883.311280] ? tls_push_record+0xfa/0x1270 [ 883.315504] ? cryptd_aead_child+0x9/0x40 [ 883.319667] ? tls_push_record+0x938/0x1270 [ 883.324001] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 883.328148] ? selinux_socket_sendmsg+0x1d8/0x260 [ 883.332979] ? selinux_socket_getpeername+0x260/0x260 [ 883.338167] ? tls_sw_push_pending_record+0x30/0x30 [ 883.343179] ? __fget+0x225/0x360 [ 883.346624] ? inet_sendmsg+0x11a/0x4e0 [ 883.350582] ? security_socket_sendmsg+0x83/0xb0 [ 883.355327] ? inet_recvmsg+0x4d0/0x4d0 [ 883.359290] ? sock_sendmsg+0xb5/0x100 [ 883.363166] ? SyS_sendto+0x1c7/0x2c0 [ 883.367045] ? SyS_getpeername+0x220/0x220 [ 883.371273] ? lock_downgrade+0x740/0x740 [ 883.375417] ? wait_for_completion_io+0x10/0x10 [ 883.380076] ? vfs_write+0x319/0x4d0 [ 883.383780] ? fput+0xb/0x140 [ 883.386870] ? SyS_write+0x14d/0x210 [ 883.390569] ? SyS_read+0x210/0x210 [ 883.394200] ? SyS_clock_settime+0x1a0/0x1a0 [ 883.398605] ? do_syscall_64+0x4c/0x640 [ 883.402562] ? SyS_getpeername+0x220/0x220 [ 883.406798] ? do_syscall_64+0x1d5/0x640 [ 883.410869] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:43:04 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000000)=""/118) 15:43:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000001) r4 = semget$private(0x0, 0x2, 0x102) semctl$SEM_STAT(r4, 0x3, 0x12, &(0x7f0000000740)=""/157) 15:43:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c) listen(r1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x1, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:04 executing program 3 (fault-call:7 fault-nth:81): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x4, 0x0, 0x1, 0x21, @private1={0xfc, 0x1, [], 0x1}, @ipv4={[], [], @broadcast}, 0x8, 0x10, 0x9b, 0x3}}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$netlink(r5, 0x10e, 0x9, &(0x7f0000000200)=""/93, &(0x7f0000000280)=0x5d) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={r3, @empty, @broadcast}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r0}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x68, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x28ef}, @in6={0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xfff}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e23, 0x3, @local, 0x200}, @in6={0xa, 0x4e24, 0x3, @loopback, 0x8}, @in={0x2, 0x4e23, @multicast2}], 0x90) 15:43:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0xa) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_MIDI_INFO(r3, 0xc074510c, &(0x7f0000000140)={"51ababcdb36b9624b046dc354c095a8ab6d80e1e56a51753dbe59520eaff", 0x5, 0x9de, 0x8000, [0x5, 0x2, 0x8, 0x7ce, 0x6, 0x5fa9, 0xff, 0x8, 0x0, 0x7, 0x4, 0x2, 0x9, 0xffffc000, 0x0, 0x1ff, 0x9]}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/147) [ 883.728769] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 883.752310] FAULT_INJECTION: forcing a failure. [ 883.752310] name failslab, interval 1, probability 0, space 0, times 0 [ 883.792684] CPU: 1 PID: 3595 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 883.800536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.809886] Call Trace: [ 883.812475] dump_stack+0x1b2/0x283 [ 883.816106] should_fail.cold+0x10a/0x154 [ 883.820254] should_failslab+0xd6/0x130 [ 883.824227] kmem_cache_alloc_node_trace+0x25a/0x400 [ 883.829335] __kmalloc_node_track_caller+0x38/0x70 [ 883.834267] __alloc_skb+0x96/0x510 [ 883.838025] sk_stream_alloc_skb+0xb1/0x760 [ 883.842343] ? tcp_send_mss+0x9f/0x2e0 [ 883.846230] ? ipv6_frag_exit+0x40/0x40 [ 883.850206] do_tcp_sendpages+0x835/0x1750 [ 883.854451] ? sk_stream_alloc_skb+0x760/0x760 [ 883.859040] tls_push_sg+0x1ee/0x760 [ 883.862763] tls_push_record+0xa81/0x1270 [ 883.866924] tls_sw_sendmsg+0xbb0/0xfd0 [ 883.870906] ? selinux_socket_sendmsg+0x1d8/0x260 [ 883.875749] ? selinux_socket_getpeername+0x260/0x260 [ 883.880943] ? tls_sw_push_pending_record+0x30/0x30 [ 883.885959] ? __fget+0x225/0x360 [ 883.889424] inet_sendmsg+0x11a/0x4e0 [ 883.893225] ? security_socket_sendmsg+0x83/0xb0 [ 883.897985] ? inet_recvmsg+0x4d0/0x4d0 [ 883.901958] sock_sendmsg+0xb5/0x100 [ 883.905679] SyS_sendto+0x1c7/0x2c0 [ 883.909307] ? SyS_getpeername+0x220/0x220 [ 883.913546] ? lock_downgrade+0x740/0x740 [ 883.917702] ? wait_for_completion_io+0x10/0x10 [ 883.922368] ? vfs_write+0x319/0x4d0 [ 883.926081] ? fput+0xb/0x140 [ 883.929188] ? SyS_write+0x14d/0x210 [ 883.932900] ? SyS_read+0x210/0x210 [ 883.936525] ? SyS_clock_settime+0x1a0/0x1a0 [ 883.940950] ? do_syscall_64+0x4c/0x640 [ 883.944923] ? SyS_getpeername+0x220/0x220 [ 883.949159] do_syscall_64+0x1d5/0x640 [ 883.953048] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 883.958232] RIP: 0033:0x45dd99 [ 883.961420] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 883.969123] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 883.976384] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 883.983648] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 15:43:05 executing program 3 (fault-call:7 fault-nth:82): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 883.990915] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000051 [ 883.998183] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 884.028702] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) signalfd(r2, &(0x7f0000000000)={[0x6]}, 0x8) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 884.074074] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 884.112154] FAULT_INJECTION: forcing a failure. [ 884.112154] name failslab, interval 1, probability 0, space 0, times 0 [ 884.164171] CPU: 1 PID: 3611 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 884.172114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 884.181471] Call Trace: [ 884.184156] dump_stack+0x1b2/0x283 [ 884.187812] should_fail.cold+0x10a/0x154 [ 884.191985] should_failslab+0xd6/0x130 [ 884.195967] kmem_cache_alloc_node_trace+0x25a/0x400 [ 884.201098] __kmalloc_node_track_caller+0x38/0x70 [ 884.206025] __alloc_skb+0x96/0x510 [ 884.209648] sk_stream_alloc_skb+0xb1/0x760 [ 884.213968] ? __sk_mem_schedule+0x99/0xd0 [ 884.218206] ? ipv6_frag_exit+0x40/0x40 [ 884.222181] do_tcp_sendpages+0x835/0x1750 [ 884.226428] ? sk_stream_alloc_skb+0x760/0x760 [ 884.231023] tls_push_sg+0x1ee/0x760 [ 884.234751] tls_push_record+0xa81/0x1270 [ 884.239002] tls_sw_sendmsg+0xbb0/0xfd0 [ 884.242990] ? selinux_socket_sendmsg+0x1d8/0x260 [ 884.247832] ? selinux_socket_getpeername+0x260/0x260 [ 884.253027] ? tls_sw_push_pending_record+0x30/0x30 [ 884.258048] ? __fget+0x225/0x360 [ 884.261502] inet_sendmsg+0x11a/0x4e0 [ 884.265300] ? security_socket_sendmsg+0x83/0xb0 [ 884.270085] ? inet_recvmsg+0x4d0/0x4d0 [ 884.274058] sock_sendmsg+0xb5/0x100 [ 884.277767] SyS_sendto+0x1c7/0x2c0 [ 884.281386] ? SyS_getpeername+0x220/0x220 [ 884.285655] ? lock_downgrade+0x740/0x740 [ 884.289813] ? wait_for_completion_io+0x10/0x10 [ 884.294481] ? vfs_write+0x319/0x4d0 [ 884.298193] ? fput+0xb/0x140 [ 884.301294] ? SyS_write+0x14d/0x210 [ 884.305010] ? SyS_read+0x210/0x210 [ 884.308638] ? SyS_clock_settime+0x1a0/0x1a0 [ 884.313046] ? do_syscall_64+0x4c/0x640 [ 884.317036] ? SyS_getpeername+0x220/0x220 [ 884.321269] do_syscall_64+0x1d5/0x640 [ 884.325157] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 884.330337] RIP: 0033:0x45dd99 [ 884.333514] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 884.341238] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 884.348502] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 884.355764] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 15:43:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r3, 0x8e469cb65debc3a1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, r3, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x101}, @BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x100}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x48040}, 0x8004001) sendto$inet6(r0, 0x0, 0x0, 0x20000084, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @mcast1, 0xffffffff}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x73, 0x1, {{0x8, 0x2, 0x3}, 0x2d10}}, 0x18) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f00000002c0)={0x26e, 0x0, 0x0, 0x0, 0x3, 0x200, 0x80}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f00000000c0)={'TPROXY\x00'}, &(0x7f0000000240)=0x1e) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 884.358777] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 884.363033] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000052 [ 884.363039] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:43:05 executing program 3 (fault-call:7 fault-nth:83): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 884.733873] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 884.768521] FAULT_INJECTION: forcing a failure. [ 884.768521] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 884.793435] CPU: 1 PID: 3634 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 884.801271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 884.810628] Call Trace: [ 884.813225] dump_stack+0x1b2/0x283 [ 884.816856] should_fail.cold+0x10a/0x154 [ 884.821010] __alloc_pages_nodemask+0x22c/0x2720 [ 884.825799] ? kasan_slab_free+0xc3/0x1a0 [ 884.829949] ? tls_push_record+0xc3b/0x1270 [ 884.834270] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 884.838418] ? inet_sendmsg+0x11a/0x4e0 [ 884.842406] ? do_syscall_64+0x1d5/0x640 [ 884.846471] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 884.851835] ? tcp_tx_timestamp+0x17/0x250 [ 884.856070] ? debug_check_no_obj_freed+0x2c0/0x674 [ 884.861089] ? lock_acquire+0x170/0x3f0 [ 884.865063] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 884.869911] ? debug_check_no_obj_freed+0x2c0/0x674 [ 884.874944] alloc_pages_current+0x155/0x260 [ 884.879351] ? tls_push_record+0xc3b/0x1270 [ 884.883674] skb_page_frag_refill+0x1bf/0x490 [ 884.888175] sk_page_frag_refill+0x4a/0x1b0 [ 884.892498] alloc_sg+0x13e/0x730 [ 884.895951] tls_sw_sendmsg+0x49a/0xfd0 [ 884.899926] ? selinux_socket_sendmsg+0x1d8/0x260 [ 884.904763] ? selinux_socket_getpeername+0x260/0x260 [ 884.909954] ? tls_sw_push_pending_record+0x30/0x30 [ 884.914967] ? __fget+0x225/0x360 [ 884.918423] inet_sendmsg+0x11a/0x4e0 [ 884.922224] ? security_socket_sendmsg+0x83/0xb0 [ 884.926992] ? inet_recvmsg+0x4d0/0x4d0 [ 884.930993] sock_sendmsg+0xb5/0x100 [ 884.934720] SyS_sendto+0x1c7/0x2c0 [ 884.938361] ? SyS_getpeername+0x220/0x220 [ 884.942590] ? lock_downgrade+0x740/0x740 [ 884.946740] ? wait_for_completion_io+0x10/0x10 [ 884.951402] ? vfs_write+0x319/0x4d0 [ 884.955128] ? fput+0xb/0x140 [ 884.958228] ? SyS_write+0x14d/0x210 [ 884.961940] ? SyS_read+0x210/0x210 [ 884.965560] ? SyS_clock_settime+0x1a0/0x1a0 [ 884.969965] ? do_syscall_64+0x4c/0x640 [ 884.973937] ? SyS_getpeername+0x220/0x220 [ 884.978167] do_syscall_64+0x1d5/0x640 [ 884.982055] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 884.987238] RIP: 0033:0x45dd99 [ 884.990419] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 884.998126] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 885.005387] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 885.012649] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 885.019913] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000053 [ 885.027180] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 885.157428] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:06 executing program 0: sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x89, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x41) 15:43:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) syz_init_net_socket$rose(0xb, 0x5, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:06 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180)='ethtool\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000010c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001100)={{{@in6=@private2, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000001200)=0xe8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x14, &(0x7f0000000240)={@local, 0x0}, &(0x7f00000002c0)=0x14) socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000013c0)={&(0x7f00000005c0)={0xd0, r0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xd0}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x6}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x7f}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x3}, @ETHTOOL_A_LINKINFO_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="240000003d58451ded0a214b0a9ee6ac7562ac97173f1c", @ANYRES16=r0, @ANYBLOB="000428bd7000fddbdf251000000008000900c1ffffff0800090094ee0000"], 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r0, 0x8, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20040040}, 0x2400c0c0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:43:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2008}, 0xc, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="fc000000878cba4b78e4245090e4bcb9274eae84fd76bc9a9bfe5aa6198424c144b35be034248caf413c1022d2fd55b9ca95c9339a49ee71ea731fc96944a6c0ad264aa72ed0b02a7daacb4b95d89369d2e8fef675ae773a18c00d01114559cd73d1cc0fc5598855d4cbe5ee56c769f577ee713f2b0457dc4f590c75c0dc1ded475e4182c54443a320839c68b12b88127ee71815b7bb1a47f429", @ANYRES16=r2, @ANYBLOB="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"], 0xfc}, 0x1, 0x0, 0x0, 0x8000}, 0x1) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "83ac516eae1ed5be", "92f0c07d351f5be60e8b6f26264016c6", "3ff6af35", "6f977a551c8f3311"}, 0x28) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ocfs2_control\x00', 0x80200, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) ioctl$BTRFS_IOC_SPACE_INFO(r3, 0xc0109414, &(0x7f0000000700)={0x62f, 0x4, [[], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], []]}) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:06 executing program 3 (fault-call:7 fault-nth:84): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 885.387466] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 885.398396] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 885.407099] FAULT_INJECTION: forcing a failure. [ 885.407099] name failslab, interval 1, probability 0, space 0, times 0 [ 885.407112] CPU: 1 PID: 3644 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 885.407119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 885.407123] Call Trace: [ 885.407139] dump_stack+0x1b2/0x283 [ 885.407157] should_fail.cold+0x10a/0x154 [ 885.407173] should_failslab+0xd6/0x130 [ 885.407185] __kmalloc+0x6d/0x400 [ 885.407204] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 885.407220] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 885.407241] ? generic_gcmaes_encrypt+0xf4/0x130 [ 885.407253] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 885.407264] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 885.407272] ? __kmalloc+0x3a4/0x400 [ 885.407285] ? tls_push_record+0xfa/0x1270 15:43:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x800, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000000) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000080)) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x10001) 15:43:06 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000000)) [ 885.407297] ? cryptd_aead_child+0x9/0x40 [ 885.407315] ? tls_push_record+0x938/0x1270 [ 885.459247] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 885.463548] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 885.463568] ? selinux_socket_sendmsg+0x1d8/0x260 [ 885.463578] ? selinux_socket_getpeername+0x260/0x260 [ 885.463592] ? tls_sw_push_pending_record+0x30/0x30 [ 885.500983] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3659 comm=syz-executor.2 15:43:06 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x509fc0, 0x0) [ 885.506044] ? __fget+0x225/0x360 [ 885.506059] ? inet_sendmsg+0x11a/0x4e0 [ 885.506068] ? security_socket_sendmsg+0x83/0xb0 [ 885.506076] ? inet_recvmsg+0x4d0/0x4d0 [ 885.506091] ? sock_sendmsg+0xb5/0x100 [ 885.557230] ? SyS_sendto+0x1c7/0x2c0 [ 885.561048] ? SyS_getpeername+0x220/0x220 [ 885.565284] ? lock_downgrade+0x740/0x740 [ 885.569444] ? wait_for_completion_io+0x10/0x10 [ 885.574113] ? vfs_write+0x319/0x4d0 15:43:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xf) prctl$PR_CAPBSET_DROP(0x18, 0xad43) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000000)=0x1, 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept$alg(r3, 0x0, 0x0) ioctl$USBDEVFS_GET_SPEED(r3, 0x551f) [ 885.574672] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3659 comm=syz-executor.2 [ 885.577821] ? fput+0xb/0x140 [ 885.577831] ? SyS_write+0x14d/0x210 [ 885.577841] ? SyS_read+0x210/0x210 [ 885.577852] ? SyS_clock_settime+0x1a0/0x1a0 [ 885.577866] ? do_syscall_64+0x4c/0x640 [ 885.608562] ? SyS_getpeername+0x220/0x220 [ 885.612803] ? do_syscall_64+0x1d5/0x640 [ 885.616867] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:43:06 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000040)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) r3 = perf_event_open$cgroup(&(0x7f0000000100)={0x4, 0x70, 0x1, 0xfb, 0x2, 0x40, 0x0, 0x81, 0x90500, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x2001, 0x200, 0xffffff81, 0x3, 0x200, 0xffff}, 0xffffffffffffffff, 0x4, r2, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:43:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000740)=""/157) 15:43:06 executing program 3 (fault-call:7 fault-nth:85): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 885.835408] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 885.873809] FAULT_INJECTION: forcing a failure. [ 885.873809] name failslab, interval 1, probability 0, space 0, times 0 [ 885.900696] CPU: 1 PID: 3686 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 885.908525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 885.917879] Call Trace: [ 885.920473] dump_stack+0x1b2/0x283 [ 885.924110] should_fail.cold+0x10a/0x154 [ 885.928295] should_failslab+0xd6/0x130 [ 885.932268] kmem_cache_alloc_node_trace+0x25a/0x400 [ 885.937372] __kmalloc_node_track_caller+0x38/0x70 [ 885.942304] __alloc_skb+0x96/0x510 [ 885.945933] sk_stream_alloc_skb+0xb1/0x760 [ 885.950253] ? tcp_send_mss+0x9f/0x2e0 [ 885.954135] ? ipv6_frag_exit+0x40/0x40 [ 885.958109] do_tcp_sendpages+0x835/0x1750 [ 885.962354] ? sk_stream_alloc_skb+0x760/0x760 [ 885.966948] tls_push_sg+0x1ee/0x760 [ 885.970671] tls_push_record+0xa81/0x1270 [ 885.974826] tls_sw_sendmsg+0xbb0/0xfd0 [ 885.978813] ? selinux_socket_sendmsg+0x1d8/0x260 [ 885.983654] ? selinux_socket_getpeername+0x260/0x260 [ 885.988849] ? tls_sw_push_pending_record+0x30/0x30 [ 885.993866] ? __fget+0x225/0x360 [ 885.997324] inet_sendmsg+0x11a/0x4e0 [ 886.001123] ? security_socket_sendmsg+0x83/0xb0 [ 886.005873] ? inet_recvmsg+0x4d0/0x4d0 [ 886.009848] sock_sendmsg+0xb5/0x100 [ 886.013563] SyS_sendto+0x1c7/0x2c0 [ 886.017187] ? SyS_getpeername+0x220/0x220 [ 886.021422] ? lock_downgrade+0x740/0x740 [ 886.025579] ? wait_for_completion_io+0x10/0x10 [ 886.030260] ? vfs_write+0x319/0x4d0 [ 886.033981] ? fput+0xb/0x140 [ 886.037089] ? SyS_write+0x14d/0x210 [ 886.040804] ? SyS_read+0x210/0x210 [ 886.044429] ? SyS_clock_settime+0x1a0/0x1a0 [ 886.048835] ? do_syscall_64+0x4c/0x640 [ 886.052805] ? SyS_getpeername+0x220/0x220 [ 886.057062] do_syscall_64+0x1d5/0x640 [ 886.060954] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 886.066139] RIP: 0033:0x45dd99 [ 886.069326] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 886.077029] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 886.084293] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 886.091559] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 15:43:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x2) r1 = dup(r0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x41, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000200)={0x4, 0x6, 0x6, 0x1, 0x6f, 0x6, &(0x7f0000000180)="5087d152832effa46277659945bd9f9daef5726c23f6d1f325428c92727f4c514160f9cdb7b0148a198954f0f6da02d9fa1741c9cfae131db21f592c0d5adea53f1bf0f38a5c2135c82d6320f5986f6630cf03013e9117d33c78b2d0dc470ed9c58247d2b30eef5e0659d6db74e600"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) dup3(r0, r2, 0x80000) r3 = syz_genetlink_get_family_id$smc(&(0x7f00000000c0)='SMC_PNETID\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_FLUSH(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r3, 0x1}, 0x14}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) dup(r5) sendmsg$SMC_PNETID_GET(r5, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r3, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x8050}, 0x200000c0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 886.098825] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000055 [ 886.106089] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:43:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$sock_void(r1, 0x1, 0x0, 0x0, 0x0) r2 = dup(r0) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000000)={0x2, 0x5, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:43:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) bind(r1, &(0x7f0000000040)=@rc={0x1f, @any, 0x40}, 0x80) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, &(0x7f0000000000)=0xa558) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}}) 15:43:07 executing program 3 (fault-call:7 fault-nth:86): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:07 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x401, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 886.495952] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 886.510934] FAULT_INJECTION: forcing a failure. [ 886.510934] name failslab, interval 1, probability 0, space 0, times 0 [ 886.535832] CPU: 1 PID: 3713 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 886.543636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.552985] Call Trace: [ 886.555577] dump_stack+0x1b2/0x283 [ 886.559210] should_fail.cold+0x10a/0x154 [ 886.563359] should_failslab+0xd6/0x130 [ 886.567330] kmem_cache_alloc_node_trace+0x25a/0x400 [ 886.572434] __kmalloc_node_track_caller+0x38/0x70 [ 886.577362] __alloc_skb+0x96/0x510 [ 886.580993] sk_stream_alloc_skb+0xb1/0x760 [ 886.585310] ? __sk_mem_schedule+0x99/0xd0 [ 886.589539] ? ipv6_frag_exit+0x40/0x40 [ 886.593508] do_tcp_sendpages+0x835/0x1750 [ 886.597757] ? sk_stream_alloc_skb+0x760/0x760 [ 886.602347] tls_push_sg+0x1ee/0x760 [ 886.606069] tls_push_record+0xa81/0x1270 [ 886.610230] tls_sw_sendmsg+0xbb0/0xfd0 [ 886.614210] ? selinux_socket_sendmsg+0x1d8/0x260 [ 886.619052] ? selinux_socket_getpeername+0x260/0x260 [ 886.624247] ? tls_sw_push_pending_record+0x30/0x30 [ 886.629263] ? __fget+0x225/0x360 [ 886.632715] inet_sendmsg+0x11a/0x4e0 [ 886.636508] ? security_socket_sendmsg+0x83/0xb0 [ 886.641256] ? inet_recvmsg+0x4d0/0x4d0 [ 886.645231] sock_sendmsg+0xb5/0x100 [ 886.648956] SyS_sendto+0x1c7/0x2c0 [ 886.652578] ? SyS_getpeername+0x220/0x220 [ 886.656811] ? lock_downgrade+0x740/0x740 [ 886.660967] ? wait_for_completion_io+0x10/0x10 [ 886.665637] ? vfs_write+0x319/0x4d0 [ 886.669347] ? fput+0xb/0x140 [ 886.672450] ? SyS_write+0x14d/0x210 [ 886.676174] ? SyS_read+0x210/0x210 [ 886.679797] ? SyS_clock_settime+0x1a0/0x1a0 [ 886.684203] ? do_syscall_64+0x4c/0x640 [ 886.688174] ? SyS_getpeername+0x220/0x220 [ 886.692413] do_syscall_64+0x1d5/0x640 [ 886.696299] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 886.701478] RIP: 0033:0x45dd99 [ 886.704682] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 886.712473] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 886.719741] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 886.727030] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 886.734298] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000056 15:43:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SOUND_OLD_MIXER_INFO(r1, 0x80304d65, &(0x7f0000000000)) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 886.741590] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:43:07 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000000)) 15:43:08 executing program 3 (fault-call:7 fault-nth:87): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 886.967839] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 886.982350] FAULT_INJECTION: forcing a failure. [ 886.982350] name fail_page_alloc, interval 1, probability 0, space 0, times 0 15:43:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0xc0ce) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 887.024544] CPU: 1 PID: 3738 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 887.032383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.041763] Call Trace: [ 887.044358] dump_stack+0x1b2/0x283 [ 887.047986] should_fail.cold+0x10a/0x154 [ 887.052136] __alloc_pages_nodemask+0x22c/0x2720 [ 887.056891] ? kasan_slab_free+0xc3/0x1a0 [ 887.061037] ? tls_push_record+0xc3b/0x1270 [ 887.065356] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 887.069497] ? inet_sendmsg+0x11a/0x4e0 [ 887.073470] ? do_syscall_64+0x1d5/0x640 [ 887.077521] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 887.082884] ? tcp_tx_timestamp+0x17/0x250 [ 887.087113] ? debug_check_no_obj_freed+0x2c0/0x674 [ 887.092129] ? lock_acquire+0x170/0x3f0 [ 887.096107] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 887.100959] ? debug_check_no_obj_freed+0x2c0/0x674 [ 887.105986] alloc_pages_current+0x155/0x260 [ 887.110392] ? tls_push_record+0xc3b/0x1270 [ 887.114716] skb_page_frag_refill+0x1bf/0x490 [ 887.119207] sk_page_frag_refill+0x4a/0x1b0 [ 887.123529] alloc_sg+0x13e/0x730 [ 887.126994] tls_sw_sendmsg+0x49a/0xfd0 [ 887.130977] ? selinux_socket_sendmsg+0x1d8/0x260 [ 887.135819] ? selinux_socket_getpeername+0x260/0x260 [ 887.141010] ? tls_sw_push_pending_record+0x30/0x30 [ 887.146027] ? __fget+0x225/0x360 [ 887.149479] inet_sendmsg+0x11a/0x4e0 [ 887.153274] ? security_socket_sendmsg+0x83/0xb0 [ 887.158023] ? inet_recvmsg+0x4d0/0x4d0 [ 887.162082] sock_sendmsg+0xb5/0x100 [ 887.165789] SyS_sendto+0x1c7/0x2c0 [ 887.169407] ? SyS_getpeername+0x220/0x220 [ 887.173640] ? lock_downgrade+0x740/0x740 [ 887.177805] ? wait_for_completion_io+0x10/0x10 [ 887.182472] ? vfs_write+0x319/0x4d0 [ 887.186188] ? fput+0xb/0x140 [ 887.189288] ? SyS_write+0x14d/0x210 [ 887.193001] ? SyS_read+0x210/0x210 [ 887.196631] ? SyS_clock_settime+0x1a0/0x1a0 [ 887.201035] ? do_syscall_64+0x4c/0x640 [ 887.205004] ? SyS_getpeername+0x220/0x220 [ 887.209237] do_syscall_64+0x1d5/0x640 [ 887.213123] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 887.218303] RIP: 0033:0x45dd99 15:43:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xfffffffffffffff8, 0xfffffffffffffffe}) sendmsg$AUDIT_USER_AVC(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x100}}, 0x4040000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0xc400, 0x0) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000180)={0x1, 0x7f, 0x5, 0x1, 0xe, "f53a531051e4d434"}) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000300)={@null=' \x00', 0x4, 'wg1\x00'}) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 887.221483] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 887.229190] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 887.236456] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 887.243720] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 887.250984] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000057 [ 887.258251] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:43:08 executing program 0: ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) 15:43:08 executing program 3 (fault-call:7 fault-nth:88): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f0000000100)={0x2dc, 0x0, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x200}, {0x6, 0x16, 0x8001}, {0x5}, {0x6, 0x11, 0x7fff}, {0x8}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x7ff}, {0x6, 0x16, 0x80}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x8000}, {0x8, 0xb, 0x800}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x1}, {0x6, 0x16, 0xfff7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x1}, {0x8, 0xb, 0x7fffffff}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfffa}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x8}, {0x8, 0xb, 0x7fffffff}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x4}, {0x6, 0x16, 0x1}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x4}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0xffff}, {0x6, 0x16, 0x7}, {0x5}, {0x6, 0x11, 0x8000}, {0x8, 0xb, 0xc1f6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3ff}, {0x6, 0x16, 0x3}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0xfffa}, {0x8, 0xb, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8}, {0x6, 0x16, 0x2}, {0x5}, {0x6, 0x11, 0x63}, {0x8, 0xb, 0x7}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xbdf7}, {0x5}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0xfff}}]}, 0x2dc}, 0x1, 0x0, 0x0, 0x20048010}, 0x80401) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, &(0x7f0000000000)) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 887.407945] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 887.429229] FAULT_INJECTION: forcing a failure. [ 887.429229] name failslab, interval 1, probability 0, space 0, times 0 [ 887.463417] CPU: 0 PID: 3756 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 887.471254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.480617] Call Trace: [ 887.483215] dump_stack+0x1b2/0x283 [ 887.486853] should_fail.cold+0x10a/0x154 [ 887.491023] should_failslab+0xd6/0x130 [ 887.494999] __kmalloc+0x6d/0x400 [ 887.498453] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 887.503653] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 887.508687] ? generic_gcmaes_encrypt+0xf4/0x130 [ 887.513443] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 887.518286] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 887.523332] ? __kmalloc+0x3a4/0x400 [ 887.527066] ? tls_push_record+0xfa/0x1270 [ 887.531300] ? cryptd_aead_child+0x9/0x40 [ 887.535455] ? tls_push_record+0x938/0x1270 [ 887.539795] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 887.543952] ? selinux_socket_sendmsg+0x1d8/0x260 [ 887.548793] ? selinux_socket_getpeername+0x260/0x260 [ 887.553995] ? tls_sw_push_pending_record+0x30/0x30 [ 887.559013] ? __fget+0x225/0x360 [ 887.562470] ? inet_sendmsg+0x11a/0x4e0 [ 887.566462] ? security_socket_sendmsg+0x83/0xb0 [ 887.571219] ? inet_recvmsg+0x4d0/0x4d0 [ 887.575193] ? sock_sendmsg+0xb5/0x100 [ 887.579076] ? SyS_sendto+0x1c7/0x2c0 [ 887.582872] ? SyS_getpeername+0x220/0x220 [ 887.587108] ? lock_downgrade+0x740/0x740 [ 887.591277] ? wait_for_completion_io+0x10/0x10 [ 887.595943] ? vfs_write+0x319/0x4d0 [ 887.599654] ? fput+0xb/0x140 [ 887.602760] ? SyS_write+0x14d/0x210 [ 887.606475] ? SyS_read+0x210/0x210 [ 887.610122] ? SyS_clock_settime+0x1a0/0x1a0 15:43:08 executing program 3 (fault-call:7 fault-nth:89): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 887.614536] ? do_syscall_64+0x4c/0x640 [ 887.618514] ? SyS_getpeername+0x220/0x220 [ 887.622753] ? do_syscall_64+0x1d5/0x640 [ 887.626819] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 887.692763] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 887.715688] FAULT_INJECTION: forcing a failure. [ 887.715688] name failslab, interval 1, probability 0, space 0, times 0 [ 887.750829] CPU: 0 PID: 3766 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 887.758660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.768012] Call Trace: [ 887.770613] dump_stack+0x1b2/0x283 [ 887.774243] should_fail.cold+0x10a/0x154 [ 887.778428] should_failslab+0xd6/0x130 [ 887.782416] kmem_cache_alloc_node+0x263/0x410 [ 887.787028] __alloc_skb+0x5c/0x510 [ 887.790657] sk_stream_alloc_skb+0xb1/0x760 [ 887.794978] ? __sk_mem_schedule+0x99/0xd0 [ 887.799231] ? ipv6_frag_exit+0x40/0x40 [ 887.803212] do_tcp_sendpages+0x835/0x1750 [ 887.807461] ? sk_stream_alloc_skb+0x760/0x760 [ 887.812058] tls_push_sg+0x1ee/0x760 [ 887.815776] tls_push_record+0xa81/0x1270 [ 887.819932] tls_sw_sendmsg+0xbb0/0xfd0 [ 887.823914] ? selinux_socket_sendmsg+0x1d8/0x260 [ 887.828754] ? selinux_socket_getpeername+0x260/0x260 [ 887.833947] ? tls_sw_push_pending_record+0x30/0x30 [ 887.838971] ? __fget+0x225/0x360 [ 887.842430] inet_sendmsg+0x11a/0x4e0 [ 887.846238] ? security_socket_sendmsg+0x83/0xb0 [ 887.850990] ? inet_recvmsg+0x4d0/0x4d0 [ 887.854962] sock_sendmsg+0xb5/0x100 [ 887.858674] SyS_sendto+0x1c7/0x2c0 [ 887.862319] ? SyS_getpeername+0x220/0x220 [ 887.866554] ? lock_downgrade+0x740/0x740 [ 887.870707] ? wait_for_completion_io+0x10/0x10 [ 887.875376] ? vfs_write+0x319/0x4d0 [ 887.879094] ? fput+0xb/0x140 [ 887.882199] ? SyS_write+0x14d/0x210 [ 887.885905] ? SyS_read+0x210/0x210 [ 887.889553] ? SyS_clock_settime+0x1a0/0x1a0 [ 887.893962] ? do_syscall_64+0x4c/0x640 [ 887.897930] ? SyS_getpeername+0x220/0x220 [ 887.902162] do_syscall_64+0x1d5/0x640 [ 887.906060] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 887.911252] RIP: 0033:0x45dd99 [ 887.914435] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 887.922139] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 887.929408] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 887.936670] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 887.943968] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000059 15:43:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x2, 0x70bd27, 0x35dfdbfb, {{}, {@void, @void, @void}}, [@NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x24044085}, 0x8cccfb24c45f53c7) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x40000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r4, &(0x7f00000001c0)="6f4121c34c14695c89bdd9d772aab52a0a59799c7b80dfc36624967e3ecba5013cd86ac2dcd2896039fce7ba4becc01b63107ff9e71d6283b00874b35ed7cb15b05702b2be9bb87b40734e8d8f9461bddfb16303977669ea54d893c6dbf61a5ea0"}, 0x20) r5 = socket$netlink(0x10, 0x3, 0x0) dup(r5) ioctl$sock_SIOCINQ(r5, 0x541b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPCONNDEL(r7, 0x400442c9, &(0x7f0000000300)={0x5, @multicast}) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x2, 0x4, 0x4}) [ 887.951255] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:43:09 executing program 3 (fault-call:7 fault-nth:90): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@mpls_getnetconf={0x44, 0x52, 0x408, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x80}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x1ff}]}, 0x44}, 0x1, 0x0, 0x0, 0x400c094}, 0x50) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000440)=""/149, &(0x7f0000000040)=0x95) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$IOCTL_START_ACCEL_DEV(r3, 0x40096102, &(0x7f0000000080)={{&(0x7f0000000940)={'GENERAL\x00', {&(0x7f00000005c0)=@adf_hex={@normal='NumberDcInstances\x00', {0x3}, {&(0x7f0000000500)=@adf_hex={@normal='NumberDcInstances\x00', {0x6}}}}}, {&(0x7f00000008c0)={'Accelerator1\x00', {&(0x7f0000000800)=@adf_str={@format={'Dc', '1', 'NumConcurrentRequests\x00'}, {"fdd3a9bbb3f27dbf34ebafbde86e7a3f59f0c5cbcf7611ec354dc4b28330691a01b6b6b66831d7fd2753bb5ed44289c229b68f905b650d0f0f40aaa3a3ddf73c"}, {&(0x7f0000000680)=@adf_str={@normal='NumberDcInstances\x00', {"ac2943e2c5435fcbfef578123817380db86c741a915eee101368e05d03fa00f6b032c14228049bfc6ccc5b2388945a679d747b9390767242487535fa4640d1b3"}}}}}}}}}, 0x20}) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000280)={0x1, 0x2, "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"}) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x98000007}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000829bd7000fedbdf2505000000080002000100000008000200040000000800030001000000080002000800000020000180060001001400000014000400fe8800000000000000000000000000010800030001000000"], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000084) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 888.042930] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 888.062003] FAULT_INJECTION: forcing a failure. [ 888.062003] name failslab, interval 1, probability 0, space 0, times 0 [ 888.092984] CPU: 0 PID: 3777 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 888.100824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.110287] Call Trace: [ 888.112880] dump_stack+0x1b2/0x283 [ 888.116517] should_fail.cold+0x10a/0x154 [ 888.120668] should_failslab+0xd6/0x130 [ 888.124646] __kmalloc+0x6d/0x400 [ 888.128097] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 888.133284] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 888.138313] ? generic_gcmaes_encrypt+0xf4/0x130 [ 888.143087] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 888.147927] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 888.152945] ? __kmalloc+0x3a4/0x400 [ 888.156662] ? tls_push_record+0xfa/0x1270 [ 888.160921] ? cryptd_aead_child+0x9/0x40 [ 888.165084] ? tls_push_record+0x938/0x1270 [ 888.169413] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 888.173567] ? selinux_socket_sendmsg+0x1d8/0x260 [ 888.178415] ? selinux_socket_getpeername+0x260/0x260 [ 888.183626] ? tls_sw_push_pending_record+0x30/0x30 [ 888.188654] ? __fget+0x225/0x360 [ 888.192113] ? inet_sendmsg+0x11a/0x4e0 [ 888.196085] ? security_socket_sendmsg+0x83/0xb0 [ 888.200837] ? inet_recvmsg+0x4d0/0x4d0 [ 888.204831] ? sock_sendmsg+0xb5/0x100 [ 888.208724] ? SyS_sendto+0x1c7/0x2c0 [ 888.212532] ? SyS_getpeername+0x220/0x220 [ 888.216771] ? lock_downgrade+0x740/0x740 [ 888.220933] ? wait_for_completion_io+0x10/0x10 [ 888.225600] ? vfs_write+0x319/0x4d0 [ 888.229317] ? fput+0xb/0x140 [ 888.232423] ? SyS_write+0x14d/0x210 [ 888.236139] ? SyS_read+0x210/0x210 15:43:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000d47ad50000006800"/20], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x10}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x28, 0x2, [@TCA_U32_CLASSID={0x8, 0x1, {0x7}}, @TCA_U32_SEL={0x14}, @TCA_U32_HASH={0x8, 0x2, 0x1}]}}]}, 0x54}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x2) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 888.239778] ? SyS_clock_settime+0x1a0/0x1a0 [ 888.244187] ? do_syscall_64+0x4c/0x640 [ 888.248156] ? SyS_getpeername+0x220/0x220 [ 888.252394] ? do_syscall_64+0x1d5/0x640 [ 888.256463] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:43:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x3, 0x12, &(0x7f0000000740)=""/150) [ 888.310428] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 888.338504] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 15:43:09 executing program 3 (fault-call:7 fault-nth:91): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x24040890) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x800, 0x18) [ 888.482061] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 888.520873] FAULT_INJECTION: forcing a failure. [ 888.520873] name failslab, interval 1, probability 0, space 0, times 0 [ 888.550291] CPU: 1 PID: 3806 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 888.558111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.567461] Call Trace: [ 888.570055] dump_stack+0x1b2/0x283 [ 888.573689] should_fail.cold+0x10a/0x154 [ 888.577838] should_failslab+0xd6/0x130 [ 888.581807] __kmalloc+0x2c1/0x400 [ 888.585345] ? tls_push_record+0xfa/0x1270 [ 888.589580] tls_push_record+0xfa/0x1270 [ 888.593663] ? sk_page_frag_refill+0x56/0x1b0 [ 888.598204] tls_sw_sendmsg+0xbb0/0xfd0 [ 888.602182] ? selinux_socket_sendmsg+0x1d8/0x260 [ 888.607023] ? selinux_socket_getpeername+0x260/0x260 [ 888.612223] ? tls_sw_push_pending_record+0x30/0x30 [ 888.617241] ? __fget+0x225/0x360 [ 888.620701] inet_sendmsg+0x11a/0x4e0 [ 888.624500] ? security_socket_sendmsg+0x83/0xb0 [ 888.629251] ? inet_recvmsg+0x4d0/0x4d0 [ 888.633224] sock_sendmsg+0xb5/0x100 [ 888.636933] SyS_sendto+0x1c7/0x2c0 [ 888.640556] ? SyS_getpeername+0x220/0x220 [ 888.644802] ? lock_downgrade+0x740/0x740 [ 888.648956] ? wait_for_completion_io+0x10/0x10 [ 888.653630] ? vfs_write+0x319/0x4d0 [ 888.657342] ? fput+0xb/0x140 [ 888.660442] ? SyS_write+0x14d/0x210 [ 888.664159] ? SyS_read+0x210/0x210 [ 888.667787] ? SyS_clock_settime+0x1a0/0x1a0 [ 888.672206] ? do_syscall_64+0x4c/0x640 [ 888.676189] ? SyS_getpeername+0x220/0x220 [ 888.680439] do_syscall_64+0x1d5/0x640 [ 888.684333] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 888.689519] RIP: 0033:0x45dd99 [ 888.692704] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 888.700443] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 888.707707] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 888.714971] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 888.722663] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000005b [ 888.729960] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c 15:43:10 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x1002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xec, 0x4000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000080)={0x0, &(0x7f0000000040)=[&(0x7f0000000000)="d2", &(0x7f0000000880)="7a4c3adb023b0e6d3366de113b3ed76fdeeafaf4419d29f5e4b343517793c8f1eaf2dbe616514a2d2c81e9bcfd150024d9278a14c771b33ff32116f185e600d2c1ddd0676c2c2795c322c7a939312aca1db222951abac45b762efef284f5eb86f2d461e0fa500a831209451e3758845eeed4514e5228991ccf2f5a365ad4efb483ec60b352b99d9ad7a87cca5e4e0f4109d2126dc53fb0ef72bd10ad60fe4ca565dcfc87efe95a7b59fb22e37b071bae949c2577c3e8312357655de5866c3cdcbeb67a03f4ac1659a116a9cbb3424e5268a208fb0857ea5a8eab28845f25a94bf0b6d90ef30eaa02affb4c679b58806ba0e54fffe7dca0fe2160eb10f82640a657bcdf7424067397342d11e4ae9bd97b04fc259d7c0a1437b71379d611ef938ac3cd9f2b1a7d2d0ba5b152080e0822b621ae130cb954d73b9a108086903eb2ceee2c1411fac643a5e26a157a744cb85e1308d7988634893938c1b7d628690c4e9140bea2bb18fb315f998a05bab0bf2f2c9b3bb0f14234eec159752f39b54f9a6def7a000ace4a8509ecce041d581ee6ca95b24d231f99e2d9eb5e7bdc11bcdb0779f2433b977237f8768c7df392470bf0b386c61999137c159819236070cf42772f00697afcb15a89caec32abb8a5d4eaa943724ce9196f96f70a2b3ee84c79fdfbee87e2e7ce1245510115971da64fbe10084dd31daf2af977fca7d5e0aca954e1fee59e3c9311562368f8b793f30c540b902cb82c69effedbc12f937baa7f2c1aa5cca2b36e18d0f16a49d4d4e4afadca7db23ace81eab10854fb2f086d826e05d3652d3578651bcab64b9c01683d4c6f5e6189af713807616ce7c0703b32ab4ee3d9d494a1bd9f17d3f21500d8eb388c340040e50ee0e5a2ea029983a2aa22078151023c6f606faa1672443ad929c1f7034172be0e3ea61fdd54eb1d2ae0c39afc1f7a4ab45d05a09597ad07dbd98e2a0e0dfdfff2e865f7691072df183ae051938017241c25855bb7507ce5cebd16c87d539113188189e30147079b6d29c14a5d962be984f01712c2687a4d29564b0f68b4c792d740cf56fe6214e4c20c2bbb97f8372d9808261c5b77aff18e41467959c1ced05feb76b309ee64f36fb1c2ce0e84d9cf850b06a8a67572e1ce13223416ae248c0efcc3f876ca6f7e20d46687d971c1e5d031e5fe70ef53b0730e67bd04ba42ce3399c606daae71dda7bff92ce38368fc47a56519461a8399ec3f2ed1eb5fe4e8cc59d019ede4e2a88a9cb8d8b84f7d6ef1b39137aaf90abb39c35835133ba5da780a71ef31a6b0f708c855d609fe07b563f0a9bb9a52a0a37c3ee89a3382530383ed1ebc76bd01b9566d1a4dcdca25f9315181f0fc24c1320f44d51b0285c24b13dd7ffa8af005cb7f3cad90c98821db98226d58e81e9f268138be749881b5c5cc5ddc768e9f79362931cf3e52a34b39cad0b75bd3f2f45cf0b2bfb182b1914ba9aea13f3fbbe87f33067047e3d3be802ae8b563e6b4a60ac7595b06405a6ef23e1c0310d4e45dbe5acc0f10bcf896f29f544dc40e0ee815cddfe46ed5ac8f7010caa8e2a546d0ff59c8f065a3a2f7d5df8abd2eff914265e9fcca89589cafd2ec45802748d9962d19185ad49d8e1352009c4b3b62c2b8c6583867368af31eff58a3bbe532da01783da7c92c9b41711e3f93d4273bcea718345537b43792ad79ee6b5215a25bc3dbd5278ccc740717f5c02304f1af8bbddaa48ef94f4d0eb033d916f46cf395a764dc324c576c04c132ac8388956dcf2adff44133b0d23b4630193f424bacd33cca0644d3bb9312cc6922d1fd710d3ba65510b75cde4b50a33d2230c7216c46d10d96d004523199d6ae712f09588fbca1b73d4acfee9a74e6d701b4ccb6aaed4f143389a4b99c6c44f2e3562fc5794e318715a6dc78c5838b6e336eaa4c2723f3ab22f89a7c670cd9277936e6035a55375f41a0424927717356c1563ec61c6385b117accbd80e316b35ddf2ee279cbabb64413b4d7083c11a214fc495c206d140d89abebf41a74bd8ee303ea12cd5868a7586a465cde7de0fa5b8069aafd6acac4fd82d811b38a08ff41f5384982f26f4af1a04f8782c58f0e34e913df2d6913448765d67b29ecb7ca1e76a4e9f66fd50e12835685f9212de3a3d1d72ba3c1ec632a74a173cafd9f1aa20c3fadc9d4c76b809efde073de6164f57418e742f0ff5fcc22a052aa9714ad58fa421c4452d79e1526ceb06d8f4e4e98bf02a9448958720f3eada9876bc507ff96f0cb4d54a14d14df2fd3c3b51311150bfccbd64f3855ab9e5e42f1c10bd563febca7e3f1b7fe35ee1aa1d2ef85883d61a7526bf42d46a66b1e7251ce5f29d3f77b9247bc36e4d0b72b20b337c24aa51e003c30bfa791631514c0a691ab4b9769d89a4d0efe70eb87f2d94ed36bce9b9d8214672a685e43e770a0870dfb4ef2f753499401812964ca2b7dab7e7727b3aa07bcd72c5540ec775d8960640abf17f99cda0b48e578c80de93f1a5bccad444a350807967768e89f16203a103301ecd1144ae89e437fb88dfff4fcf5c53df1572d89d3860284ce096bb530e54dbd7735c323dffede9998bbc79523859a523ec83111459ed9155139ec3580b9927916c1486976473757c62269badd4bdec6abe3bbab98811141a1521ad914e07bb54e34e31daf90b48951215c42f7fbf4edf86070d36c5112815b36234dcb605a6c9b2e07305e260fa11b435a0819a03bcf4510c2e6412cad8a1d6af2c4e78776f070081a67d123d828ebc0dc9118df588e82820e9b0c7c49a090753fc94a1c75e351f9fdb7b9ca906c78580c0317ae33575456d3c51fdc5ca2942177bc50b231c506e29c718872e2a954915e65b582162fbb5155bd472f567f14b401f3b3d7eabfa13e6cf260604ddfd33eebf4ae1b1a9e82567c01b5a35340f290afa37ef5e5172339a0b07c32c0f4250d80ee8acff382968b14e08ce343560f7f26e171eb4fb8c8e3a237711aacfb98b7bfe566bead364aedfcfc3b52aa61cc77a634a86c5670c2db8185705ffca1e09f428ea776557129571c261e9ee080abf17406da1c995de84a7cb53633ef27a819f690cd19bef32badc74bb9b6a81edfc8fce163dea82b6635ec003ae269b2593d4eb679faa89bfc7cd3f0b7097973b74a03ce5224b4bc7d4f29f29cc46a7f8ebb1702b8cfa4b354f95c69bbe70146c796ca5dd176c8175ecff92b7156b12d59cf522ae4230cd6e3072edd21201445be6951f4f750ddbd8983fb92cc35a031f7178d50d72f96764d3342c42cd8ce91b743df62f2996a1d85e5a0101336ccb80b1e0e4b21f62da8c12ae687dcd173ad7b8296f142857f0b7c33651039725c1b63e8be413d4e889402fdfbb9cdf883958abee7f9f5a9b09a176f38d58a7ed252efbc6c932a7daa57d7f055650b82d4baab4c547363f533cca6ec8aec24ed38893c6396a78c746ed816295bc2540f594051945f875a6f82c5c474074d92f10e7e314973ca2d32a5540f11d174914c341b14640653a6e5afe6c0df9a73816b82daa5138d0bba5702bd2cee128653af45c5b5b1f8d273033c3fd15c29aa9fbb882c8a119ee40e1d460d3811a63a482ed0ce985c8439b26b137ceefd7efff0f948f0068b0a7ad45fef503f982ef80f05d630a726d0c76d5d02f8604afb0c8ebd3546e9b356f70135f0be6469aabfec7fd960d972ca6f0d53bb249b6dac6efabf8ad84ec9e85c7358a53a5cd1f0ac4f8ff170cf65dc7219180e39d26ff06c2a1bc856c466a38615103842e09360ee88ddcfc4f39f6feb991f84cd8188a0d197dc8709c82c2adf335777da57cbcd07df6843380863551882dc2d27bbb850ccdcf0fae2081179c635f795ddb3c16032a03d52cae5e78e1c3683b3782f909751d48dee14ba56f2bdd9fc56d94ddd05a91271ec3edc291a572853a4eaf7a9a348ca32c6fddfbc42c5ec220667dda8a7e35137da67e586f302c2a638ac431421e12cb1d13a0bd7130e345af71ff9b2ee26097a7d004a1a495c9f890c6c9f598abbbc798564fbce399997020057f1bcb4a6e39003fcddb411387dd95d4f8e6d851c06adad33202badae820a3aae3bca3acd9f0f054941a0ceefbd41062ece5864ccd1efc1e8984cb6b391bf9e4b6d15341d34f8ad8f9aa3d9a62f7f2dce2890a374255585cad2f1ea81d1b6c855f878008db31b89f29c5f2d7d54b262f40dbcec067a3b73a710b6a482571b702025b7721eb5609685a0e00b6f6ff691bd3cfc96eab172903287527ab889d0eb8b6884f592d4b94899610eda56b30dc90db5c8c92a864afb289262d0a6db873bbb14536bf758138328823f33ad257ef7caebe4e63ad45fb60bb169412045680a47be1498b33d60ccf5ae123ac9f3e441b7ff84267f918c452213c72603a3a246395ab1efee6b023f3b16e4a0ac9cc341e1b42b6744527bbc9e0e6ca82f45b3e6855134a7dd3ae77c358fa4655019a58719abaaba2bc6d80f0bd44c1b933faca145c6fd4063c2b820691f79042400a4b80e965811c2da6a3f9732e19aeadc102d8227d3409fe3feb66f4dad60e7e59cdb53b394d70b4d3de3c8cc74bb90d609eccfc60e692b867bbc331cfd38cdaa5555429026139c3a8db75aec4476208fa83972409ddb2fc8813783d1f73e03c81eae7d1419569d7f5bc300b58bee0dbe3ad810c982d0a882c972f38bf77b6382f8bef773652048f853058b3a0bf56994cb4cbb8c4c278678372aabf33f7587b3f8d029d855767d412b75775c90d004b64abd8f94f52d38e18dbb115b3e2e4e67589d4dd2fdfaba1122001ef769ba8cde933b1f8a5c1eb88c2cd3a215016f6ac58e5029998315c48f1c11781ca2b2a9bb00b570cc99c0b39643d849262da8ab2c4c0940af51a90cdd581d1c3759029b36110ca9cb5aff0552de670d4b541a08b4295fbbffacef573d8121d69aeb5be2f2103b071dee62661a428735698b5468e1dc38ab183acb3b0b4854447fd3a0ca8d38a0b257c4335884e80d41fec5ea959fad666212f411f0855e4c1a85bc790fba8064a6e514a719a8f95e5f6fe30932c0113ee5cdb5895ad4067093ba2079d28ef328e4aef583d5a98ed8a66b456b5550267889a82336d8f91869b1fe6de80f68af8448beddf84b2689b4e68626f793127f5873586e1fa373eca65d842bd4f9c59313a1914ee542cda45a924e2b06d00bd65e17046096e3183238851b6631a4d2dfc61e4e323643255c11bf9a476ca68dfcb8b4f4e309624fdb65fc104c215c5d627553f28f30040f1c933400d7f59f6e77f2c0c5229f51711f6c7569e3736fbcaaaeb0e0978a2a4ea9c6b18af04b65988929d6a1d81a394e295e5b71852e94058311ff9858ae8df32bb173bd83f7b17f3547471a79871dc2c47f403399a0b6b5cd3f8e35639405ff3bcd99b7e6a46eac85e4284bcc1ff4479cb22ac41b73df4cacd104e426d11fc690499d80e2fe2437d435c90ac291be6350e9c4eae165eb0d99a8c91783430f5a20ac4ba93c71b02e071c9862156b67a6e98a7a626434a5cdea9022062906a27ce6e02244ff9f57e2848a9706b187dd95d32f849e3384ab9b5881ea632bf70f1a42ee2bc480edf5adb2f9ae63b4af777eaac36e406a5c22f14b8c5daa122bfae00afcc12a3e8a98a4eaa05851ed4941361f2b8a9dbb64c432a9977d1cd3eb2b8e44c18186d95e48ee1cd44844066c09465021d3544d99f6665df9e660729bb07d267274792a304ad01ec3c14141558be60037e8ccb02f2dc28bdf0292197ee9ec29c1caa45d9"]}) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0xeae3, 0x80000) ioctl$DRM_IOCTL_MODE_SETGAMMA(r4, 0xc02064a5, &(0x7f0000000200)={0x2b93, 0x3, &(0x7f0000000140)=[0xb05, 0x1, 0x81], &(0x7f0000000180)=[0x0, 0x7, 0x6, 0x0, 0x6, 0x80, 0x1000, 0x5897, 0x0], &(0x7f00000001c0)=[0x401, 0x9, 0x95c3, 0x4, 0xf4, 0x3, 0x122, 0xa05]}) 15:43:10 executing program 2: getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0xc37, 0x5, 0x4}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={r0, 0x3, 0x5, 0x2, 0x8, 0x34}, &(0x7f00000000c0)=0x14) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f0000000100)) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = dup(r1) r4 = syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='\x00', 0x2, 0x6, &(0x7f00000005c0)=[{&(0x7f00000001c0)="2d05e241edbaf5fef226eac61204315accac2ef0f98da874fa9153171750eeace6df99f99f2cdcc0d23cff6f6943fe75ef36c0ef70da4ff46c4a9409f079c2df6b8dad3cac2e651189711e26d41b06c96d258f0da4619afbca41d50c482c25b43627a619e54a1573efb47a0f4c7c92cff5a39b82250cd6962d7e1bc9b221a552145021bf31adac702ea213e6cf2ef83b4b988576", 0x94, 0xfff}, {&(0x7f0000000800)="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", 0x1000, 0x1b48000000}, {&(0x7f0000000280)="1c0eb4becc0cf95e09a7727c901078e90e6dfc43ccfc6c70e5697aecd3921844d398be6c3b867d1d887a2e4ae45d4cbc0f548266ef6d5433066bf39e6c05244338c9540480ca4618004ac051bad0d5630b3dfec7cdc6772d2f303d0b4230949d12d0f30d27f726683181ec261a48538c3eb03f998d1b7e77fd62736bea4324f861287b4d45c7eb14785bca698ef3a95f06d8cb8132406c428acd99acbaa169e22e892a9aadbd61146fd184840a9ac34b459aa329ac9f42532e12aa1c8ae74c3df0f63efc961ec9ab7100483519113ad1cd26a47f740300a34152cb97798732d4e039797d2536a26bc5b72239a23a45aa69b087e97dbf2bfa", 0xf8, 0xb07c}, {&(0x7f0000000380), 0x0, 0xffffffffffffff2f}, {&(0x7f00000003c0)="5d85aa4b5f85468067b71cf17bf9e68e8bc33b677ed57a9918b05de21f1cda38f7822897a47f336cfa639c567361a6cafa7bd1bc93f8e99ac7b5f9217dfd9dbf20e81f422bf78c9a0c1f7d1f98e343e4b5ed3fdfa8ce6e051ec29a2d63bd5f2fbc473fb84815aede656762eec8a744a21f42cabbe9710bd68c767d3af1902d50ad867c91ca2f1726dd56649b8a797e677b6c2a0767447ab3abe1448e44f5bed161e115e2d32e223a07679e0a4b9aee7796a162641b5101b6ea1d2d8ae9f1d95c1fa4d3c8e4d126ef6bf32785e99213c54d69a1483218493e6993077ce32c6945962c47e9325da784b24ee111", 0xec, 0x3}, {&(0x7f00000004c0)="16d5e0418daf51e5f1b71ba1b69891ed1055c785e351c3f515bc43ab7ae6353ddc185f85c99e4d3275612f41198cb0cc6893b89ec9a38cea592e84061f7afc841d767a1a4bc5b7f0ad251fd0be53be050ec35efe90d4fec32a707217b69c19052df7eac399946b2825921474545d9efcaddceb9a6b718ea803a84f90f148011ad776b450355b83efdc1d128ba2eedc521e3e5060792ac07ce92e8ffc3374f0be45e5ceafe26df656ae5bdc344e3dde7867062e11402bd81074cb4f37ef65fef4e5d5e1551a606f991ff771b437ca22df13a3b4df1c35611b90fe54db1c801806", 0xe0, 0x6}], 0x800002, &(0x7f0000000680)={[{@adaptive_mode='mode=adaptive'}, {@alloc_mode_reuse='alloc_mode=reuse'}], [{@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '.'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@subj_user={'subj_user', 0x3d, '@\'%-+,\''}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000001800)={r1, 0x9, 0x4, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) ioctl$SNDCTL_TMR_STOP(0xffffffffffffffff, 0x5403) 15:43:10 executing program 3 (fault-call:7 fault-nth:92): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 888.976190] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 888.999143] FAULT_INJECTION: forcing a failure. [ 888.999143] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 889.010999] CPU: 0 PID: 3819 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 889.018796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.028152] Call Trace: [ 889.030748] dump_stack+0x1b2/0x283 [ 889.034381] should_fail.cold+0x10a/0x154 [ 889.038551] __alloc_pages_nodemask+0x22c/0x2720 [ 889.043322] ? is_bpf_text_address+0xb8/0x150 [ 889.047816] ? kernel_text_address+0xbd/0xf0 [ 889.052226] ? __kernel_text_address+0x9/0x30 [ 889.056738] ? unwind_get_return_address+0x51/0x90 [ 889.061663] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.067029] ? __save_stack_trace+0xa0/0x160 [ 889.071436] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 889.076275] ? depot_save_stack+0x10d/0x3e3 [ 889.080599] ? kasan_kmalloc+0x139/0x160 [ 889.084663] ? kasan_kmalloc+0xeb/0x160 [ 889.088632] ? __kmalloc+0x15a/0x400 [ 889.092344] ? tls_push_record+0xfa/0x1270 [ 889.096575] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 889.100718] ? inet_sendmsg+0x11a/0x4e0 [ 889.104686] ? sock_sendmsg+0xb5/0x100 [ 889.108568] ? SyS_sendto+0x1c7/0x2c0 [ 889.112369] ? do_syscall_64+0x1d5/0x640 [ 889.116426] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.121793] cache_grow_begin+0x8f/0x420 [ 889.125873] cache_alloc_refill+0x273/0x350 15:43:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000000)={{0x6, 0x1, 0x8, 0x6, 0x10001}, 0xe333, 0xfffffffa, 'id1\x00', 'timer1\x00', 0x0, 0xa793, 0x8f32, 0x8, 0x2c9}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:43:10 executing program 3 (fault-call:7 fault-nth:93): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640)='nl80211\x00') sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, r2, 0x103, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={0x0, @ethernet={0x6, @multicast}, @vsock={0x28, 0x0, 0x2711, @my=0x0}, @llc={0x1a, 0x103, 0x5, 0x0, 0xe3, 0x48, @dev={[], 0x30}}, 0x5, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000180)='wg1\x00', 0x3, 0x8, 0xb2e}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000140), &(0x7f00000000c0)=0xffffffffffffffa7) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "40ffff0000d10000110000000100", "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:10 executing program 3 (fault-call:7 fault-nth:94): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:10 executing program 2: socket$netlink(0x10, 0x3, 0x1) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = dup(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000001c0)={r0}) getsockname$unix(r2, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400201) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2b, 0x1, 0x8, 0x800004, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private2, 0x80, 0x40, 0x400, 0x1}}) r6 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', r5, 0x4, 0x0, 0x40, 0x5, 0x40, @empty, @mcast2, 0x700, 0x1, 0x101, 0x1}}) dup(r1) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x3404, 0x480000) r7 = socket$netlink(0x10, 0x3, 0x0) dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000001) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r8 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x7fff, 0x40000) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={0x0, 0x200, 0x20}, 0xc) 15:43:10 executing program 3 (fault-call:7 fault-nth:95): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r3, 0x1, 0x70bd28, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x4, 0x4e}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40088c8}, 0x0) 15:43:10 executing program 3 (fault-call:7 fault-nth:96): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:10 executing program 3 (fault-call:7 fault-nth:97): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 889.125889] __kmalloc+0x378/0x400 [ 889.125901] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 889.125914] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 889.125942] ? generic_gcmaes_encrypt+0xf4/0x130 [ 889.125952] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 889.125963] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 889.125973] ? __kmalloc+0x3a4/0x400 [ 889.125984] ? tls_push_record+0xfa/0x1270 [ 889.125994] ? cryptd_aead_child+0x9/0x40 [ 889.126007] ? tls_push_record+0x938/0x1270 [ 889.126028] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 889.126048] ? selinux_socket_sendmsg+0x1d8/0x260 [ 889.126059] ? selinux_socket_getpeername+0x260/0x260 [ 889.126075] ? tls_sw_push_pending_record+0x30/0x30 [ 889.126089] ? __fget+0x225/0x360 [ 889.126103] ? inet_sendmsg+0x11a/0x4e0 [ 889.126111] ? security_socket_sendmsg+0x83/0xb0 [ 889.126120] ? inet_recvmsg+0x4d0/0x4d0 [ 889.126133] ? sock_sendmsg+0xb5/0x100 [ 889.126143] ? SyS_sendto+0x1c7/0x2c0 [ 889.126152] ? SyS_getpeername+0x220/0x220 [ 889.126164] ? lock_downgrade+0x740/0x740 [ 889.126184] ? wait_for_completion_io+0x10/0x10 [ 889.126194] ? vfs_write+0x319/0x4d0 [ 889.126205] ? fput+0xb/0x140 [ 889.126214] ? SyS_write+0x14d/0x210 [ 889.126223] ? SyS_read+0x210/0x210 [ 889.126233] ? SyS_clock_settime+0x1a0/0x1a0 [ 889.126243] ? do_syscall_64+0x4c/0x640 [ 889.126252] ? SyS_getpeername+0x220/0x220 [ 889.126263] ? do_syscall_64+0x1d5/0x640 [ 889.126277] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.315373] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 889.326773] FAULT_INJECTION: forcing a failure. [ 889.326773] name failslab, interval 1, probability 0, space 0, times 0 [ 889.326787] CPU: 1 PID: 3841 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 889.326795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.326799] Call Trace: [ 889.326819] dump_stack+0x1b2/0x283 [ 889.326838] should_fail.cold+0x10a/0x154 [ 889.326855] should_failslab+0xd6/0x130 [ 889.326868] kmem_cache_alloc_node+0x263/0x410 [ 889.326884] __alloc_skb+0x5c/0x510 [ 889.326900] sk_stream_alloc_skb+0xb1/0x760 [ 889.326910] ? tcp_send_mss+0x9f/0x2e0 [ 889.326921] ? ipv6_frag_exit+0x40/0x40 [ 889.326933] do_tcp_sendpages+0x835/0x1750 [ 889.326955] ? sk_stream_alloc_skb+0x760/0x760 [ 889.326975] tls_push_sg+0x1ee/0x760 [ 889.326993] tls_push_record+0xa81/0x1270 [ 889.327017] tls_sw_sendmsg+0xbb0/0xfd0 [ 889.327040] ? selinux_socket_sendmsg+0x1d8/0x260 [ 889.327053] ? selinux_socket_getpeername+0x260/0x260 [ 889.327068] ? tls_sw_push_pending_record+0x30/0x30 [ 889.327081] ? __fget+0x225/0x360 [ 889.327095] inet_sendmsg+0x11a/0x4e0 [ 889.327105] ? security_socket_sendmsg+0x83/0xb0 [ 889.327115] ? inet_recvmsg+0x4d0/0x4d0 [ 889.327128] sock_sendmsg+0xb5/0x100 [ 889.327142] SyS_sendto+0x1c7/0x2c0 [ 889.327154] ? SyS_getpeername+0x220/0x220 [ 889.327171] ? lock_downgrade+0x740/0x740 [ 889.327196] ? wait_for_completion_io+0x10/0x10 [ 889.327209] ? vfs_write+0x319/0x4d0 [ 889.327221] ? fput+0xb/0x140 [ 889.327231] ? SyS_write+0x14d/0x210 [ 889.327241] ? SyS_read+0x210/0x210 [ 889.327252] ? SyS_clock_settime+0x1a0/0x1a0 [ 889.327263] ? do_syscall_64+0x4c/0x640 [ 889.327271] ? SyS_getpeername+0x220/0x220 [ 889.327284] do_syscall_64+0x1d5/0x640 [ 889.327300] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.327310] RIP: 0033:0x45dd99 [ 889.327316] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 889.327328] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 889.327335] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 889.327340] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 889.327345] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000005d [ 889.327351] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 889.420383] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 889.427159] FAULT_INJECTION: forcing a failure. [ 889.427159] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 889.427172] CPU: 1 PID: 3853 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 889.427179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.427184] Call Trace: [ 889.427202] dump_stack+0x1b2/0x283 [ 889.427222] should_fail.cold+0x10a/0x154 [ 889.427241] __alloc_pages_nodemask+0x22c/0x2720 [ 889.427256] ? kasan_slab_free+0xc3/0x1a0 [ 889.427271] ? tls_push_record+0xc3b/0x1270 [ 889.427283] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 889.427292] ? inet_sendmsg+0x11a/0x4e0 [ 889.427305] ? do_syscall_64+0x1d5/0x640 [ 889.427316] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.427328] ? tcp_tx_timestamp+0x17/0x250 [ 889.427342] ? debug_check_no_obj_freed+0x2c0/0x674 [ 889.427357] ? lock_acquire+0x170/0x3f0 [ 889.427368] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 889.427395] ? debug_check_no_obj_freed+0x2c0/0x674 [ 889.427423] alloc_pages_current+0x155/0x260 [ 889.427435] ? tls_push_record+0xc3b/0x1270 [ 889.427448] skb_page_frag_refill+0x1bf/0x490 [ 889.427474] sk_page_frag_refill+0x4a/0x1b0 [ 889.427487] alloc_sg+0x13e/0x730 [ 889.427507] tls_sw_sendmsg+0x49a/0xfd0 [ 889.427527] ? selinux_socket_sendmsg+0x1d8/0x260 [ 889.427537] ? selinux_socket_getpeername+0x260/0x260 [ 889.427553] ? tls_sw_push_pending_record+0x30/0x30 [ 889.427565] ? __fget+0x225/0x360 [ 889.427578] inet_sendmsg+0x11a/0x4e0 [ 889.427586] ? security_socket_sendmsg+0x83/0xb0 [ 889.427594] ? inet_recvmsg+0x4d0/0x4d0 [ 889.427606] sock_sendmsg+0xb5/0x100 [ 889.427617] SyS_sendto+0x1c7/0x2c0 [ 889.427627] ? SyS_getpeername+0x220/0x220 [ 889.427637] ? lock_downgrade+0x740/0x740 [ 889.427657] ? wait_for_completion_io+0x10/0x10 [ 889.427666] ? vfs_write+0x319/0x4d0 [ 889.427676] ? fput+0xb/0x140 [ 889.427684] ? SyS_write+0x14d/0x210 [ 889.427693] ? SyS_read+0x210/0x210 [ 889.427703] ? SyS_clock_settime+0x1a0/0x1a0 [ 889.427712] ? do_syscall_64+0x4c/0x640 [ 889.427720] ? SyS_getpeername+0x220/0x220 [ 889.427730] do_syscall_64+0x1d5/0x640 [ 889.427744] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.427752] RIP: 0033:0x45dd99 [ 889.427758] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 889.427769] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 889.427776] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 889.427782] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 889.427788] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000005e [ 889.427794] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 889.558829] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 889.567022] FAULT_INJECTION: forcing a failure. [ 889.567022] name failslab, interval 1, probability 0, space 0, times 0 [ 889.567036] CPU: 1 PID: 3864 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 889.567043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.567047] Call Trace: [ 889.567067] dump_stack+0x1b2/0x283 [ 889.567087] should_fail.cold+0x10a/0x154 [ 889.567107] should_failslab+0xd6/0x130 [ 889.567123] kmem_cache_alloc_node+0x263/0x410 [ 889.567143] __alloc_skb+0x5c/0x510 [ 889.567162] sk_stream_alloc_skb+0xb1/0x760 [ 889.567173] ? tcp_send_mss+0x9f/0x2e0 [ 889.567186] ? ipv6_frag_exit+0x40/0x40 [ 889.567200] do_tcp_sendpages+0x835/0x1750 [ 889.567235] ? sk_stream_alloc_skb+0x760/0x760 [ 889.567258] tls_push_sg+0x1ee/0x760 [ 889.567280] tls_push_record+0xa81/0x1270 [ 889.567306] tls_sw_sendmsg+0xbb0/0xfd0 [ 889.567328] ? selinux_socket_sendmsg+0x1d8/0x260 [ 889.567340] ? selinux_socket_getpeername+0x260/0x260 [ 889.567358] ? tls_sw_push_pending_record+0x30/0x30 [ 889.567375] ? __fget+0x225/0x360 [ 889.567390] inet_sendmsg+0x11a/0x4e0 [ 889.567399] ? security_socket_sendmsg+0x83/0xb0 [ 889.567410] ? inet_recvmsg+0x4d0/0x4d0 [ 889.567425] sock_sendmsg+0xb5/0x100 [ 889.567438] SyS_sendto+0x1c7/0x2c0 [ 889.567449] ? SyS_getpeername+0x220/0x220 [ 889.567465] ? lock_downgrade+0x740/0x740 [ 889.567491] ? wait_for_completion_io+0x10/0x10 [ 889.567503] ? vfs_write+0x319/0x4d0 [ 889.567516] ? fput+0xb/0x140 [ 889.567527] ? SyS_write+0x14d/0x210 [ 889.567539] ? SyS_read+0x210/0x210 [ 889.567551] ? SyS_clock_settime+0x1a0/0x1a0 [ 889.567564] ? do_syscall_64+0x4c/0x640 [ 889.567573] ? SyS_getpeername+0x220/0x220 [ 889.567585] do_syscall_64+0x1d5/0x640 [ 889.567601] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.567620] RIP: 0033:0x45dd99 [ 889.567626] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 889.567638] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 889.567645] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 [ 889.567651] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 889.567658] R10: 0000000000004040 R11: 0000000000000246 R12: 000000000000005f [ 889.567665] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 889.671602] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 889.682682] FAULT_INJECTION: forcing a failure. [ 889.682682] name failslab, interval 1, probability 0, space 0, times 0 [ 889.682696] CPU: 1 PID: 3874 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 889.682703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.682708] Call Trace: [ 889.682727] dump_stack+0x1b2/0x283 [ 889.682747] should_fail.cold+0x10a/0x154 [ 889.682765] should_failslab+0xd6/0x130 [ 889.682778] __kmalloc+0x6d/0x400 [ 889.682790] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 889.682805] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 889.682824] ? generic_gcmaes_encrypt+0xf4/0x130 [ 889.682837] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 889.682852] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 889.682862] ? __kmalloc+0x3a4/0x400 [ 889.682877] ? tls_push_record+0xfa/0x1270 [ 889.682889] ? cryptd_aead_child+0x9/0x40 [ 889.682904] ? tls_push_record+0x938/0x1270 [ 889.682929] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 889.682951] ? selinux_socket_sendmsg+0x1d8/0x260 [ 889.682962] ? selinux_socket_getpeername+0x260/0x260 [ 889.682978] ? tls_sw_push_pending_record+0x30/0x30 [ 889.682990] ? __fget+0x225/0x360 [ 889.683004] ? inet_sendmsg+0x11a/0x4e0 [ 889.683012] ? security_socket_sendmsg+0x83/0xb0 [ 889.683021] ? inet_recvmsg+0x4d0/0x4d0 [ 889.683033] ? sock_sendmsg+0xb5/0x100 [ 889.683043] ? SyS_sendto+0x1c7/0x2c0 [ 889.683053] ? SyS_getpeername+0x220/0x220 [ 889.683065] ? lock_downgrade+0x740/0x740 [ 889.683085] ? wait_for_completion_io+0x10/0x10 [ 889.683095] ? vfs_write+0x319/0x4d0 [ 889.683105] ? fput+0xb/0x140 [ 889.683114] ? SyS_write+0x14d/0x210 [ 889.683126] ? SyS_read+0x210/0x210 [ 889.683138] ? SyS_clock_settime+0x1a0/0x1a0 [ 889.683149] ? do_syscall_64+0x4c/0x640 [ 889.683157] ? SyS_getpeername+0x220/0x220 [ 889.683177] ? do_syscall_64+0x1d5/0x640 [ 889.683195] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.787307] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 889.791840] FAULT_INJECTION: forcing a failure. [ 889.791840] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 889.791853] CPU: 0 PID: 3880 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 889.791860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.791864] Call Trace: [ 889.791882] dump_stack+0x1b2/0x283 [ 889.791900] should_fail.cold+0x10a/0x154 [ 889.791918] __alloc_pages_nodemask+0x22c/0x2720 [ 889.791937] ? is_bpf_text_address+0xb8/0x150 [ 889.791948] ? kernel_text_address+0xbd/0xf0 [ 889.791957] ? __kernel_text_address+0x9/0x30 [ 889.791967] ? unwind_get_return_address+0x51/0x90 [ 889.791976] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.791986] ? __save_stack_trace+0xa0/0x160 [ 889.791998] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 889.792008] ? depot_save_stack+0x10d/0x3e3 [ 889.792026] ? kasan_kmalloc+0x139/0x160 [ 889.792038] ? kasan_kmalloc+0xeb/0x160 [ 889.792046] ? __kmalloc+0x15a/0x400 [ 889.792056] ? tls_push_record+0xfa/0x1270 [ 889.792067] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 889.792077] ? inet_sendmsg+0x11a/0x4e0 [ 889.792088] ? sock_sendmsg+0xb5/0x100 [ 889.792095] ? SyS_sendto+0x1c7/0x2c0 [ 889.792114] ? do_syscall_64+0x1d5/0x640 [ 889.792125] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.792141] cache_grow_begin+0x8f/0x420 [ 889.792155] cache_alloc_refill+0x273/0x350 [ 889.792172] __kmalloc+0x378/0x400 [ 889.792183] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 889.792196] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 889.792216] ? generic_gcmaes_encrypt+0xf4/0x130 [ 889.792226] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 889.792236] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 889.792245] ? __kmalloc+0x3a4/0x400 [ 889.792255] ? tls_push_record+0xfa/0x1270 [ 889.792264] ? cryptd_aead_child+0x9/0x40 [ 889.792277] ? tls_push_record+0x938/0x1270 [ 889.792299] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 889.792318] ? selinux_socket_sendmsg+0x1d8/0x260 [ 889.792329] ? selinux_socket_getpeername+0x260/0x260 [ 889.792344] ? tls_sw_push_pending_record+0x30/0x30 [ 889.792357] ? __fget+0x225/0x360 [ 889.792370] ? inet_sendmsg+0x11a/0x4e0 [ 889.792378] ? security_socket_sendmsg+0x83/0xb0 [ 889.792388] ? inet_recvmsg+0x4d0/0x4d0 [ 889.792398] ? sock_sendmsg+0xb5/0x100 [ 889.792408] ? SyS_sendto+0x1c7/0x2c0 [ 889.792424] ? SyS_getpeername+0x220/0x220 [ 889.792440] ? lock_downgrade+0x740/0x740 [ 889.792463] ? wait_for_completion_io+0x10/0x10 [ 889.792476] ? vfs_write+0x319/0x4d0 [ 889.792486] ? fput+0xb/0x140 [ 889.792495] ? SyS_write+0x14d/0x210 [ 889.792504] ? SyS_read+0x210/0x210 [ 889.792514] ? SyS_clock_settime+0x1a0/0x1a0 15:43:15 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x4, 0x7, [0x8, 0x3f, 0x20, 0x1, 0x5], 0x2}) ioctl$VIDIOC_ENCODER_CMD(0xffffffffffffffff, 0xc028564d, &(0x7f0000000040)={0x1, 0x1, [0x6, 0x45, 0x5, 0x5, 0x7f, 0x0, 0xf5, 0x1]}) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1, 0x40000) dup(r1) 15:43:15 executing program 3 (fault-call:7 fault-nth:98): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) 15:43:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) process_vm_writev(r2, &(0x7f0000000480)=[{&(0x7f00000002c0)=""/42, 0x2a}, {&(0x7f0000000440)=""/49, 0x31}], 0x2, &(0x7f0000000900)=[{&(0x7f0000000600)=""/189, 0xbd}, {&(0x7f00000006c0)=""/34, 0x22}, {&(0x7f0000000800)=""/184, 0xb8}, {&(0x7f0000000700)=""/19, 0x13}], 0x4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180)='ethtool\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000010c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001100)={{{@in6=@private2, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000300)=0x12d) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000013c0)={&(0x7f00000004c0)={0x110, r3, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xd0}, @ETHTOOL_A_LINKINFO_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x7f}, @ETHTOOL_A_LINKINFO_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_LINKINFO_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x40}]}, 0x110}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="240000003d58451ded0a214b0a9ee6ac7562ac97173f1c", @ANYRES16=r3, @ANYBLOB="000628bd7000fddbdf25103939138feca76d23ffffff0800090094ee0000"], 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x1) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)=ANY=[@ANYBLOB="480000001000850700"/20, @ANYRES32=r9, @ANYBLOB="000002006823204fcff81a8404237e4163f4992e6d85049f4d57fb1d7ba0321916c1dd3a0d7d50e8132c1cffdb2d3d86814b482632351390a94086b74b8ddbabbf5e266d9e8d1b"], 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="380000f26edf2500000000d0cec6db3fdce7215dad81a4b120d1dfc032000000000000000000", @ANYRES32=0x0, @ANYBLOB="0900080001000b00040005e00b000100636c73616374000006000500fd0b0000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r9, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000009c0)={0xe0, r3, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x40080}, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:43:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(r3, &(0x7f0000000040)={0xa, 0xce24, 0x0, @remote, 0xfffffffc}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r5, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e22}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x1}, @WGDEVICE_A_PEERS={0x1c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3f}}}]}]}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}]}, 0x48}, 0x1, 0x0, 0x0, 0x8d0}, 0x4004004) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 889.792524] ? do_syscall_64+0x4c/0x640 [ 889.792532] ? SyS_getpeername+0x220/0x220 [ 889.792543] ? do_syscall_64+0x1d5/0x640 [ 889.792558] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 894.044265] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 894.059132] FAULT_INJECTION: forcing a failure. [ 894.059132] name failslab, interval 1, probability 0, space 0, times 0 [ 894.088200] CPU: 0 PID: 3899 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 894.096051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.105414] Call Trace: [ 894.108015] dump_stack+0x1b2/0x283 [ 894.111650] should_fail.cold+0x10a/0x154 [ 894.115808] should_failslab+0xd6/0x130 [ 894.119804] kmem_cache_alloc_node_trace+0x25a/0x400 [ 894.122743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3905 comm=syz-executor.1 [ 894.124915] __kmalloc_node_track_caller+0x38/0x70 [ 894.124928] __alloc_skb+0x96/0x510 [ 894.124942] sk_stream_alloc_skb+0xb1/0x760 [ 894.124959] ? __sk_mem_schedule+0x99/0xd0 [ 894.124968] ? ipv6_frag_exit+0x40/0x40 [ 894.124979] do_tcp_sendpages+0x835/0x1750 [ 894.124999] ? sk_stream_alloc_skb+0x760/0x760 [ 894.125022] tls_push_sg+0x1ee/0x760 [ 894.170535] tls_push_record+0xa81/0x1270 [ 894.174728] tls_sw_sendmsg+0xbb0/0xfd0 [ 894.178721] ? selinux_socket_sendmsg+0x1d8/0x260 [ 894.183586] ? selinux_socket_getpeername+0x260/0x260 [ 894.188787] ? tls_sw_push_pending_record+0x30/0x30 [ 894.193812] ? __fget+0x225/0x360 [ 894.197272] inet_sendmsg+0x11a/0x4e0 [ 894.201077] ? security_socket_sendmsg+0x83/0xb0 [ 894.205840] ? inet_recvmsg+0x4d0/0x4d0 [ 894.209821] sock_sendmsg+0xb5/0x100 [ 894.213566] SyS_sendto+0x1c7/0x2c0 [ 894.217197] ? SyS_getpeername+0x220/0x220 [ 894.221525] ? lock_downgrade+0x740/0x740 [ 894.225695] ? wait_for_completion_io+0x10/0x10 [ 894.230369] ? vfs_write+0x319/0x4d0 [ 894.234083] ? fput+0xb/0x140 [ 894.237191] ? SyS_write+0x14d/0x210 [ 894.240903] ? SyS_read+0x210/0x210 [ 894.244529] ? SyS_clock_settime+0x1a0/0x1a0 [ 894.248940] ? do_syscall_64+0x4c/0x640 [ 894.252926] ? SyS_getpeername+0x220/0x220 [ 894.257168] do_syscall_64+0x1d5/0x640 [ 894.261063] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 894.266250] RIP: 0033:0x45dd99 [ 894.269432] RSP: 002b:00007fa955518c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 894.277144] RAX: ffffffffffffffda RBX: 000000000002e8c0 RCX: 000000000045dd99 [ 894.285460] RDX: 00000000ffffffac RSI: 0000000020000000 RDI: 0000000000000003 15:43:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r2, 0x0, 0x0, 0x20004040, &(0x7f0000000280)={0xa, 0x100000004e22, 0xff, @loopback, 0x8000008}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$NL80211_CMD_NEW_KEY(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30800802}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xff, 0x23}}}}, [@NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x5}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) [ 894.292737] RBP: 00007fa955518ca0 R08: 0000000000000000 R09: 0000000000000000 [ 894.300033] R10: 0000000000004040 R11: 0000000000000246 R12: 0000000000000062 [ 894.307309] R13: 00007ffd91e92d9f R14: 00007fa9555199c0 R15: 000000000118bf2c [ 894.319474] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3900 comm=syz-executor.2 [ 894.326746] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3909 comm=syz-executor.1 [ 894.336276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3912 comm=syz-executor.2 [ 894.428604] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3908 comm=syz-executor.1 15:43:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0xe8c, @ipv4={[], [], @multicast1}, 0x9}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x80, 0x6, 0xfc, 0xa49, 0x81}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r5, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x658040, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r6, 0x8919, &(0x7f0000000080)={'netpci0\x00', {0x2, 0x0, @initdev}}) shutdown(r5, 0x1) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f00000000c0)={r8, 0x1, '!'}, &(0x7f0000000000)=0x3e2) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000001c0)={r8, 0xff00, 0x84, "9442d8c108b97135cf53d50be42dac358cbc71113564d19baf1ff0a7fc8a0401d2946f54c66cdef04a0adb67c92895c421d3ff887149e77e9190f098f44cafd97d28f59d5dbdc79741dc564e84461c4b901939ca3cac469e95a2abb7e1855c7c5c03a8fbd3a5aeaf93779f5a218c74dd05e66b8084c3672612fa913092bb96b3eb666bd8"}, 0x8c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r9 = semget$private(0x0, 0x2, 0x110) semctl$SEM_STAT(r9, 0x4, 0x12, &(0x7f0000000100)=""/188) [ 894.632227] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:15 executing program 3 (fault-call:7 fault-nth:99): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 894.751168] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 894.818415] FAULT_INJECTION: forcing a failure. [ 894.818415] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 894.830283] CPU: 1 PID: 3925 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0 [ 894.838080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.847438] Call Trace: [ 894.850035] dump_stack+0x1b2/0x283 [ 894.853670] should_fail.cold+0x10a/0x154 [ 894.857842] __alloc_pages_nodemask+0x22c/0x2720 [ 894.862605] ? is_bpf_text_address+0xb8/0x150 [ 894.867107] ? kernel_text_address+0xbd/0xf0 [ 894.871516] ? __kernel_text_address+0x9/0x30 [ 894.876026] ? unwind_get_return_address+0x51/0x90 [ 894.881322] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 894.886693] ? __save_stack_trace+0xa0/0x160 [ 894.891125] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 894.896965] ? depot_save_stack+0x10d/0x3e3 [ 894.901293] ? kasan_kmalloc+0x139/0x160 [ 894.905381] ? kasan_kmalloc+0xeb/0x160 [ 894.909374] ? __kmalloc+0x15a/0x400 [ 894.913087] ? tls_push_record+0xfa/0x1270 [ 894.917346] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 894.921497] ? inet_sendmsg+0x11a/0x4e0 [ 894.925470] ? sock_sendmsg+0xb5/0x100 [ 894.929363] ? SyS_sendto+0x1c7/0x2c0 [ 894.936724] ? do_syscall_64+0x1d5/0x640 [ 894.941063] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 894.946432] cache_grow_begin+0x8f/0x420 [ 894.950495] cache_alloc_refill+0x273/0x350 [ 894.954816] __kmalloc+0x378/0x400 [ 894.958353] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 894.963541] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 894.968564] ? generic_gcmaes_encrypt+0xf4/0x130 [ 894.973577] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 894.978417] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 894.983434] ? __kmalloc+0x3a4/0x400 [ 894.987143] ? tls_push_record+0xfa/0x1270 [ 894.992001] ? cryptd_aead_child+0x9/0x40 [ 894.996239] ? tls_push_record+0x938/0x1270 [ 895.000830] ? tls_sw_sendmsg+0xbb0/0xfd0 [ 895.005015] ? selinux_socket_sendmsg+0x1d8/0x260 [ 895.011965] ? selinux_socket_getpeername+0x260/0x260 [ 895.017616] ? tls_sw_push_pending_record+0x30/0x30 [ 895.023275] ? __fget+0x225/0x360 [ 895.027316] ? inet_sendmsg+0x11a/0x4e0 [ 895.031317] ? security_socket_sendmsg+0x83/0xb0 [ 895.037032] ? inet_recvmsg+0x4d0/0x4d0 [ 895.043468] ? sock_sendmsg+0xb5/0x100 [ 895.047440] ? SyS_sendto+0x1c7/0x2c0 [ 895.051244] ? SyS_getpeername+0x220/0x220 [ 895.055485] ? lock_downgrade+0x740/0x740 [ 895.059642] ? wait_for_completion_io+0x10/0x10 [ 895.064312] ? vfs_write+0x319/0x4d0 [ 895.068036] ? fput+0xb/0x140 [ 895.071151] ? SyS_write+0x14d/0x210 [ 895.075929] ? SyS_read+0x210/0x210 [ 895.079552] ? SyS_clock_settime+0x1a0/0x1a0 [ 895.084310] ? do_syscall_64+0x4c/0x640 [ 895.088280] ? SyS_getpeername+0x220/0x220 [ 895.092515] ? do_syscall_64+0x1d5/0x640 [ 895.096605] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 15:43:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) syz_init_net_socket$rose(0xb, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 895.196305] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 895.286033] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:16 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xc83, 0xa0001) getsockopt$nfc_llcp(r0, 0x118, 0x1, &(0x7f0000000040)=""/99, 0x63) r1 = socket$netlink(0x10, 0x3, 0x0) dup(r1) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/50, &(0x7f0000000100)=0x32) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x100, 0x0) 15:43:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x40}, @sack_perm, @window={0x3, 0x9}], 0x3) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x80000004, @private1={0xfc, 0x1, [], 0x4}, 0xffff462a}, 0x1c) listen(r0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{}, {0x0, 0xea60}}) sendto$inet6(r0, 0x0, 0x0, 0x240000c0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x40000000, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(r0, &(0x7f00000002c0)="a2b08ad3df1284b0c150e6c21e3c49fa1afc653b792dbf90f402da5c8f841155d7ff2738a4c0a0bf912cf2e8d64a0cfa73b8548c71e3d3bcfd88a66b0f36176361be055f836e1d63288206ad483bfb256bfecc1a8862a4736d17ea179567beaf79813df1def42a121fc2043f7ae04bd4ca752e2491808c081aeafd83145623000000000000a71cac7a80000000d4ba83ea", 0x91, 0x24000000, 0x0, 0x0) 15:43:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f00000000c0)=""/55) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000f00)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\r\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0xd70}}, 0x4001) sendto$inet6(r1, 0x0, 0x5f, 0x0, &(0x7f0000000000)={0xa, 0x4e29, 0x0, @private0={0xfc, 0x0, [], 0x1}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, r1}) 15:43:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, [], 0x1}}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x5, 0x0, [], [{0x8, 0x8, 0x22, 0x400, 0x8000, 0x9}, {0x4bc6, 0x9236, 0x2, 0x4, 0x9f3, 0x2}], [[], [], [], [], []]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0xc184, 0x0) move_pages(r2, 0x6, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil], &(0x7f00000000c0)=[0x0, 0x2, 0x7f, 0x3, 0x5, 0x8], &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20044054, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @private1={0xfc, 0x1, [], 0x1}}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) ioctl$sock_netdev_private(r3, 0x89f9, &(0x7f00000002c0)="7172d2b12a4008fa8aaa48a009b7f018fd81eed316d3f39b8099d1c7d033eeda8c0320f88d3ca30ce09d2d58a8d5e7c479e38f38b8cd4a8d84e45f1a42904c60ba193ddbc72bd26524f0a67d22132a25a7db23bafb881bca7147bf3712caa3a2e02a89cacb732b4128eb9281f9a655252b8a60f8071511cd004c555dae311a34dbfd32af287de1346e0ca6bd6b7bfbed86133411aee9516e96a5703e09b4ebbce044b7956e86497d7639b39817d9bd6c7423e8ab2f40e9866b0d028857d7b28c77f5384f878d426bcaec6b7c0920") setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x4040, 0x0, 0x0) 15:43:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendmsg$RDMA_NLDEV_CMD_RES_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x1409, 0x800, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x885}, 0x4801) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r3, 0xc0045520, &(0x7f0000000000)=0x1) 15:43:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) shmdt(0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) 15:43:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) lgetxattr(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)=@random={'security.', 'gid=forget'}, &(0x7f0000001840)=""/147, 0x93) syz_mount_image$udf(&(0x7f00000000c0)='udf\x00', &(0x7f0000000140)='\x00', 0x7ff, 0x7, &(0x7f0000001500)=[{&(0x7f0000000180)="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", 0xff, 0xe5}, {&(0x7f00000002c0)="3da5b68e8564bf577f19cbc85cf4c0aa5098bbc0c3b4f7af7e2ba5ce82c09a3d19aa6e64bce0d7c0f1323a26545ab0a96f76879e449cb80e0a7d7b1575f751fd", 0x40, 0x2}, {&(0x7f0000000300)="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", 0x1000, 0x8}, {&(0x7f0000001300)="4f0670b31c38b6ab1b40f81763be63d2e522a4e36d2f80dd529053c335", 0x1d, 0x4624c046}, {&(0x7f0000001340)="ff683e7e1b9fef78994ea12fbb2b6433575618245e74d36b2db88facbb4a37391ca4fcfe094df5b2943f863bbe8278d8df316a55f4975127b86e2224ef350f8f4abffed1b9174d9d53fe82917c1a17797804cbde07ef687dee31b90fb5b3886dfa7def428edd040918f1b5ca487362b6b23b445016656a71f7863e34bdd9650524d1cd0fc8439b066743c357d1678dee1aca94a27af4e0038bac05ff81dc0d17fb3dd0234b4e4b87942726c41dc98cf2e80efcb24636e4b8431c08ab40cf6103d65edfb05f44b02d7f48f57a", 0xcc, 0x9610}, {&(0x7f0000001440)="7262eaa06775c8e94df1354552b8a4e70d58b54906b31e5f539abf06d7351a459f92d6162b60ac9fcd5cd32769fd82883311f5d93728d544bdbebed3f30f7b74dc9eefe3d8df73fd39953c", 0x4b, 0x20}, {&(0x7f00000014c0)="324401176c3b4b0f6674fd9e6c8c9733ff9db2fb47d8d4e84dd53a86ac9d28e34324dbeed1a1a50590b8f8858b4338bd6842b6a550c6de8747", 0x39, 0x845}], 0xa20022, &(0x7f00000015c0)={[{@uid={'uid', 0x3d, 0xee00}}, {@uid_forget='uid=forget'}, {@gid_forget='gid=forget'}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@pcr={'pcr', 0x3d, 0xf}}]}) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r1, &(0x7f0000000000)="3a7021ed028b3b1cde1b1a9d77e1b110a6510dfa2b8cec43910a71b83cb79b571eff7979d4478790f7955943bcde5364885e013d0e", 0x35, 0x4040, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000001740)=0xe8) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e2, &(0x7f0000001780)={0x3, @bcast, r2}) [ 895.691462] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000040)={{0x3, 0x0, @reserved="24daf6b7e86d2ab5d0773dcbc5641960ff04814a9564e4f07751db5e13c9ff6d"}, 0x4a, 0x0, [], "ce3760782b2891c0c184df07dc52981df2038fe0a1699e712935a29e679d179187c4595dbd54ed833c47a69044b622b87d45f32ebe98b559293868ef1d960673dae6313372be3f7c0c11"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000)=0x2, 0x4) [ 895.795970] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:16 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 895.840947] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x44, 0x0, 0x8, 0x801, 0x0, 0x0, {0xc}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xfffffffe}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x4}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x88010) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00') 15:43:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f00000003c0)={0x0, 0x1, 0x3f}) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, &(0x7f00000001c0)) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f00000000c0)={0x5, 0x0, [{0xc0000001, 0x5, 0x1, 0x2, 0x8000, 0x802, 0x1}, {0xc0000001, 0x7, 0x5, 0x8, 0xfffffffa, 0x5}, {0x80000001, 0x9, 0x0, 0x9, 0xf4a, 0x2, 0x2}, {0x7, 0xffff, 0x2, 0x7, 0x3, 0x6, 0x1ff}, {0x40000000, 0x20, 0x0, 0x7, 0xffffbf8b, 0x2bab, 0x1bb4}]}) r3 = semget$private(0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000140)='gtp\x00') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/net\x00') sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000700)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000100000008000700", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x2c}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_G_PRIORITY(r8, 0x80045643, 0x1) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000340)={0x0, @private}, &(0x7f0000000380)=0xc) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, r5, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@GTPA_LINK={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4815}, 0x4044144) semctl$SEM_STAT(r3, 0x3, 0x12, &(0x7f0000000000)=""/146) 15:43:17 executing program 0: ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000000)={{0x2000, 0xf000, 0x4, 0x69, 0x80, 0x83, 0x6, 0x1f, 0x2b, 0x2b, 0x20, 0xa2}, {0x5000, 0x17001, 0x8, 0x2, 0x40, 0x2, 0x2, 0x5, 0x4, 0x85, 0x84, 0x7}, {0x100000, 0x1, 0xa, 0x3, 0x8, 0xe5, 0x3f, 0x1f, 0x5, 0x1, 0x62}, {0x1000, 0x2001, 0x8, 0x43, 0x2, 0x3, 0x3, 0x2, 0xe5, 0x3f, 0x8}, {0x1000, 0x1, 0xd, 0xff, 0x8, 0x0, 0x4, 0x20, 0xf7, 0x6, 0xbd, 0x1}, {0xf000, 0x4000, 0x4, 0x0, 0x3f, 0x0, 0x5, 0x81, 0x1, 0xf6, 0x1, 0x14}, {0x4000, 0x5000, 0xc, 0x1f, 0x1, 0x8, 0x0, 0x3f, 0x1f, 0x3, 0x7f, 0x9}, {0x4000, 0x10000, 0x0, 0xb5, 0x40, 0x9, 0x87, 0x40, 0x4, 0x20, 0x5, 0xe1}, {0x6000, 0x6}, {0x5000, 0x3}, 0x20010030, 0x0, 0x6000, 0x10080, 0xa, 0x4001, 0xd000, [0xffffffffffffff81, 0x1ff, 0x3, 0x7fffffff]}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) getuid() 15:43:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x2, 0x1c, 0x1d5, &(0x7f00000002c0)}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x3, 'veth0_macvtap\x00', {0x3}, 0x401}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000140)) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 896.221627] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 896.245254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=54 sclass=netlink_route_socket pid=4022 comm=syz-executor.2 [ 896.281771] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 896.302397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=54 sclass=netlink_route_socket pid=4027 comm=syz-executor.2 [ 896.316218] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) socket$l2tp6(0xa, 0x2, 0x73) 15:43:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4ea2, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 896.420529] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 896.483884] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) syz_init_net_socket$rose(0xb, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:43:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24000014, &(0x7f0000000000)={0xa, 0x100000004e22, 0xfffffffd, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfffffffe}, 0xfffffeb1) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f00000000c0)=@ccm_128={{0x303}, "ac417711dacfcf32", "77dd25b5601a129171ef44e30c4a7a9e", "2da397a9", "12e254a9ee38e8ef"}, 0x7d) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) prctl$PR_SET_DUMPABLE(0x4, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000003e00)='./file0\x00', 0x3) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240)='/dev/bsg\x00', 0x440000, 0x0) r5 = accept$inet(r4, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) [ 896.611552] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:17 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x8000, 0x0) 15:43:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) syz_init_net_socket$rose(0xb, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x64001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}, 0x5}, {0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffb}, 0xfffc, [0x8, 0x9, 0x3, 0x0, 0x3ff, 0x7fffffff, 0x3ffc000, 0x3f]}, 0x5c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000000c0)={r6, 0x2c, &(0x7f0000000000)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x38}}, @in6={0xa, 0x4e20, 0x0, @mcast2, 0x8000}]}, &(0x7f00000001c0)=0x10) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 897.178423] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) syz_init_net_socket$rose(0xb, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 897.310126] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 897.313537] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 897.470121] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 897.569698] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 897.650646] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 897.708515] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:18 executing program 0: ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f0000000040)={0xb1, 0x9, 0x4643, 0x1, 0x2, 0x2, 0x10001}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x240400, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0x0, @empty}}, 0x24) 15:43:18 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = semget$private(0x0, 0x0, 0x2) semctl$GETVAL(r0, 0x2, 0xc, &(0x7f0000000000)=""/157) 15:43:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={&(0x7f0000001740)={0x14, r1, 0x1}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @private2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) iopl(0x86) [ 897.799478] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @mcast1, 0xfffffffc}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r1, &(0x7f00000002c0)="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", 0x290, 0x4840, 0x0, 0x0) 15:43:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 898.095561] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f0000000000)={0x3}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x100, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x24000010) 15:43:19 executing program 2: socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cpuset\x00') getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x80, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @private1={0xfc, 0x1, [], 0x1}, 0x1ff}, @in6={0xa, 0x4e24, 0xd66, @mcast1, 0x7}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0xb}, 0x8}, @in6={0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00', 0x8}]}, &(0x7f0000000100)=0x10) 15:43:19 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$FBIO_WAITFORVSYNC(0xffffffffffffffff, 0x40044620, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000040)={0x4, 0xfffffff8}) 15:43:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000001c0)={0x4, 0x3, 0x3ff, 0x489, 0x7, "ce9b965c03fe78ea"}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000000)) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000140)={{0x6, 0x1}, 0x1, 0x5, 0xfffffffe, {0xcb, 0x2}, 0x5, 0x800}) 15:43:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r2 = dup(r1) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x100200, 0x0, 0x80000001, 0x7fff7fff, 0xfffffff9, 0x5, 0x4b5, 0xfffffffa, 0x7], 0xa, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f00000000c0)={0x80, "7b56fdfd8c4b985ee33c710815c40b9e3bc64095fe6d0530d97168a0e3bd8d3acbf571f63379daa7e020129df04fec8f23b08d62c0826571482b7b5f86911a460c7f1ed820d54bf6d2be3a6c6bc8ef207e2ee928c430b9c38454d8b01f7395cca3cb262514c925f2cc4b41d49943e4fcdf277637e531bd8ad95e3a031c4f33f205173af9f8be6ed715dc0098a19f466f64324f0182c035e2dbc84c15155f22af97d9d0e9d2f8931ccf9449316d68f8cceddb95555e3bf6c5046e43a06443d52c2e1e0cce3f8154f752ed2eb11db2b836e6262c742519c39d96d774196783cfd1eb3e5a1a81e3d5adc4ab3ce278c0042a71019f02b7841dc9f75e7d9d20975833d4b584e4f4ddf42d46380fade08cce47dc1c380c6c8416f9e08c7d1bd483565ba0eea16c4b0203aa7ea31e4c73b8b80947b28fba4ffe5ccccc918318caa0ddba4e5be84f4e9f4e18b1547cbac483962b7539b62bf0cd6dd5a61819e62d66d42e87d75fd30145a3f9302bc1718ff6708342af17b08f0037680e42f2a43b6d2fd4021eea9a8d9005763db4b686cc27f988222b16d53523554a221c2776957155f98d071eb3594b2bb2a13c7b75e09a271d08a7856844e05026639b418aa585882d16bf893b075d14d9a7d6739e238e834363016a2681adba37f0b2d78d8f02411b9c5e80f97535702fcbc81fdbab0ec5fd034712658dfd4ab26846dd296fb486ff"}) [ 898.198914] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 898.199259] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x5}, 0x4) [ 898.307113] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4142 comm=syz-executor.4 [ 898.341092] Unknown ioctl 19277 [ 898.347859] Unknown ioctl 19277 15:43:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:19 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x1002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xec, 0x4000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000080)={0x0, &(0x7f0000000040)=[&(0x7f0000000000)="d2", &(0x7f0000000880)="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"]}) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0xeae3, 0x80000) ioctl$DRM_IOCTL_MODE_SETGAMMA(r4, 0xc02064a5, &(0x7f0000000200)={0x2b93, 0x3, &(0x7f0000000140)=[0xb05, 0x1, 0x81], &(0x7f0000000180)=[0x0, 0x7, 0x6, 0x0, 0x6, 0x80, 0x1000, 0x5897, 0x0], &(0x7f00000001c0)=[0x401, 0x9, 0x95c3, 0x4, 0xf4, 0x3, 0x122, 0xa05]}) 15:43:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 899.093192] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4165 comm=syz-executor.4 15:43:20 executing program 2: getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0xc37, 0x5, 0x4}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={r0, 0x3, 0x5, 0x2, 0x8, 0x34}, &(0x7f00000000c0)=0x14) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f0000000100)) r2 = socket$netlink(0x10, 0x3, 0x0) dup(r2) r3 = dup(r1) r4 = syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='\x00', 0x2, 0x6, &(0x7f00000005c0)=[{&(0x7f00000001c0)="2d05e241edbaf5fef226eac61204315accac2ef0f98da874fa9153171750eeace6df99f99f2cdcc0d23cff6f6943fe75ef36c0ef70da4ff46c4a9409f079c2df6b8dad3cac2e651189711e26d41b06c96d258f0da4619afbca41d50c482c25b43627a619e54a1573efb47a0f4c7c92cff5a39b82250cd6962d7e1bc9b221a552145021bf31adac702ea213e6cf2ef83b4b988576", 0x94, 0xfff}, {&(0x7f0000000800)="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", 0x1000, 0x1b48000000}, {&(0x7f0000000280)="1c0eb4becc0cf95e09a7727c901078e90e6dfc43ccfc6c70e5697aecd3921844d398be6c3b867d1d887a2e4ae45d4cbc0f548266ef6d5433066bf39e6c05244338c9540480ca4618004ac051bad0d5630b3dfec7cdc6772d2f303d0b4230949d12d0f30d27f726683181ec261a48538c3eb03f998d1b7e77fd62736bea4324f861287b4d45c7eb14785bca698ef3a95f06d8cb8132406c428acd99acbaa169e22e892a9aadbd61146fd184840a9ac34b459aa329ac9f42532e12aa1c8ae74c3df0f63efc961ec9ab7100483519113ad1cd26a47f740300a34152cb97798732d4e039797d2536a26bc5b72239a23a45aa69b087e97dbf2bfa", 0xf8, 0xb07c}, {&(0x7f0000000380), 0x0, 0xffffffffffffff2f}, {&(0x7f00000003c0)="5d85aa4b5f85468067b71cf17bf9e68e8bc33b677ed57a9918b05de21f1cda38f7822897a47f336cfa639c567361a6cafa7bd1bc93f8e99ac7b5f9217dfd9dbf20e81f422bf78c9a0c1f7d1f98e343e4b5ed3fdfa8ce6e051ec29a2d63bd5f2fbc473fb84815aede656762eec8a744a21f42cabbe9710bd68c767d3af1902d50ad867c91ca2f1726dd56649b8a797e677b6c2a0767447ab3abe1448e44f5bed161e115e2d32e223a07679e0a4b9aee7796a162641b5101b6ea1d2d8ae9f1d95c1fa4d3c8e4d126ef6bf32785e99213c54d69a1483218493e6993077ce32c6945962c47e9325da784b24ee111", 0xec, 0x3}, {&(0x7f00000004c0)="16d5e0418daf51e5f1b71ba1b69891ed1055c785e351c3f515bc43ab7ae6353ddc185f85c99e4d3275612f41198cb0cc6893b89ec9a38cea592e84061f7afc841d767a1a4bc5b7f0ad251fd0be53be050ec35efe90d4fec32a707217b69c19052df7eac399946b2825921474545d9efcaddceb9a6b718ea803a84f90f148011ad776b450355b83efdc1d128ba2eedc521e3e5060792ac07ce92e8ffc3374f0be45e5ceafe26df656ae5bdc344e3dde7867062e11402bd81074cb4f37ef65fef4e5d5e1551a606f991ff771b437ca22df13a3b4df1c35611b90fe54db1c801806", 0xe0, 0x6}], 0x800002, &(0x7f0000000680)={[{@adaptive_mode='mode=adaptive'}, {@alloc_mode_reuse='alloc_mode=reuse'}], [{@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '.'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@subj_user={'subj_user', 0x3d, '@\'%-+,\''}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000001800)={r1, 0x9, 0x4, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000740)=""/157) ioctl$SNDCTL_TMR_STOP(0xffffffffffffffff, 0x5403) 15:43:20 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x7f, 0x4], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000080)={{0x1, 0x5, 0xd, 0xffffffff, 'syz0\x00', 0x1}, 0x1, [0x7, 0x4, 0x800, 0x7a7, 0x79, 0x1, 0x2, 0xb7, 0x7, 0x85f, 0xd355, 0x3f, 0x6c, 0x6, 0x9, 0x3, 0x7, 0x7f, 0x4, 0x5, 0x5, 0x3, 0x7, 0x8, 0xfffffffffffffffc, 0x44, 0x0, 0x6, 0x217, 0x35, 0x6, 0x1ff, 0x100000001, 0x0, 0x10001, 0x741a, 0x5, 0x5, 0xffffffff, 0xae, 0x3, 0x44b37336, 0x80000000, 0x1, 0x2, 0xc00000000000000, 0x6, 0x8001, 0x20, 0xaa20, 0x400, 0x2, 0x800, 0x0, 0x5, 0x4, 0x100, 0x9, 0x7, 0x2, 0x1b, 0x200, 0xb74, 0x52c, 0x9, 0x9, 0xfffffffffffffffb, 0x0, 0x401, 0x80000000, 0x44, 0x0, 0x7f, 0x4, 0x80000001, 0x8, 0x40, 0x3ff, 0x9, 0x8c1, 0x9, 0x1098000, 0x7, 0x0, 0x7fff, 0x10000, 0x3cd3, 0x2, 0x7, 0x4, 0xff, 0x80, 0x5, 0x2, 0xe68, 0x1, 0x4, 0xfffffffffffffff9, 0x1cf, 0xffffffff, 0x100000000, 0x4, 0x6, 0x507, 0x5, 0x2, 0x8, 0x8, 0x4, 0xb890, 0x400, 0x7, 0x80000000, 0x2d35, 0x4, 0x0, 0x40000000000, 0x5, 0x7ff, 0x0, 0x7, 0x4, 0x401, 0x0, 0x0, 0x3, 0x9, 0x8]}) 15:43:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendmsg$NL80211_CMD_SET_PMKSA(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x4c, 0x0, 0x401, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x101, 0x36}}}}, [@NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x4}, @NL80211_ATTR_PMKID={0x14, 0x55, "a0808e88ff1b137fe5d4f6acbad8acf1"}, @NL80211_ATTR_FILS_CACHE_ID={0x6}]}, 0x4c}}, 0x81) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000005c0)={"4e257cda10842ca32ab10e3dfea4ee7d", 0x0, 0x0, {0xffffffffffffffff, 0xc8f}, {0x0, 0x7fff}, 0xdd3f, [0x7fff, 0x60, 0x81, 0xbc, 0x10001, 0xfff, 0x7fff, 0x6, 0x36, 0xffff, 0x9, 0x5, 0x6, 0x9, 0x7, 0xd8]}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000880)={0x400, {{0xa, 0x4e22, 0x2, @rand_addr=' \x01\x00', 0x5}}, {{0xa, 0x4e20, 0x8000, @private0, 0x6}}}, 0x108) r5 = accept$ax25(0xffffffffffffffff, &(0x7f0000000440)={{0x3, @bcast}, [@default, @null, @bcast, @bcast, @default, @remote, @default, @null]}, &(0x7f0000000380)=0x48) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000004c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r5, 0xc0c89425, &(0x7f0000000780)={"ac4105995aa18efecb930983a5597894", r6, 0x0, {0x7, 0x1}, {0x1, 0x7}, 0x3, [0x7c, 0x200, 0x0, 0x6, 0x0, 0x2, 0x2, 0x2, 0x9, 0x3ff, 0xe7df, 0x7, 0x4, 0x7fffffff, 0x7, 0x6]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f00000006c0)={"5c3e43e60211573f3c8b00028e157743", r4, r6, {0x10000, 0x44}, {0x7, 0x5}, 0x5d, [0x5, 0x6, 0x4, 0xfe, 0x0, 0x8, 0x8, 0x4, 0x5, 0x1, 0x100, 0xf7, 0x3, 0x10001, 0x1ff, 0x78]}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r7 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000380)=[{&(0x7f0000000140)="ba9088128b526d431ba75f6f41", 0xd, 0x2}, {&(0x7f0000000180)="0fe19a2487d527fbbb121002bb6f01394f138e4756efc4c8692af9bf58319b8b5b52a4109981631df0b5cbfe77bdd1aec4e90b7038228d00e10d06fd3405a2595c6dae6bef98720203b0e01006c4c504f92779335668919b2a25516b19d972683ce956a622c105aafef402419fad6a4bd18d6594e2a527f943f837666f7eac051b373c4c18d2df", 0x87, 0xfffffffffffffffd}, {&(0x7f00000002c0)="2f0308bada209bc07116ae51aca0f3462703987d1457ba9a477eb4be0d8343e80ea5330892526320e6b37eca12b8e5b7457e5837056b3a424df135e39921568bc30b4416cdcbeb716957b3c96b64579d15528a094f61e7bbace8319ded0f2305b181951e5a93d65964eb4a4718e5af0994ebd6f425f325ea6ca35da59254a6998cbcb58d571cf5d494fd0e9a665f7d717979fa38bdf19d67b7844ecd25edf861052f191dfd73ca83e0eed30742d4c733c281a2a3df5ae235", 0xb8, 0x2}, {&(0x7f0000000500)="17fb604ae5b54ddb9703d9a45dd65857d6e2547ebe6595a7d2f1648232bfda945fdfe723e9901dd069b185be05b8881ba9359ae1c2d25dd9bf14efe6bf86ba5176e90192741fa8a126dcfa6e6c8b74d67a76e9a618465990380e1eba388fc3733c42cd929c58bb46290f74af7293d73c6a9295efa2978c59702e27badac8662d298c78cf44cb7fea059899c015e45f", 0x8f, 0x3f}], 0x2080020, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r1]) fsetxattr$security_ima(r7, &(0x7f0000000440)='security.ima\x00', &(0x7f0000000480)=@sha1={0x1, "63407dade871e86f2aed8cffed4fba45fa1de841"}, 0x15, 0x26c7ae3f171b8d0a) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 899.467572] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 899.587101] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x20d00, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000140)={0x2, 0x40}, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$char_usb(r5, &(0x7f0000000180)=""/41, 0x29) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$isdn(r6, &(0x7f0000000000)={0x22, 0x3f, 0x7, 0x4, 0x5}, 0x6) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 899.818344] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, r2) pkey_free(r2) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e26, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000000)={0x5b}, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x2, [0x0, 0x0]}, &(0x7f0000000240)=0xc) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x80002, 0x0) r3 = add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="4474aeafa8b0649af4168270d5e32be886cdb669ff8548cbded0a25d2cac7e52a5f9e11156f8123d5058e5a654d0", 0x2e, 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000001c0)={r3, 0x1000, 0x87}, 0x0, &(0x7f00000002c0)="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", &(0x7f00000012c0)=""/135) 15:43:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:21 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_OPER(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x168, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x80000001, 0x6a}}}}, [@NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x10}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x88be}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x600}, @NL80211_ATTR_FRAME={0x5b, 0x33, "946044111460502459afdd58271318dd37c589bee81d27329b5293578ff9629d72ecdcef6b721710b79a33c300b7c79a021e2e07319c4b624fdafa3afcaf15ee57ec72f491127ac703836c818100c325113e77583e63bd"}, @NL80211_ATTR_FRAME={0xb6, 0x33, "dd1b384bd906ef25161e3a80fc96cefb390b7d41088c7e4f7a5fe165233643185b637134127ab311c7ade52e491433feb3f4f90adb83669aa078190f0b6918fc20ac0f857cda1eda34e451eef1fd50632d13ac66d81465acf00ba7d0273f12f3531b3a758810672facce96c71e1bb1b6a78e5dbeb7f5ff3964a66d86a46879ca2c337bfef409c5ed88143b2e187274f9c9f17097f47ddf292223d989b8e325fbecb49cf2d1823c781826c6ca1fdc91d54c09"}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x9000}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x22f0}, @NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT={0x4}]}, 0x168}, 0x1, 0x0, 0x0, 0x4080}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0xa272) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000001c0)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r6}}]}, 0x28}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) dup(r7) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r7, 0x10e, 0x4, &(0x7f0000000200)=0x7, 0x4) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x200, 0x0) ioctl$TIOCSBRK(r8, 0x5427) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) fchown(0xffffffffffffffff, r6, r9) 15:43:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:21 executing program 4: ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000180)={0x7, 0x21, 0x2}, 0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x5, @dev={0xfe, 0x80, [], 0x37}, 0x5}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "d5b5fc8f385d646e", "0e98b0bf099f9b33ab108b1159189b44aa7f249d5f62d2c791e8f88f67ae024a", "695de4cd", "3cabc59849854f1c"}, 0x38) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_SETGAMMA(r3, 0xc02064a5, &(0x7f00000001c0)={0x4, 0x3, &(0x7f00000000c0)=[0x8, 0x16, 0x5], &(0x7f0000000140)=[0x9, 0x5, 0x8f24, 0x7, 0x2], &(0x7f0000000180)}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x4, 0x9, 0x5, 0x9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, 0x1, 0x1, 0x0, 0xffffffff}}) sendmsg$nl_route(r3, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c00007000ffdbdf251c0800010000000000000000", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000600050000000000000b04fb5ddf4598000316b6445d481e547cbc0b3317fba0f2835e3bdd341b96202ce1c380bb13b60a026368cdaaddbf909cd74ddb34b4c048540f07191826294445b2c9e0119e8b319e7d8cc3763bf54a6a498f56b6906bf1229b2c882fe3a92e4ae5e407a28edc73bf01a5bf79bb00c2f4ecd735cf945f835e1bbf59068099b225006413f2f9e235f526a601949fbecdb5d4f64719e4aa65756a99ed05ec5cac969a23b9bf1805c4032568a3f5def7577dd1247fb26b43e3f325b625c29e021006d5318e5ccffa306e"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x20004840) 15:43:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) sendto$inet6(r0, &(0x7f0000000900)="4951cdadbbe2fc39f88cadb90a365a5a941c9bf7fb26ab2afd3c2f5d4a7c55387630b917b6842d22cbaf9cbf365f06bbf80896c272eb353b90286cb121e89bf19c4728a88f692b7c105e990e113d0305441de6c293e78c2cba8f2c937761618e1396325156f1d6a5cb42e8c3e782543eb013d890eeeec643ccf089ed721ac749e79ae88e377db17c791e3f984a632eb8ba0b0e1458f2531733a3a62171e0f5d44aa2a95888a98a9a31b54418a01be37d803e88c01176cb425d2b8015d75f130bf8d2", 0xc2, 0x14, &(0x7f0000000000)={0xa, 0x4e23, 0xfffeffff, @private2={0xfc, 0x2, [], 0x1}}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$inet6(r3, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000140)="c9c9db50dc9f646771d7ab0aee703b52827b853dd3b867fe6bffc4d2294997fb2e2919d3aba105bd7e2c28b14d70a7f42a79637fa84e7002f4e4857ef15464feeb79188d9b581d353fc1a9d4cc0c21e00921cbd0ddb25c99b52b35792795665ffee090cfd4bc177bb3f2d3e53e6b1dde5e7165e342bba71c004689ed058cf9a1ccd867872034a0b204e59c677f675210106135c3bcd572c31a627bb959d5f4", 0x9f}, {&(0x7f00000002c0)="32df1d0e6ef95a3cb159b535f206199220465648d57c06ee32d80a9bb774dfb0ea0f93b60bc900cd8482b52fc30ba02d17e4feba38c6490ee075edd096b5dd62dc402b30977c0c00f8c429b5bd571c144d3a41e1e323d66ee9a2210df34856a2e16bc6775a7337be36a8c397b5662811127e7ea2b94f6eae97f321db0e864f9b6d2a8a67b105b7153741be829da504", 0x8f}, {&(0x7f0000000380)="d50427a7aa61b2c9e8d99ff88e6caf9d1a404ce8de1f4528a8c5a3eae3a9839438e3e81cb4bd991b51514b39ca2449f85aa59e937bd5adacee56fa68a139c957f44c35a70a6264242cdfcd6220fd274bf1759f35a3a6a93369c59fc2a39270308f04fc139ee4d40bfe40c709ca666101326aefb8a55ca3f2541e5a7bd8013351e01d96a59337006c07113779b955b6c85a9e1b1b0c", 0x95}, {&(0x7f0000000440)="1de64d8fef42015ce914cb586eaa097d5636c57a4bba1ac032317b0e1151041e8cd471225d53a473804821be9ee0390de1fa2e09ff4e1978712900c09eae68fa893c9fdae088c808b951603b1077f4e010266310ee8e578980118b4923331d7ab6294bd4ed86a9376b8ce06e77f9c707d81828cd292fd8b39f0a3bdd2e2159fd231ce8d265280aca662c73899c06cb8e285f656db4bef95f349c4b5af460c7878b8ca3cdb54f621d", 0xa8}, {&(0x7f0000000500)="0a933fa8d6f686522992ba0c75f8f90ab3d33213b194d3d3f8dc847ccf996277941a29259b87cdc48a3cbb200c88ad393bd447b8a1171f21d12b96373eb48e03a4e4dbd6cb88bb7e585c68d0080df7994997671d3ed824ef95eb1e39f98302ba1b61961c92341688196857ca219189c6cf3d0a1289e4a946d6db817ed796a4f596708d0a5df480a471b28f33c182ee427cfb503aee43d300489c209470c146a506aed087", 0xa4}, {}, {&(0x7f00000005c0)="cb975bbec41a600894faa90fd431033d06735643b9d7d45704a90b4b4cde2836cac7d5680208ed6e70bdf0bd956f44e277691994822d124c18c47a0b17643e754794d142c19faa48d3ae8f25ddc58d7ec63d7802edebba088b53e9629a13f3692279ec8561c75b20cb806658932b5696a650e1791fa1b41485fbfc8a34cc61648b229710e64a56b46052", 0x8a}, {&(0x7f00000000c0)="b8a734bf5058ef71caeef96d6209f26259ebf6748e91e452227e799187c42282241f9126c0c454439ea3ac", 0x2b}, {&(0x7f0000000200)="1da5871092136a2b6e23385ec20ac98557d4d92bacd8875a258d9d64b3121610caacb3113d3c82b041855d9af3147f5f7c4efc7c72e6e013df1893d5b3fbbd41ff7a4db99d53e8ef0e", 0x49}, {&(0x7f0000000680)="353b78a45ae3d1a1c28c2880708a1c890a121251e0d44e7cbe58c6a587bec7e8255c2335e0bc6f3b7cda3d471d8ac0a7cea87e9eeaec9f6f93fbefdb429442ccc0b4124db7abf145c63d4f4d22a2fcb0223cb3bfb589eeb41cd64fbe898d360fed26060912ad6e017a135ae47966d03f55e7d2597e816154866f59efecb5fdcfd66d831f187307318a6e5589c38470e75d7fee7a2dc5986c662d1f84f43bcbbe4ec0f5ee9696300e3b58923e54885db5bd22", 0xb2}], 0xa, &(0x7f0000000800)=[@dontfrag={{0x14, 0x29, 0x3e, 0xff}}, @dstopts_2292={{0x28, 0x29, 0x4, {0x5c, 0x1, [], [@generic={0x1f, 0x4, "8de5b852"}, @enc_lim={0x4, 0x1, 0x4}]}}}, @dstopts_2292={{0x40, 0x29, 0x4, {0x33, 0x4, [], [@enc_lim={0x4, 0x1, 0x81}, @hao={0xc9, 0x10, @private1}, @pad1, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x80000001}}], 0x98}, 0x4010) 15:43:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:21 executing program 3: ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:21 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x64aa00, 0x0) [ 900.610013] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 900.703650] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 900.783918] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:22 executing program 2: ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/181) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x50, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}]}, 0x50}}, 0x4d055) 15:43:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 901.050290] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x80) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f00000000c0)={@default, @bcast}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x401, 0x9, 0x9, 0x200, 0x2}}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 901.270118] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 901.367810] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:22 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000080)=0x6) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000040)={0x8, 0x1, 0xffff8001, 0x80, 0x0, "f155abd47011d605587e4a811105904f3478e1", 0x7, 0x9}) 15:43:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f0000000140)={{0x0, @loopback, 0x4e23, 0x2, 'none\x00', 0xb, 0x401, 0x80}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xe8a4, 0x4, 0x3}}, 0x44) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup(r5) r7 = fcntl$dupfd(r5, 0x0, r3) ioctl$TUNGETIFF(r7, 0x800454d2, &(0x7f0000000000)={'tunl0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f0000000000), 0x3e, 0x800, 0x0, 0x0) 15:43:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:22 executing program 2: ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0xfffffffc, @local}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f00000000c0)) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000040)={&(0x7f0000000000), 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r1, 0xc01064ac, &(0x7f0000000100)={r2, 0x65, &(0x7f0000000080)=""/101}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) 15:43:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r2, 0x1) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=r4, @ANYBLOB="e6f9025bdb66158ff2380300000100000000ab690ad8ebe3eeeda521dda524df9b59b8e9aba1ed6f87ed1303fb04425b4083b8982f140383928904523d411488a0e6f458316971371ea206cd959808761a416701aa284fd409b58d34eb46c7b975cb4d5a592106e1ad2f90c05230d868025f"], &(0x7f0000000000)=0x3e2) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=r4, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) fadvise64(r0, 0x7, 0xf31, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 902.204331] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x674, 0x0, 0x4, 0x70bd2b, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x8000, 0x62}}}}, [@NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_IE={0xf8, 0x2a, [@random={0x80, 0xf2, "9ae14ce44706d6751a99424b43de6f78c9a201a7ec31bccef9bc7a5132f73e6b37bac299b48d37b95ab57179c8bfa35b68045965ae89705f710816b0549c982bfff4aa501599cd97bb441ce5a92a8e32fb6860b41bea57a07604cccd884cc752e1452132924971a6a07ea690cb7ce4a0412073cf99028e198119b2ea9903dbf2c649fad47b31a18c6ec00d435aac193db04a5dfe76f6154c0f8f609bba164c1ea1f2c15eb03e39d99daf39df082c025277a262f513ebee40021f26eca11f7fdedba689e2abb73bea2143fc2110da5893bf2b7d4a4507a1329fb722d066a2c85f67e75e9b1014ade726fc4371ba093b853d4c"}]}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x3}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x7b27}, @NL80211_ATTR_IE={0x23c, 0x2a, [@random={0x9, 0xcf, "f67773e5567e7a5114b980d336db7442925c140106ecbb40556ae325f9ea9be454079845c528d2d07bc742cbcf9fc5fbb0cdbbad705fd24cc24f6910f86445d4b3e6d421b0da284d0ba7814c6b986b6c6fcb9f0e5a745e4ed317507eb549bb356fb78124898a773463ece595ce90a61951fefa791a0461b722e2a2f62e05ea41555d9e1188e5113668f15c297244d5b3da22c8a0c7e4ae25f80c6a4257ea316aed3702d37db79b4be584cfb6c70fd4d087a1055e60cc2ad7813f490f0a3558383c684f151f455f73a7aece330f9fc9"}, @random={0xe6, 0x34, "827d286ddcfeb783979fe02f0e472ee192f06429eee006db23762a8474337b0d7ab29244641552ca5f2c9f46c58813100278058a"}, @random={0x0, 0x20, "349cda78e00a0d94f93a63350f49e1b02dca485ff9c4e05dbd363b864e047ea8"}, @random={0x1, 0x5e, "2ad7f5e83d7d24b5074d98f75baad9b02a1cbabd4a3b4a1d7491e917fa160d9a1258a0876d0716eeaf80ca55bcb6700c54e9fdef3a7f3efcf1fc228f41fdd3e90cc8da6f59eb221b120cbe7bcef623af3a56ee2a36cdcc01f6df93808e24"}, @random={0x0, 0xad, "44d3bd239c0c64fd37a9a974fb5d2b1761686ff7e782a469892f1fdf7a7e1571851b3cd654302cb46e09dc83e052a3ce54c70ce459fcc7a9ecf1f570d4c0dd9b4bcf9bca609d5d67c1d1797dde4727360e9443dccb51d61ac711b62da39b1f1c2cfa906debeef8fe819a17c089c1aa24ea5a0cc4b6b572a7c12bb4caa856f19b3fa3d747f26b2f094e101d35452421e7d383e43610ab21a8b97338f29315692e80e8eec9ce35bd50cba5e3767e"}]}, @NL80211_ATTR_IE={0x2e0, 0x2a, [@random={0xff, 0xc9, "b69c322d12bd4dd58a502c6f6da18e59c357441a64ef4fa65254615b8142b563510f78b93fed5ee1c3cf99da8388dfb9bd6edd6175ce73333bf863212b10db11f51a0d9d60dfeb278f4714556ed3d4dc74198392fec38906ded17b1c7e5b3234ec30c017fcf737009e01d3a2630349234032a0f7137c4941c0968589527f92c19416bb952a7d3a51b90dd7ea728cb8d91efab8e9058d2686fbca8b9569954e30182a2dab06c45c52b09cd97720267282577b1c5f663c05c6c6242b614e97b95c1ffd6958f31e6aab8e"}, @random={0x0, 0x8b, "74186710b445a9efc7a92e3f2b7c7306b3d837acd3171686451ee3f7ad250e22e4e0132d52df20ff1c7d6beba8ff920043a6851d5be18f633024ba9048e9ea380ca6f2c85a69838a8fa47cea7009f0218c7a5db43004108b9ce2d046330c389aea175e66093feea68fc2c005046fc5bc7558d0794de365141edf754b252e6aacf7b55af5f8c1a2a0b5dddb"}, @random={0x9, 0xba, "7afa1233ba790bb9db7030dd2de2a63ef50be9aac9ae11bdee6c3e533e5f72e2726df1fbec74b4894c5fc38af64e15b9a115f744dc9c64dba284899aa7fdbdc2b0c39260c7c33e13094a8d43418f1476bc44d5540663a73f05ed016ceca27aa31259f6f2d8996a2a1a99afc2cbbe1fff02c4a75693973f459244d5ea23d643b4327152a310b09922ab1e72a3aa15481b147824ed314e57d4109a48452a4fde71811840d81e81b7942b756aa9b7ea9eb34ad3115436255bd88438"}, @random={0xff, 0xc6, "998dd9a0c2b130942bd7f4105f94c4db25b8440f1ac2d94976671bd30527343ffd3e7235a53684f4b0f33c087b8aa6f78a07a3bef33e01c16097beb403308049ee120d566b349d420f3eff3d3860cc4e738f3cbcc01d2d80a8966cd0051fb8db83844d36f177abda1cb4b32ee615ad65541c17848f9a4279d028572e00e0315d0c9a4a6f38b8179e0d2da5c046c98f940e7d451f7047f67a4e5b3e864b765b45a9f76a66f162461fa264001ec4e4d2ef7b7c2b18fdebafb06b57f53b5a51bcd17e400623f71f"}]}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x4}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x55}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x674}, 0x1, 0x0, 0x0, 0x84}, 0x4004040) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200)='NLBL_MGMT\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x80000001, @loopback, 0xffffffff}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x8000) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x80}, 0x4) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 902.277277] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 902.377037] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 902.430553] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:23 executing program 2: ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:23 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x5, 0xe0ab], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x60e}, 0x16, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x101) 15:43:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, &(0x7f00000000c0)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000002c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000200)={0x20e5, 0xcc8, 0xffff, 0xfff, 0x5, "4adeae240f28431ec8a09acf67dbb974a5e899"}) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x5}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000140)={'security\x00'}, &(0x7f00000001c0)=0x54) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "340c8100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 902.834997] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RREMOVE(r2, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000140)=0x4ac) 15:43:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000000)='batadv_slave_1\x00') bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000002c0)=""/102393, &(0x7f00000000c0)=0x18ff9) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "020200"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)="f544c3b18405000000000000009d0670e093e096a24496481f8f6da3f43fab93e8244f9e956f0eb123318e0e9fa6eaad1bfec15b27cacdd0cbc2e1b228a5982cbaefc935ca0a", 0x46, 0x4044, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) listen(r3, 0x4714) 15:43:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:24 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x40000, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x3, 0x8, 0x801, 0x0, 0x0, {0xa, 0x0, 0x6}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x4) ioctl$RAW_CHAR_CTRL_SETBIND(0xffffffffffffffff, 0xac00, &(0x7f0000000240)={0x1, 0x7, 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@bridge_delvlan={0x34, 0x71, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x4}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8, 0x1, 0x8}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x0) 15:43:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r2, 0x1) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=r4, @ANYBLOB="e6f9025bdb66158ff2380300000100000000ab690ad8ebe3eeeda521dda524df9b59b8e9aba1ed6f87ed1303fb04425b4083b8982f140383928904523d411488a0e6f458316971371ea206cd959808761a416701aa284fd409b58d34eb46c7b975cb4d5a592106e1ad2f90c05230d868025f"], &(0x7f0000000000)=0x3e2) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=r4, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) fadvise64(r0, 0x7, 0xf31, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:24 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x9e440, 0x5f6465493bb7cae6) clone(0x3a3dd40084848f01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40286608, &(0x7f0000000000)=0x202000000063) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f0000000140)={0x37, "3ee5ee13c378849f7bb4b6401f78941d80081dbb860103e2bdcbb01b5caf2702d385a5f42b17c832c1865e9e52ae4fb5e9e7602f9f2134ff5355428b84ab38c6cd219aaa1cf3e82e200ebf3fd1743fc1e8566d69cef63d009da952d83d0c3d4d070f7363d8ed09adc09db9ebea309fa415e9f87b6d33fafe0d208aa030fb139d"}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) connect$caif(r0, &(0x7f00000002c0)=@dgm={0x25, 0xffff}, 0x18) sendto$inet6(r3, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000200)={0x0, {0x2, 0x4e20, @loopback}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2c}}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x41, 0x0, 0x0, 0x0, 0xae4, &(0x7f00000000c0)='batadv0\x00', 0x256b, 0x8000, 0x7ff}) sendmsg$OSF_MSG_REMOVE(r1, &(0x7f0000001400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4001000}, 0xc, &(0x7f00000013c0)={&(0x7f0000000340)={0x1060, 0x1, 0x5, 0x401, 0x0, 0x0, {0x7, 0x0, 0x3}, [{{0x254, 0x1, {{0x0, 0x1}, 0xdb, 0x1, 0x2, 0xfff9, 0x28, 'syz1\x00', "34f94996caf45f210f2a7b3460aebbc4725ae588b3b118a02c1a2c3de33f8bfe", "f04a4273131b20299a47b8f9c33c96e135cf710e1ad1d9d5a3df03f90b60c509", [{0x200, 0xfe00, {0x3, 0x1f}}, {0x2, 0xfffa, {0x0, 0xffff0000}}, {0x40, 0x3, {0x3, 0x4}}, {0x5, 0x8, {0x1, 0x266}}, {0x3f, 0x1, {0x2, 0x80000000}}, {0x0, 0x5a0, {0x1, 0x3873}}, {0xfffe, 0x7f, {0x2, 0x8c7}}, {0x1f, 0x0, {0x0, 0x7}}, {0x2, 0x7fff, {0x1, 0x8}}, {0x9, 0x20, {0x2, 0x8}}, {0x3, 0xc2, {0x1, 0x4}}, {0x1, 0x1, {0x2, 0xfff}}, {0x3, 0x7, {0x0, 0x6}}, {0x90a, 0x8000, {0x2, 0xa4c0}}, {0x81, 0x25cd, {0x2, 0x3}}, {0x101, 0xffff, {0x3, 0x9}}, {0x81, 0x2, {0x0, 0x5}}, {0x1, 0x1, {0x3, 0x2c000000}}, {0x7, 0x3, {0x0, 0x1459fab4}}, {0x7, 0x401, {0x1}}, {0x307, 0x40, {0x2, 0x3}}, {0x2, 0xffa, {0x1, 0x7fff}}, {0x5, 0x7, {0x0, 0xfff}}, {0x8, 0x76, {0x2, 0xd412}}, {0x7f, 0x8, {0x0, 0x759}}, {0x6, 0x1ed, {0x1, 0x2}}, {0x9, 0x223, {0x3, 0x400}}, {0x25, 0x800, {0x0, 0x2}}, {0x8, 0xffff, {0x0, 0x67b6}}, {0x4, 0x1, {0x0, 0x2}}, {0x2, 0xfe1, {0x0, 0xf67}}, {0x8, 0x800, {0x1, 0x7}}, {0x7, 0xf4, {0x3}}, {0x7fff, 0x1, {0x0, 0x1}}, {0x800, 0x3f, {0x1, 0xcf}}, {0x1, 0x5, {0x1, 0x3}}, {0x3ff, 0x8, {0x3, 0x2}}, {0x2, 0x0, {0x1, 0x1}}, {0x2, 0x3, {0x3, 0x2}}, {0x20, 0x800, {0x1, 0x4}}]}}}, {{0x254, 0x1, {{0x0, 0x80000000}, 0xac, 0x13, 0x400, 0x2, 0x1a, 'syz0\x00', "4b893ad4994188c3e773a3696acef168e4aef9b3d34397b6d9ae40c7d8bfce34", "59eb9c91c2d8f8b8f53bbb235a4334541a9e4d17a606bcf277a06baedf657caf", [{0x5f, 0x8001, {0x2, 0x401}}, {0x0, 0x7d95, {0x3, 0x3}}, {0x2, 0x819, {0x3, 0x3}}, {0x4, 0x800, {0x3}}, {0xff80, 0xda7, {0x1, 0x4}}, {0x1, 0xfffc, {0x2, 0x3}}, {0x2, 0x1, {0x3, 0x9}}, {0x5, 0x1000, {0x1, 0x20000000}}, {0x91, 0x100, {0x0, 0xa2}}, {0xff, 0x3d, {0x2, 0x81}}, {0x80, 0x3f, {0x1, 0x3f}}, {0xff, 0x0, {0x2, 0x3ff}}, {0x3ff, 0x51e7, {0x0, 0x7415}}, {0x3, 0x8, {0x2, 0xdfd}}, {0x1ff, 0x6, {0x0, 0x1}}, {0x82, 0x2, {0x2, 0x1}}, {0x8, 0x5, {0x2, 0xfffffffc}}, {0x7f, 0xff, {0x0, 0x6}}, {0x8, 0x3, {0x2, 0x5}}, {0x6, 0x1, {0x2, 0xffff}}, {0x3, 0x32b2}, {0x800, 0x1f, {0x1, 0x7}}, {0x1, 0x800, {0x1, 0x101}}, {0x7, 0x7, {0x3, 0x7}}, {0x5, 0x3, {0x2, 0x8}}, {0x1, 0x9, {0x3, 0x9}}, {0x0, 0xfff, {0x0, 0x2}}, {0x1, 0x9, {0x0, 0x7fff}}, {0x1afc, 0x4, {0x2, 0x9}}, {0x100, 0x7ff, {0x1, 0x8}}, {0x3f, 0x0, {0x3, 0x248a}}, {0x0, 0xf801, {0x3, 0x1800}}, {0x100, 0x8, {0x1, 0x3}}, {0x0, 0x5, {0x2, 0x1f0}}, {0x80, 0x9, {0x3, 0x7fff}}, {0x6, 0xfffa, {0x1, 0xfffff704}}, {0x9070, 0x7, {0x3, 0x9}}, {0x7, 0x5, {0x3, 0x80}}, {0x400, 0x9, {0x2}}, {0x9, 0x3a, {0x0, 0x1010}}]}}}, {{0x254, 0x1, {{0x0, 0x7f}, 0x9, 0x3, 0xfaa5, 0xffc0, 0x10, 'syz0\x00', "458748eca9c39c637c25f859e24fd347590c5964b7c7388c2b0b89c8ebac66fe", "0f5e8af32c7a5e0aca571a0215678fa7c98a62b185a697721ec8af49731135ef", [{0x6, 0x2, {0x1, 0xd04}}, {0xf801, 0x3068, {0x2, 0x7f}}, {0xfff9, 0x9, {0x2, 0x4f5}}, {0x8, 0x2, {0x2, 0xa5e}}, {0x3, 0x4, {0x1, 0x3}}, {0x4, 0xb1, {0x0, 0x10000}}, {0x7feb, 0x7ff, {0x1, 0x7}}, {0x100, 0x167, {0x1}}, {0x9, 0x26b, {0x1, 0x9}}, {0x57, 0x1000, {0x3, 0x1}}, {0x0, 0x0, {0x2, 0x3}}, {0x3, 0x2, {0x0, 0x3}}, {0x400, 0x40, {0x2, 0xda7}}, {0xfff, 0x6, {0x2, 0x1}}, {0x7, 0x2a, {0x3, 0xffff}}, {0x25, 0x0, {0x3, 0x20}}, {0x8, 0x6, {0x1, 0x6}}, {0x5, 0x5, {0x1, 0x3}}, {0x9, 0x2, {0x2, 0x2}}, {0x7, 0x6, {0x2, 0x1}}, {0x8, 0x80, {0x3, 0x6}}, {0x4, 0x7a95, {0x0, 0x100}}, {0x80, 0x800, {0x7, 0x88}}, {0x9, 0x3f, {0x2, 0x8}}, {0x8, 0x7, {0x0, 0xa298}}, {0x8001, 0x8bf3, {0x1, 0x7}}, {0x2, 0x7, {0x0, 0x81}}, {0x9, 0x9, {0x2, 0x2}}, {0x20, 0x7ff, {0x1, 0x4}}, {0x3, 0xfff8, {0x3, 0x1f}}, {0x3, 0x7fff, {0x3, 0x80}}, {0xe33, 0x2, {0x3, 0x4}}, {0x1, 0xcce, {0x3, 0xe5}}, {0x8, 0x3, {0x0, 0x9}}, {0x7c04, 0x1ff, {0x2}}, {0x5, 0x7, {0x2, 0x3}}, {0xffff, 0x400, {0x3, 0x511f}}, {0x34f0, 0xff, {0x2, 0x9}}, {0x7, 0x8, {0x2, 0x4}}, {0x1, 0x20, {0x0, 0xaca3}}]}}}, {{0x254, 0x1, {{0x3, 0x200}, 0x8, 0x0, 0x7, 0xf001, 0x8, 'syz0\x00', "e58817f353ae8638304f36802febb9556781700e85d79213de03c21e6dd62251", "6989619f0b71b6d9abbd045c4e3929842431d0d77cd443316264ab7f76b166eb", [{0x7, 0xfffb, {0x3, 0x5}}, {0x8, 0x1, {0x1, 0x8}}, {0x8, 0x5, {0x3, 0x7f}}, {0x5, 0xb859, {0x2, 0x81}}, {0x2, 0x3ff, {0x1, 0x8}}, {0x9, 0x7, {0x0, 0x1}}, {0x4, 0x0, {0x2, 0xffffffff}}, {0x1, 0x8e05, {0x1, 0x3}}, {0x2, 0xfff, {0x1, 0x2}}, {0xfff, 0x2, {0x0, 0xffffffff}}, {0x20, 0x5, {0x3, 0x7}}, {0x6, 0x100, {0x0, 0xfffffe00}}, {0x7, 0x5, {0x3, 0x62ad}}, {0x6, 0x1, {0x3, 0x5d5c0000}}, {0xf800, 0x1, {0x1, 0x483d}}, {0x6, 0x96b, {0x0, 0x8}}, {0x7, 0x7f, {0x0, 0x8}}, {0x4, 0x5, {0x1, 0x8001}}, {0x507f, 0x8, {0x3, 0x9}}, {0x7ff, 0x1, {0x2, 0x2}}, {0x7f, 0x7, {0x1, 0xbfe1}}, {0x40, 0x401, {0x3, 0x8}}, {0x40, 0x5370, {0x3, 0x101}}, {0x3ff, 0x0, {0x0, 0x3f}}, {0x6, 0x5, {0x1, 0x10001}}, {0x2, 0x0, {0x2, 0x8}}, {0xfffc, 0x5, {0x2, 0x7}}, {0x401, 0x0, {0x3, 0x2}}, {0x200, 0x1, {0x1, 0x5}}, {0x1, 0x7, {0x0, 0x10d2}}, {0x5, 0x4, {0x0, 0x8001}}, {0x1000, 0x401, {0x0, 0x6}}, {0x5, 0x2, {0x0, 0xffffffff}}, {0x9, 0x1, {0x0, 0x1}}, {0x7c00, 0xff81, {0x3, 0xf129}}, {0x2, 0x4, {0x3, 0x3}}, {0x8, 0x9, {0x0, 0x1f}}, {0x8, 0x800, {0x0, 0x7}}, {0x9, 0x2, {0x2, 0x8}}, {0x5, 0xe9ee, {0x1, 0x2c}}]}}}, {{0x254, 0x1, {{0x2, 0x6}, 0x3f, 0x0, 0x21b, 0x3, 0x1e, 'syz0\x00', "f025986381c0581685b3c47354c34fc88c218c3e41a1a0248fa12b3aaea28033", "2eaf46ecb12123a86bb46f8faa93e509534dd33e4a1f0fc6a27d2740eae211b3", [{0x7f46, 0x1, {0x3, 0x4}}, {0x568a, 0xac1d, {0x2, 0x9}}, {0x4, 0x4, {0x2, 0x6}}, {0x200, 0x4b, {0x0, 0x9}}, {0x1, 0x7, {0x2, 0x10001}}, {0x0, 0x0, {0x2, 0x81}}, {0x0, 0x8001, {0x0, 0x7f}}, {0x7, 0x1000, {0x1, 0x1f}}, {0x29, 0xff, {0x1, 0xfffffff9}}, {0x6, 0x3, {0x3, 0xf8}}, {0x9, 0xbc, {0x1, 0x8}}, {0x4, 0x7ff, {0x0, 0x800}}, {0x6, 0x8, {0x0, 0x9}}, {0x400, 0x7, {0x3, 0x5}}, {0x40, 0x6, {0x0, 0x3f}}, {0x100, 0x8397, {0x1}}, {0x9, 0x200, {0x2, 0x800}}, {0x2, 0x8, {0x0, 0x8}}, {0xec, 0x7, {0x1, 0xa7}}, {0x0, 0x7, {0x1, 0x5}}, {0x108, 0x101}, {0x2, 0x7d8, {0x3, 0x7}}, {0x7, 0x3, {0x2, 0x8f}}, {0x5, 0x4, {0x1, 0xfffffffd}}, {0xd6, 0x7, {0x0, 0x6}}, {0x7, 0x4, {0x0, 0x1}}, {0x6, 0x8, {0x0, 0x9}}, {0x3, 0x1000, {0x3}}, {0x6, 0x9, {0x0, 0x297}}, {0x3ff, 0x101, {0x3, 0x1}}, {0x7, 0x8, {0x1, 0x80000001}}, {0xb4, 0x1, {0x0, 0x80000000}}, {0x8, 0x0, {0x3, 0xc4dd}}, {0x80, 0x5, {0x3, 0x9}}, {0x31b4, 0x101, {0x0, 0xe4}}, {0x9, 0x7, {0x1, 0x7}}, {0x8000, 0x8}, {0x7, 0x0, {0x1, 0x5}}, {0x9, 0x1, {0x0, 0xffffff7f}}, {0x0, 0x4, {0x3, 0x8}}]}}}, {{0x254, 0x1, {{0x1, 0x4}, 0x0, 0x2b, 0x5, 0x8, 0x1e, 'syz1\x00', "6c82087c625a0d872fb2a0c04a4aafff37a554a9fe3f7541966a6e45f92ec818", "9c74e0953187bd60aa4814accee59073dd20bef328b02329afecca5b684c3aea", [{0x800, 0x9, {0x1, 0x361}}, {0xa0, 0x1, {0x0, 0x3}}, {0x1, 0x8001, {0x2, 0xfb4}}, {0xe6, 0x100, {0x1, 0x7fff}}, {0x9, 0x7, {0x1, 0x6079}}, {0x7f, 0x5, {0x2, 0x1000}}, {0x0, 0x4, {0x2, 0x7e3}}, {0x9, 0x400, {0x3, 0x7}}, {0x0, 0x4, {0x0, 0xf85c}}, {0x81, 0x0, {0x3, 0x6}}, {0x80, 0x3f, {0x1, 0x5}}, {0xe8f, 0x8001, {0x2, 0x7fff}}, {0x4, 0x328, {0x0, 0xffff}}, {0xe7, 0xff, {0x2, 0x7}}, {0x3f, 0xfff, {0x1, 0x4}}, {0x9, 0x9, {0x2, 0x93f}}, {0x5, 0x0, {0x1, 0x7ff}}, {0x2, 0x0, {0x3, 0x1}}, {0x401, 0x7111, {0x0, 0x9}}, {0x3f, 0xffff, {0x1, 0xffff195d}}, {0x3, 0x39a2, {0x2, 0xb9d4}}, {0x1000, 0x7fff, {0x2, 0x7}}, {0x80, 0x0, {0x3, 0x10001}}, {0x1, 0x1, {0x1, 0x3}}, {0x8, 0x81, {0x3, 0x1}}, {0x4, 0xe180, {0x2}}, {0x0, 0x21b8, {0x0, 0x3f}}, {0x7f, 0x7f, {0x0, 0x1}}, {0x1, 0x20, {0x1, 0xb6}}, {0x200, 0x5, {0x0, 0x200000}}, {0x3, 0x9958, {0x1}}, {0x1ff, 0x2, {0x1, 0x400}}, {0x7, 0x800, {0x1, 0x101}}, {0x1, 0x80, {0x1, 0x7fffffff}}, {0xf8, 0x20, {0x0, 0x80000000}}, {0xff, 0x9c06, {0x2, 0x7}}, {0x0, 0x7, {0x0, 0xfc}}, {0x9, 0x6, {0x1, 0x7}}, {0x4, 0x4, {0x3, 0x6}}, {0x5, 0x2, {0x0, 0x7}}]}}}, {{0x254, 0x1, {{0x3, 0xdb9}, 0x6, 0xb0, 0x9, 0x200, 0xb, 'syz1\x00', "ba5dc7e1ef6780b7bdaf8ae37497667fc4c16b7d376e5461276b8cfa92104901", "003459a09dcb1b2637c6bda1567851cdf63cb751f05b2e02fd38df780a59f207", [{0x54, 0xff, {0x3, 0x3}}, {0x6cb5, 0x0, {0x1, 0x1cb6}}, {0x5, 0x8, {0x3}}, {0x6, 0x5, {0x2, 0x80}}, {0x8, 0x8, {0x2, 0xd989}}, {0x400, 0xe7, {0x2, 0x400}}, {0x7, 0x81, {0x3, 0x4}}, {0x5, 0xdfe, {0x0, 0x1}}, {0x4, 0x8, {0x3, 0x6}}, {0x4, 0x9, {0x2, 0x2}}, {0x46de, 0x9, {0x2, 0x8}}, {0x7, 0x4, {0x1, 0x7}}, {0x401, 0x2, {0x1, 0xc00000}}, {0x101, 0x1, {0x0, 0x7}}, {0x7fff, 0x4, {0x3, 0x1}}, {0xfeef, 0x7, {0x2, 0xffffffc0}}, {0x20, 0x8, {0x0, 0x5}}, {0x5, 0x2, {0xc6980e3116ef44a9, 0x9}}, {0xb1e, 0x0, {0x3, 0x1}}, {0xfff, 0xc0ee, {0x1, 0x101}}, {0x434, 0x8, {0x0, 0x9}}, {0x80, 0x2, {0x0, 0xee}}, {0x551, 0x3ff, {0x2, 0x80000001}}, {0x7ff, 0x8, {0x2, 0xa85}}, {0x1, 0x6589, {0x0, 0x3}}, {0x1, 0x101, {0x3, 0x6}}, {0x1, 0x4, {0x0, 0x7}}, {0xef0, 0x7fff, {0x3, 0x20}}, {0x790c, 0x9, {0x1, 0x5}}, {0x0, 0xfffb, {0x0, 0x5}}, {0x2, 0x2, {0x1, 0x3b31}}, {0x8, 0x3, {0x0, 0x7}}, {0x101, 0x5, {0x3, 0x9}}, {0x5, 0x80, {0x0, 0x2}}, {0x7, 0x4, {0x3, 0x70}}, {0x6, 0x800, {0x1, 0x576}}, {0x4, 0x9c3, {0x3, 0x2}}, {0xfffe, 0x0, {0x2, 0x1d13}}, {0xd4a, 0x1, {0x1, 0x5}}, {0x5, 0x7f, {0x1, 0xfff}}]}}}]}, 0x1060}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 903.611561] audit: type=1800 audit(1601653404.665:91): pid=4412 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=16035 res=0 [ 903.635508] EXT4-fs warning (device sda1): verify_group_input:131: Cannot add at group 99 (only 16 groups) 15:43:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 903.657287] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 903.730833] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=4420 comm=syz-executor.3 15:43:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x6e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "0000b500", '\x00', "20040100"}, 0x28) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendto$inet6(r2, &(0x7f00000000c0)="0e3093c1796b97f6bf5872d2e8b6a07c421148cd53fc", 0x16, 0xd5102bfd328aa490, 0x0, 0x0) [ 903.776481] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 903.788467] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/209) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000000)={0xf804, 0x1000}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 903.884905] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 903.962046] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=113 sclass=netlink_route_socket pid=4425 comm=syz-executor.0 [ 903.980653] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=4438 comm=syz-executor.0 [ 903.996324] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=113 sclass=netlink_route_socket pid=4433 comm=syz-executor.0 15:43:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x286200) connect(r1, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000001, 0x3}, 0x80) 15:43:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:25 executing program 0: socket$isdn(0x22, 0x3, 0x22) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) 15:43:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 904.185192] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 904.249082] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:25 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x400002, 0x0) 15:43:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 904.444413] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:25 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x100, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x103080, 0x0) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000080)={0x81, 0x13, [0x8, 0x7f, 0x8, 0x5, 0x6], 0x3}) 15:43:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 904.500559] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 904.545861] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 904.587492] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:25 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000000000)={0x3f, {{0xa, 0x4e21, 0x2, @remote, 0x4}}, {{0xa, 0x4e22, 0x6, @rand_addr=' \x01\x00'}}}, 0x108) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140), 0x10) 15:43:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x205) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 15:43:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) r2 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r2, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @empty=0xc301}, @in={0x2, 0x4e24, @local}, @rc={0x1f, @fixed={[], 0x10}}, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcfffffffffffffd}) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYRES16=r3, @ANYBLOB="080027010100fddbdf250800000006000b000300000014000500fe8000000000000000000000000000bb08000c000200000006000b001e000000080007000000000008000800ffffffff08000c00030000000800040003000000"], 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x400d4) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="000228bd7000fbdbdf2501000015"], 0x1c}}, 0x80) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x10}]}, 0x1c}}, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x4c, r3, 0x20, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_MGMT_A_DOMAIN={0xa, 0x1, '-^$*(\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010101}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2={0xfc, 0x2, [], 0x1}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}]}, 0x4c}, 0x1, 0x0, 0x0, 0x45}, 0x24000080) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r3, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x6, 0x1, '*\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0xd0) [ 905.142435] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x286200) connect(r1, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x20, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000001, 0x3}, 0x80) 15:43:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 905.256319] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 905.341150] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 905.439235] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 905.517781] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 905.601010] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 905.680938] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 905.752954] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:26 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000000)={0x7, 0x101}) 15:43:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0xfffffffe}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x32c41, 0x0) ioctl$USBDEVFS_DROP_PRIVILEGES(r2, 0x4004551e, &(0x7f0000000140)=0x8) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000240)=@gcm_256={{0x303}, "baf072c2b76434ec", "473ad7318433ef4355d5bc98649e934c0f2194994c145649d729cc5c0773e545", "06000003", "43a13e7d5fa81b7b"}, 0x38) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x4e21, @rand_addr=0x64010102}}, 0x0, 0x0, 0x3a, 0x0, "1f0d8ae21614cab64d43841d2845525b70a6a767cfc10ca5b909a96ab78166b0458301f1ab51fde300eda69eb045acd0e4805a1791b95882de1b6e9fc7e279e5641d9f27b487cb90d62c6c6f66c98701"}, 0xd8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x8, 0x6, 0x2d2d}, &(0x7f00000001c0)=0x10) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0xac, 0x0, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}]}, 0xac}}, 0x801) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) 15:43:27 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10100, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000140)=""/82) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r1, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:27 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) clock_gettime(0x0, &(0x7f0000000080)) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) msgget(0x1, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x4000000000000016, &(0x7f0000000640)) ptrace(0x4202, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) 15:43:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x20d00, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000140)={0x2, 0x40}, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$char_usb(r5, &(0x7f0000000180)=""/41, 0x29) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$isdn(r6, &(0x7f0000000000)={0x22, 0x3f, 0x7, 0x4, 0x5}, 0x6) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 906.143770] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x4040, 0x0, 0x0) [ 906.192644] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x4040, 0x0, 0x0) [ 906.249869] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:27 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x80040, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$input_event(r1, &(0x7f0000000040)={{0x77359400}, 0x1f, 0x5, 0x5}, 0x18) 15:43:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x4040, 0x0, 0x0) [ 906.305474] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:27 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x501000, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x101200, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000080)=0x2, 0x4) 15:43:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x0, 0x0, 0x0) [ 906.370108] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 906.446521] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0xc8, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x100, @mcast2, 0xd3}, @in6={0xa, 0x4e20, 0x10001, @mcast1, 0xfffffeff}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e24, 0x3, @remote, 0x8000}, @in6={0xa, 0x4e23, 0x3, @ipv4={[], [], @loopback}, 0x2}, @in6={0xa, 0x4e21, 0xc0000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, @in6={0xa, 0x4e20, 0x2, @empty, 0x9}, @in={0x2, 0x4e21, @broadcast}]}, &(0x7f00000000c0)=0x10) 15:43:28 executing program 0: getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x30, "dc5355d3dbb0623bb27645f9fd699aef40bd78206fe2e54813f5749aab426d512de0a36b4f342dbdda35d07fceacd8ad"}, &(0x7f0000000080)=0x38) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000000)='macvtap0\x00') 15:43:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x20d00, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000140)={0x2, 0x40}, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$char_usb(r5, &(0x7f0000000180)=""/41, 0x29) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$isdn(r6, &(0x7f0000000000)={0x22, 0x3f, 0x7, 0x4, 0x5}, 0x6) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000140)={0x2, 0x0, [], {0x0, @reserved}}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x0, 0x0, 0x0) [ 907.293953] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:28 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x1000, 0x1}) 15:43:28 executing program 0: ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f512, &(0x7f0000000080)) 15:43:28 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x189c81, 0x0) 15:43:28 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x80000) socket(0x2a, 0x2, 0xd287) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000040)={0x1, {{0x2, 0x4e20, @multicast1}}, 0x0, 0x4, [{{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e22, @broadcast}}]}, 0x290) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000300)={r0, 0x800, 0x81, "fc25926a536b8cdec1809030bd16bc199d07e360e777c73aff"}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0x4) 15:43:28 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x2, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x80, &(0x7f0000000280)="05d9cf2c09cb2ea0fb21bfbaa7aaa2cb8834a0c6c8ceda16392b7ac7757ca3529dd5e8698d373fab8bd3ebfcf73b484e50b2cde0f95c00948eca15baa2c4f8771058c2caa0919ea95e6392afe3c33a5cabdb0a1994ef7aa2b65ca5fade", 0x5d) socket$netlink(0x10, 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000100)={{0x4, 0x6, 0x732, 0xfff, 'syz0\x00'}, 0x4, 0x100, 0xff, 0x0, 0x4, 0x20, 'syz1\x00', &(0x7f00000000c0)=['/dev/ttyS3\x00', ']@(\x00', '/dev/vcs\x00', '!\x00'], 0x1a, [], [0x3, 0x8, 0x9, 0x5]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x50c81, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/vcs\x00', 0x1, 0x0) getsockopt$ax25_int(r0, 0x101, 0xa, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = memfd_create(&(0x7f0000000240)='!\x00', 0x2) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r2, 0x8008f511, &(0x7f0000000300)) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400000000000005) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000040)=0x7) 15:43:28 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x103200, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) 15:43:28 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000440)) socket$nl_route(0x10, 0x3, 0x0) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000400)={0x0, 0x0, 0xb, 0x6, 0x1cd, &(0x7f0000000000)="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"}) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/46}) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ubi_ctrl\x00', 0x581800, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000780)=ANY=[@ANYRES32=0x0, @ANYBLOB="74000000be49ac48ab96dfe071776815e8d550978a3bb83c51423913d6afdfd6b5b19bd1cab38cda37748e1e5e0d76c9d12fab7133c438a4ff198037941a0a72e9cb359cb364dc17126ba287d5e298c4933c74225ed51e04cbeaba11e3bff829a4fed92e1e24a09a3d53a3f621f318aa0d0e2336ea4c7e91"], &(0x7f0000000800)=0x7c) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000580)={&(0x7f0000000540)=[0x10000, 0x3f, 0xf445], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00000005c0)=0x4000) ioctl$SG_GET_NUM_WAITING(r5, 0x227d, &(0x7f0000000600)) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000480)=""/123, &(0x7f0000000500)=0x7b) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCL_UNBLANKSCREEN(r7, 0x541c, &(0x7f0000000700)) 15:43:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x0, 0x0, 0x0) 15:43:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x20d00, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000140)={0x2, 0x40}, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$char_usb(r5, &(0x7f0000000180)=""/41, 0x29) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$isdn(r6, &(0x7f0000000000)={0x22, 0x3f, 0x7, 0x4, 0x5}, 0x6) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:29 executing program 0: getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x54) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000100)={0x2f, 0x32, [], [@generic={0x1, 0xb9, "679839d387df4e2341649b24fff3f9b8ba95b057a8f78384ceac62d7121e2ef673a75602f15327f777669a850f4b215504e4a872086730497ceeaae8c156c8b98c653cf5f2a56d8bb800d8ea5e761b0d11daa249df9f555e078cc79ba3c26e9f5c0193812bea3c5a115f05a6272ff89ae33402e54bd30eb626d12aa12bfd0d9dfce93dc0ecff2144e4650e5ca8e0747b39679e5f1b505b8aadd73b7d7b037bef4abac8bb693fd5a6441617c5bd053f239bc5c8d20943227c6b"}, @jumbo, @hao={0xc9, 0x10, @private1={0xfc, 0x1, [], 0x1}}, @pad1, @generic={0x81, 0xa8, "5abcdf981323c3351e4a88f4b6eb2f9644a1948fb2e1e6270d358799f9253c27b465ecee9a721b6837a9f693ca59ce3ac78f65b3cefa9082c1fe2ebdfb30e1d17fb918619518937f23ca6735566335f905d2885dd964cac4fbfbe2264986d75e4db16aef8c49212c1d75cacb35e51a32f3eb4504ca50cc78466deb1dc9a7408a4ca3a3a7d8b5b5e2a7d50a94e98bd80944d6ddd9fd66a7a6277fe1e77e57a3702c7d9be721956943"}, @jumbo={0xc2, 0x4, 0x1}, @pad1, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x101}]}, 0x1a0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000000c0)=0x4) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) 15:43:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x6) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e26, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x0, 0x0, 0x0) 15:43:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x4030560b, &(0x7f0000000180)={0x10, 0x20, &(0x7f0000000140)="ceca689e36f0fd5502453ebeb55daf9892a456574d3c0f51693d2c32410117eca437001d9ac3fc49a3b5127d64921afd41b9b939b62defca", {0x2, 0x4, 0x20323159, 0x9, 0x3ff, 0xa60, 0x1, 0x8}}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r2, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 908.164745] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:43:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) dup(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB="2e0000bd", @ANYRES16=r2, @ANYBLOB="dd07000000000000000013000000"], 0x14}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r2, @ANYBLOB="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"], 0x19c}, 0x1, 0x0, 0x0, 0x200088a1}, 0x20008040) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup(r4) readv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000180)=""/71, 0x47}, {&(0x7f0000000280)=""/107, 0x6b}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f00000019c0)=""/159, 0x9f}, {&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000001a80)=""/143, 0x8f}, {&(0x7f0000000400)=""/40, 0x28}], 0x7) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_END_FF_UPLOAD(r5, 0x406855c9, &(0x7f0000000080)={0x9, 0x6, {0x55, 0x3, 0x5, {0x9, 0x8}, {0x2, 0x3}, @cond=[{0x1ff, 0x1000, 0x7, 0x5, 0x40}, {0x9, 0x2, 0x1, 0x81, 0x8, 0x5}]}, {0x53, 0xfbff, 0x8ca2, {0x6, 0x7}, {0xa, 0x40}, @cond=[{0x4, 0x7fff, 0x81, 0x2, 0x100, 0x2}, {0x400, 0x7, 0x6, 0x8, 0x2, 0x3}]}}) r6 = open(&(0x7f00000009c0)='./file0\x00', 0x400, 0x13) ioctl$KVM_GET_XSAVE(r6, 0x9000aea4, &(0x7f0000001b40)) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000040)={{r8}, 0xffffffffffffea4d, 0x4d0, 0x4b}) 15:43:29 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xf8) listen(0xffffffffffffffff, 0x1) syz_emit_ethernet(0x52, &(0x7f0000000080)={@local, @remote, @val={@val={0x9100, 0x5, 0x0, 0x1}}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000180)={{0x0, 0x2710}, {r0, r1/1000+60000}}, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000100)=0x4) 15:43:29 executing program 0: prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffa000/0x4000)=nil) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x268c0, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)="58ef38678809fb30745c7a29ea804a6171277206f90bc710fa657dc02b1f14b72baf6cbb7768b114f355a0eec815c767d5846eef75c9e60aff365e98864031fce3db5e9f22c8ab13cd8560145d744d1d") 15:43:29 executing program 0: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x32}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x5}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x6b}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x51}, 0x400c040) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x9a0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xffff}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x2400c880}, 0x10) 15:43:29 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x4301, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40400, 0x13) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000080)=""/170) 15:43:29 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x8000, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xd6d, 0x97c8, 0x0, 0x2, 0x14, "a529982246466afdd8dc7df4ea2d3e36ba5878"}) 15:43:29 executing program 4 (fault-call:3 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000007c00)='msdos\x00', &(0x7f0000007c40)='./file0\x00', 0x0, 0x0, &(0x7f0000007d00), 0x0, &(0x7f0000007d40)={[{@fat=@check_relaxed='check=relaxed'}]}) 15:43:29 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x145d43, 0x0) 15:43:29 executing program 2: syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000001c0)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r3}}]}, 0x28}}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r5, 0x0) setgroups(0x2, &(0x7f0000000080)=[r5, r5]) shmctl$IPC_SET(r0, 0x1, &(0x7f00000002c0)={{0x3, 0xee00, 0xee01, r3, r5, 0x88, 0x7ff}, 0x6, 0xcd9, 0x8, 0x3, 0x0, 0x0, 0x400}) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x10000, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r6, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000126bd7000fbdbdf25150000000a001a0008021100000000000a00060008021100000000000a001a00ffffffffffff00000a00060008021100000000000a00060008021100000000000a001a000802110000010000"], 0x5c}, 0x1, 0x0, 0x0, 0x4044800}, 0x20014000) acct(0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendto$inet(r8, &(0x7f0000000000)="11cbf1924d4eddc49fba5af5abe1eba12ffa9ec43e5057ba33456c748454ded713775bd3fbb32c16fab55c044ef2c55baf5b54179c826d90b05db36e1212ab4e03e9ca0e8f8e80409096f35ea29ea54823d6f10517a5163a260cf1f286e95052ee0a59e1527af7657de4eeb9bd887379ad319ef6f58cd6253cbbeda3adb34f3f2f897c1362cb6bfb9a63805a09b37d28b8594fbe9259d53d87e16365169b5197e04c6542f204f1d3129b5af6f4aaa1b2789026f24935e569c99e3cac86ad9ed05ec0ca293409", 0xc6, 0x4008801, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) [ 908.945390] FAULT_INJECTION: forcing a failure. [ 908.945390] name failslab, interval 1, probability 0, space 0, times 0 15:43:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f0000000000)=""/46, 0x2e}, &(0x7f00000000c0), 0x2c}, 0x20) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 909.025335] CPU: 1 PID: 4673 Comm: syz-executor.4 Not tainted 4.14.198-syzkaller #0 [ 909.033182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.042535] Call Trace: [ 909.045127] dump_stack+0x1b2/0x283 [ 909.048756] should_fail.cold+0x10a/0x154 [ 909.052902] should_failslab+0xd6/0x130 [ 909.056869] __kmalloc+0x2c1/0x400 [ 909.060403] ? SyS_memfd_create+0xbc/0x3c0 [ 909.064635] SyS_memfd_create+0xbc/0x3c0 [ 909.068781] ? shmem_fcntl+0x120/0x120 [ 909.072668] ? SyS_clock_settime+0x1a0/0x1a0 [ 909.077072] ? do_syscall_64+0x4c/0x640 [ 909.081041] ? shmem_fcntl+0x120/0x120 [ 909.085017] do_syscall_64+0x1d5/0x640 [ 909.089308] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 909.094501] RIP: 0033:0x45dd99 [ 909.097683] RSP: 002b:00007f6b831d1a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 909.105389] RAX: ffffffffffffffda RBX: 0000000020007d00 RCX: 000000000045dd99 [ 909.112656] RDX: 00007f6b831d1ae0 RSI: 0000000000000000 RDI: 00000000004c27c3 15:43:30 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000000040)={[{@ikeep='ikeep'}]}) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 909.120103] RBP: 0000000000000000 R08: 00007f6b831d1ad8 R09: 0000000000000000 [ 909.127471] R10: 00007f6b831d1adc R11: 0000000000000246 R12: 0000000000000000 [ 909.134762] R13: 0000000020007c40 R14: 0000000020007d00 R15: 0000000020007d40 15:43:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x0, 0x0, 0x0) [ 909.221023] FAULT_INJECTION: forcing a failure. [ 909.221023] name failslab, interval 1, probability 0, space 0, times 0 [ 909.240585] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 909.247967] CPU: 1 PID: 4686 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 909.258716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.268068] Call Trace: [ 909.270662] dump_stack+0x1b2/0x283 [ 909.274305] should_fail.cold+0x10a/0x154 [ 909.278466] should_failslab+0xd6/0x130 [ 909.282443] __kmalloc+0x2c1/0x400 [ 909.285982] ? SyS_memfd_create+0xbc/0x3c0 [ 909.290230] SyS_memfd_create+0xbc/0x3c0 [ 909.294295] ? shmem_fcntl+0x120/0x120 [ 909.298186] ? SyS_clock_settime+0x1a0/0x1a0 [ 909.302608] ? do_syscall_64+0x4c/0x640 [ 909.306593] ? shmem_fcntl+0x120/0x120 [ 909.310554] do_syscall_64+0x1d5/0x640 [ 909.314456] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 909.319652] RIP: 0033:0x45dd99 [ 909.322829] RSP: 002b:00007f717d9f8a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 909.330615] RAX: ffffffffffffffda RBX: 0000000020001480 RCX: 000000000045dd99 [ 909.337873] RDX: 00007f717d9f8ae0 RSI: 0000000000000000 RDI: 00000000004c27c3 [ 909.345398] RBP: 0000000000000000 R08: 00007f717d9f8ad8 R09: 0000000000000000 [ 909.352665] R10: 00007f717d9f8adc R11: 0000000000000246 R12: 0000000000000000 [ 909.359935] R13: 00000000200000c0 R14: 0000000020001480 R15: 0000000020000040 15:43:30 executing program 4 (fault-call:3 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000007c00)='msdos\x00', &(0x7f0000007c40)='./file0\x00', 0x0, 0x0, &(0x7f0000007d00), 0x0, &(0x7f0000007d40)={[{@fat=@check_relaxed='check=relaxed'}]}) [ 909.500379] FAULT_INJECTION: forcing a failure. [ 909.500379] name failslab, interval 1, probability 0, space 0, times 0 [ 909.525231] CPU: 1 PID: 4692 Comm: syz-executor.4 Not tainted 4.14.198-syzkaller #0 [ 909.533151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.543489] Call Trace: [ 909.546097] dump_stack+0x1b2/0x283 [ 909.549732] should_fail.cold+0x10a/0x154 [ 909.553884] should_failslab+0xd6/0x130 [ 909.557857] kmem_cache_alloc+0x28e/0x3c0 [ 909.562004] __d_alloc+0x2a/0xa20 [ 909.565459] ? lock_downgrade+0x740/0x740 [ 909.570224] __shmem_file_setup.part.0+0xcb/0x3c0 [ 909.575067] ? shmem_create+0x30/0x30 [ 909.578879] ? __alloc_fd+0x1be/0x490 [ 909.582687] SyS_memfd_create+0x1fc/0x3c0 [ 909.587009] ? shmem_fcntl+0x120/0x120 [ 909.590914] ? SyS_clock_settime+0x1a0/0x1a0 [ 909.595326] ? do_syscall_64+0x4c/0x640 [ 909.599300] ? shmem_fcntl+0x120/0x120 [ 909.603450] do_syscall_64+0x1d5/0x640 [ 909.607344] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 909.612555] RIP: 0033:0x45dd99 [ 909.615762] RSP: 002b:00007f6b831d1a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 909.623473] RAX: ffffffffffffffda RBX: 0000000020007d00 RCX: 000000000045dd99 [ 909.631992] RDX: 00007f6b831d1ae0 RSI: 0000000000000000 RDI: 00000000004c27c3 [ 909.639278] RBP: 0000000000000000 R08: 00007f6b831d1ad8 R09: 0000000000000000 15:43:30 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000000040)={[{@ikeep='ikeep'}]}) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 909.646551] R10: 00007f6b831d1adc R11: 0000000000000246 R12: 0000000000000000 [ 909.653825] R13: 0000000020007c40 R14: 0000000020007d00 R15: 0000000020007d40 [ 909.728968] FAULT_INJECTION: forcing a failure. [ 909.728968] name failslab, interval 1, probability 0, space 0, times 0 [ 909.740438] CPU: 0 PID: 4701 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 909.748260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.758306] Call Trace: [ 909.760919] dump_stack+0x1b2/0x283 [ 909.764558] should_fail.cold+0x10a/0x154 [ 909.768883] should_failslab+0xd6/0x130 [ 909.772856] kmem_cache_alloc+0x28e/0x3c0 [ 909.777015] __d_alloc+0x2a/0xa20 [ 909.780471] ? lock_downgrade+0x740/0x740 [ 909.784623] __shmem_file_setup.part.0+0xcb/0x3c0 [ 909.789471] ? shmem_create+0x30/0x30 [ 909.793268] ? __alloc_fd+0x1be/0x490 [ 909.797072] SyS_memfd_create+0x1fc/0x3c0 [ 909.801219] ? shmem_fcntl+0x120/0x120 [ 909.805101] ? SyS_clock_settime+0x1a0/0x1a0 [ 909.809505] ? do_syscall_64+0x4c/0x640 [ 909.813480] ? shmem_fcntl+0x120/0x120 [ 909.817368] do_syscall_64+0x1d5/0x640 [ 909.821284] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 909.826465] RIP: 0033:0x45dd99 15:43:30 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000000040)={[{@ikeep='ikeep'}]}) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 909.829644] RSP: 002b:00007f717d9f8a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 909.837354] RAX: ffffffffffffffda RBX: 0000000020001480 RCX: 000000000045dd99 [ 909.844617] RDX: 00007f717d9f8ae0 RSI: 0000000000000000 RDI: 00000000004c27c3 [ 909.851880] RBP: 0000000000000000 R08: 00007f717d9f8ad8 R09: 0000000000000000 [ 909.859144] R10: 00007f717d9f8adc R11: 0000000000000246 R12: 0000000000000000 [ 909.866405] R13: 00000000200000c0 R14: 0000000020001480 R15: 0000000020000040 15:43:30 executing program 0: syz_emit_ethernet(0xf5, &(0x7f0000000140)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @empty, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x1, 0xf, 0xe7, 0x64, 0x0, 0x2, 0x3d, 0x0, @loopback, @private=0xa010101, {[@noop]}}, "57ef996c7d63f3bebd8fbe319e0e8320c02f05441555b594a4d791b5b737b78059fccbd6de4a7d127764cf2f4f8529e0826ebdf43f3b177f7d6f6ddc6caa49260f01685277cf83745ac52bfd7cc4c03cd72d1c125d8b89b1ca00c6af0730c9cee0819b3b8b3c2b041995657da6787d8dacf48c5713800d41c585c4ccca45c765b8ae8d38e9fc771d4150d363c4ca99af7718eef282bfc1049573aa90f70ff54cf27efcfa6f2e9e7d83cdb9ea964057217be6efa18208c727a6b1d7379a1291224783badc391ce1697b02710ef7065e"}}}}, &(0x7f0000000100)={0x1, 0x2, [0x298, 0x7d5, 0x511, 0x8a7]}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) 15:43:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) r2 = accept4(r0, &(0x7f0000000840)=@can, &(0x7f00000008c0)=0x80, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000900)=0x9, 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) 15:43:31 executing program 4 (fault-call:3 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000007c00)='msdos\x00', &(0x7f0000007c40)='./file0\x00', 0x0, 0x0, &(0x7f0000007d00), 0x0, &(0x7f0000007d40)={[{@fat=@check_relaxed='check=relaxed'}]}) [ 909.958507] FAULT_INJECTION: forcing a failure. [ 909.958507] name failslab, interval 1, probability 0, space 0, times 0 [ 910.003907] CPU: 0 PID: 4707 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 910.011734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 910.021089] Call Trace: [ 910.023701] dump_stack+0x1b2/0x283 [ 910.027333] should_fail.cold+0x10a/0x154 [ 910.031484] should_failslab+0xd6/0x130 [ 910.035458] kmem_cache_alloc+0x28e/0x3c0 [ 910.037266] FAULT_INJECTION: forcing a failure. [ 910.037266] name failslab, interval 1, probability 0, space 0, times 0 [ 910.039607] ? shmem_destroy_callback+0xa0/0xa0 [ 910.039619] shmem_alloc_inode+0x18/0x40 [ 910.039629] ? shmem_destroy_callback+0xa0/0xa0 [ 910.039638] alloc_inode+0x5d/0x170 [ 910.039654] new_inode+0x1d/0xf0 [ 910.071138] shmem_get_inode+0x8b/0x890 [ 910.075120] __shmem_file_setup.part.0+0x104/0x3c0 [ 910.080045] ? shmem_create+0x30/0x30 [ 910.083841] ? __alloc_fd+0x1be/0x490 [ 910.087646] SyS_memfd_create+0x1fc/0x3c0 [ 910.091791] ? shmem_fcntl+0x120/0x120 [ 910.095676] ? SyS_clock_settime+0x1a0/0x1a0 [ 910.100077] ? do_syscall_64+0x4c/0x640 [ 910.104055] ? shmem_fcntl+0x120/0x120 [ 910.107941] do_syscall_64+0x1d5/0x640 [ 910.111825] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 910.117010] RIP: 0033:0x45dd99 [ 910.120189] RSP: 002b:00007f717d9f8a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 910.127892] RAX: ffffffffffffffda RBX: 0000000020001480 RCX: 000000000045dd99 [ 910.135194] RDX: 00007f717d9f8ae0 RSI: 0000000000000000 RDI: 00000000004c27c3 [ 910.142480] RBP: 0000000000000000 R08: 00007f717d9f8ad8 R09: 0000000000000000 15:43:31 executing program 1 (fault-call:7 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 910.149763] R10: 00007f717d9f8adc R11: 0000000000000246 R12: 0000000000000000 [ 910.157029] R13: 00000000200000c0 R14: 0000000020001480 R15: 0000000020000040 [ 910.182652] CPU: 1 PID: 4712 Comm: syz-executor.4 Not tainted 4.14.198-syzkaller #0 [ 910.190475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 910.199832] Call Trace: [ 910.202421] dump_stack+0x1b2/0x283 [ 910.206055] should_fail.cold+0x10a/0x154 [ 910.210205] should_failslab+0xd6/0x130 [ 910.214181] kmem_cache_alloc+0x28e/0x3c0 [ 910.218352] ? shmem_destroy_callback+0xa0/0xa0 [ 910.223025] shmem_alloc_inode+0x18/0x40 [ 910.227082] ? shmem_destroy_callback+0xa0/0xa0 [ 910.231746] alloc_inode+0x5d/0x170 [ 910.235370] new_inode+0x1d/0xf0 [ 910.238733] shmem_get_inode+0x8b/0x890 [ 910.242709] __shmem_file_setup.part.0+0x104/0x3c0 [ 910.247638] ? shmem_create+0x30/0x30 [ 910.251436] ? __alloc_fd+0x1be/0x490 [ 910.255242] SyS_memfd_create+0x1fc/0x3c0 [ 910.259390] ? shmem_fcntl+0x120/0x120 [ 910.263303] ? SyS_clock_settime+0x1a0/0x1a0 [ 910.267728] ? do_syscall_64+0x4c/0x640 [ 910.271733] ? shmem_fcntl+0x120/0x120 [ 910.275624] do_syscall_64+0x1d5/0x640 [ 910.279522] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 910.284705] RIP: 0033:0x45dd99 [ 910.287884] RSP: 002b:00007f6b831d1a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 910.295616] RAX: ffffffffffffffda RBX: 0000000020007d00 RCX: 000000000045dd99 15:43:31 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$CHAR_RAW_IOOPT(r0, 0x1279, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(0xffffffffffffffff, 0xc01864ba, &(0x7f0000000000)={0xff, 0x4, 0x7fff, 0xeeeeeeee}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x101203, 0x0) 15:43:31 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000000040)={[{@ikeep='ikeep'}]}) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:43:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x400) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "467e0ebc3d210eda", "45aaf72be7b60ccc8a9e86b89a162a9e9aa4019b7871704ce8392c59400fde2a", "904c66cc", "d8a81d480436cd42"}, 0x38) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) dup(r3) sendfile(r3, r0, &(0x7f0000000080)=0x1, 0x3000000000) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RLERROR(r4, &(0x7f0000000180)={0x16, 0x7, 0x1, {0xd, 'rdma.current\x00'}}, 0x16) fcntl$setflags(r2, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 910.302886] RDX: 00007f6b831d1ae0 RSI: 0000000000000000 RDI: 00000000004c27c3 [ 910.310162] RBP: 0000000000000000 R08: 00007f6b831d1ad8 R09: 0000000000000000 [ 910.317430] R10: 00007f6b831d1adc R11: 0000000000000246 R12: 0000000000000000 [ 910.324693] R13: 0000000020007c40 R14: 0000000020007d00 R15: 0000000020007d40 [ 910.369715] FAULT_INJECTION: forcing a failure. [ 910.369715] name failslab, interval 1, probability 0, space 0, times 0 [ 910.392402] CPU: 0 PID: 4731 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 910.400277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 910.409631] Call Trace: [ 910.412220] dump_stack+0x1b2/0x283 [ 910.415855] should_fail.cold+0x10a/0x154 [ 910.420006] should_failslab+0xd6/0x130 [ 910.423981] kmem_cache_alloc+0x28e/0x3c0 [ 910.428162] selinux_inode_alloc_security+0xb1/0x2a0 [ 910.433277] security_inode_alloc+0x8d/0xd0 [ 910.437601] inode_init_always+0x576/0xb10 [ 910.441844] alloc_inode+0x7a/0x170 [ 910.445472] new_inode+0x1d/0xf0 [ 910.448864] shmem_get_inode+0x8b/0x890 [ 910.452929] __shmem_file_setup.part.0+0x104/0x3c0 [ 910.457869] ? shmem_create+0x30/0x30 [ 910.461671] ? __alloc_fd+0x1be/0x490 [ 910.465478] SyS_memfd_create+0x1fc/0x3c0 [ 910.469630] ? shmem_fcntl+0x120/0x120 [ 910.473516] ? SyS_clock_settime+0x1a0/0x1a0 [ 910.477944] ? do_syscall_64+0x4c/0x640 [ 910.481927] ? shmem_fcntl+0x120/0x120 [ 910.485817] do_syscall_64+0x1d5/0x640 [ 910.489709] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 910.494896] RIP: 0033:0x45dd99 [ 910.498088] RSP: 002b:00007f717d9f8a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 910.505824] RAX: ffffffffffffffda RBX: 0000000020001480 RCX: 000000000045dd99 [ 910.513090] RDX: 00007f717d9f8ae0 RSI: 0000000000000000 RDI: 00000000004c27c3 15:43:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004044, &(0x7f0000000000)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}}) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, r2, &(0x7f00000000c0)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', '\x00', 0x20, 0x1d}, 0x2b, r4) 15:43:31 executing program 4 (fault-call:3 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000007c00)='msdos\x00', &(0x7f0000007c40)='./file0\x00', 0x0, 0x0, &(0x7f0000007d00), 0x0, &(0x7f0000007d40)={[{@fat=@check_relaxed='check=relaxed'}]}) [ 910.520357] RBP: 0000000000000000 R08: 00007f717d9f8ad8 R09: 0000000000000000 [ 910.527646] R10: 00007f717d9f8adc R11: 0000000000000246 R12: 0000000000000000 [ 910.534911] R13: 00000000200000c0 R14: 0000000020001480 R15: 0000000020000040 15:43:31 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000000040)={[{@ikeep='ikeep'}]}) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 910.612604] FAULT_INJECTION: forcing a failure. [ 910.612604] name failslab, interval 1, probability 0, space 0, times 0 [ 910.635961] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 910.654554] CPU: 1 PID: 4739 Comm: syz-executor.4 Not tainted 4.14.198-syzkaller #0 [ 910.662374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 910.671727] Call Trace: [ 910.674318] dump_stack+0x1b2/0x283 [ 910.677972] should_fail.cold+0x10a/0x154 [ 910.682147] should_failslab+0xd6/0x130 [ 910.686124] kmem_cache_alloc+0x28e/0x3c0 [ 910.690281] selinux_inode_alloc_security+0xb1/0x2a0 [ 910.695386] security_inode_alloc+0x8d/0xd0 [ 910.696048] FAULT_INJECTION: forcing a failure. [ 910.696048] name failslab, interval 1, probability 0, space 0, times 0 [ 910.699705] inode_init_always+0x576/0xb10 [ 910.699717] alloc_inode+0x7a/0x170 [ 910.699726] new_inode+0x1d/0xf0 [ 910.699744] shmem_get_inode+0x8b/0x890 [ 910.726093] __shmem_file_setup.part.0+0x104/0x3c0 [ 910.731024] ? shmem_create+0x30/0x30 [ 910.734823] ? __alloc_fd+0x1be/0x490 [ 910.738627] SyS_memfd_create+0x1fc/0x3c0 [ 910.742765] ? shmem_fcntl+0x120/0x120 [ 910.746641] ? SyS_clock_settime+0x1a0/0x1a0 [ 910.751037] ? do_syscall_64+0x4c/0x640 [ 910.754999] ? shmem_fcntl+0x120/0x120 [ 910.758881] do_syscall_64+0x1d5/0x640 [ 910.762769] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 910.767944] RIP: 0033:0x45dd99 [ 910.771120] RSP: 002b:00007f6b831d1a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 910.778844] RAX: ffffffffffffffda RBX: 0000000020007d00 RCX: 000000000045dd99 [ 910.786124] RDX: 00007f6b831d1ae0 RSI: 0000000000000000 RDI: 00000000004c27c3 [ 910.793381] RBP: 0000000000000000 R08: 00007f6b831d1ad8 R09: 0000000000000000 [ 910.800656] R10: 00007f6b831d1adc R11: 0000000000000246 R12: 0000000000000000 [ 910.807911] R13: 0000000020007c40 R14: 0000000020007d00 R15: 0000000020007d40 [ 910.815185] CPU: 0 PID: 4745 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 910.822985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 910.832368] Call Trace: [ 910.834964] dump_stack+0x1b2/0x283 [ 910.838598] should_fail.cold+0x10a/0x154 [ 910.842756] should_failslab+0xd6/0x130 [ 910.846742] kmem_cache_alloc+0x28e/0x3c0 [ 910.850901] get_empty_filp+0x86/0x3e0 [ 910.854803] alloc_file+0x23/0x440 [ 910.858350] __shmem_file_setup.part.0+0x198/0x3c0 [ 910.863296] ? shmem_create+0x30/0x30 [ 910.867100] ? __alloc_fd+0x1be/0x490 [ 910.870911] SyS_memfd_create+0x1fc/0x3c0 [ 910.875076] ? shmem_fcntl+0x120/0x120 [ 910.878964] ? SyS_clock_settime+0x1a0/0x1a0 [ 910.883370] ? do_syscall_64+0x4c/0x640 [ 910.887346] ? shmem_fcntl+0x120/0x120 [ 910.891265] do_syscall_64+0x1d5/0x640 [ 910.895158] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 910.900342] RIP: 0033:0x45dd99 [ 910.903525] RSP: 002b:00007f717d9f8a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 910.911228] RAX: ffffffffffffffda RBX: 0000000020001480 RCX: 000000000045dd99 [ 910.918492] RDX: 00007f717d9f8ae0 RSI: 0000000000000000 RDI: 00000000004c27c3 [ 910.925756] RBP: 0000000000000000 R08: 00007f717d9f8ad8 R09: 0000000000000000 [ 910.933020] R10: 00007f717d9f8adc R11: 0000000000000246 R12: 0000000000000000 [ 910.940286] R13: 00000000200000c0 R14: 0000000020001480 R15: 0000000020000040 [ 910.950252] ================================================================== [ 910.957905] BUG: KASAN: use-after-free in tls_write_space+0x238/0x2d0 [ 910.964481] Read of size 1 at addr ffff8880a0d42b70 by task syz-executor.1/4737 [ 910.971912] [ 910.973539] CPU: 0 PID: 4737 Comm: syz-executor.1 Not tainted 4.14.198-syzkaller #0 [ 910.981322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 910.990691] Call Trace: [ 910.993281] dump_stack+0x1b2/0x283 [ 910.996908] print_address_description.cold+0x54/0x1d3 [ 911.002206] kasan_report_error.cold+0x8a/0x194 [ 911.006875] ? tls_write_space+0x238/0x2d0 [ 911.011125] __asan_report_load1_noabort+0x68/0x70 [ 911.016067] ? tls_write_space+0x238/0x2d0 [ 911.020297] tls_write_space+0x238/0x2d0 [ 911.024355] tcp_check_space+0x395/0x640 [ 911.028413] tcp_rcv_established+0x727/0x17a0 [ 911.032994] ? rt6_check_expired+0xa0/0x160 [ 911.037314] ? tcp_data_queue+0x3ac0/0x3ac0 [ 911.041625] ? rt6_check+0x15a/0x250 [ 911.045340] tcp_v6_do_rcv+0xc60/0x1190 [ 911.049312] __release_sock+0x12a/0x350 [ 911.053287] release_sock+0x54/0x1b0 [ 911.056996] tls_sk_proto_close+0x575/0x8b0 [ 911.061317] ? locks_remove_posix+0x242/0x4b0 [ 911.065805] ? tcp_check_oom+0x440/0x440 [ 911.069865] ? tls_write_space+0x2d0/0x2d0 [ 911.074162] ? ip_mc_drop_socket+0x16/0x220 [ 911.078483] inet_release+0xdf/0x1b0 [ 911.082246] inet6_release+0x4c/0x70 [ 911.085963] __sock_release+0xcd/0x2b0 [ 911.089846] ? __sock_release+0x2b0/0x2b0 [ 911.093987] sock_close+0x15/0x20 [ 911.097432] __fput+0x25f/0x7a0 [ 911.100710] task_work_run+0x11f/0x190 [ 911.104598] exit_to_usermode_loop+0x1ad/0x200 [ 911.109178] do_syscall_64+0x4a3/0x640 [ 911.113063] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 911.118245] RIP: 0033:0x4176f1 [ 911.121425] RSP: 002b:00007ffcc687f9c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 911.129129] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004176f1 [ 911.136392] RDX: 0000001b31b20000 RSI: 000000000000086e RDI: 0000000000000003 [ 911.143652] RBP: 0000000000000001 R08: 00000000216a486e R09: 00000000216a4872 [ 911.150912] R10: 00007ffcc687fab0 R11: 0000000000000293 R12: 000000000118c9a0 [ 911.158201] R13: 000000000118c9a0 R14: ffffffffffffffff R15: 000000000118bf2c [ 911.165477] [ 911.167097] Allocated by task 4741: [ 911.170722] kasan_kmalloc+0xeb/0x160 [ 911.174521] kmem_cache_alloc_trace+0x131/0x3d0 [ 911.179185] tls_init+0xb1/0x4e0 [ 911.182571] tcp_set_ulp+0x18f/0x4b6 [ 911.186297] do_tcp_setsockopt.constprop.0+0x1f6/0x1c10 [ 911.191650] tcp_setsockopt+0xa7/0xc0 [ 911.195442] SyS_setsockopt+0x110/0x1e0 [ 911.199427] do_syscall_64+0x1d5/0x640 [ 911.203308] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 911.208488] [ 911.210106] Freed by task 4737: [ 911.213378] kasan_slab_free+0xc3/0x1a0 [ 911.217338] kfree+0xc9/0x250 [ 911.220439] tls_sk_proto_close+0x568/0x8b0 [ 911.224752] inet_release+0xdf/0x1b0 [ 911.228457] inet6_release+0x4c/0x70 [ 911.232191] __sock_release+0xcd/0x2b0 [ 911.236075] sock_close+0x15/0x20 [ 911.239518] __fput+0x25f/0x7a0 [ 911.242790] task_work_run+0x11f/0x190 [ 911.246700] exit_to_usermode_loop+0x1ad/0x200 [ 911.251273] do_syscall_64+0x4a3/0x640 [ 911.255152] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 911.260326] [ 911.261950] The buggy address belongs to the object at ffff8880a0d42b00 [ 911.261950] which belongs to the cache kmalloc-192 of size 192 [ 911.274623] The buggy address is located 112 bytes inside of [ 911.274623] 192-byte region [ffff8880a0d42b00, ffff8880a0d42bc0) [ 911.286486] The buggy address belongs to the page: [ 911.291409] page:ffffea0002835080 count:1 mapcount:0 mapping:ffff8880a0d42000 index:0x0 [ 911.299565] flags: 0xfffe0000000100(slab) [ 911.303727] raw: 00fffe0000000100 ffff8880a0d42000 0000000000000000 0000000100000010 15:43:32 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r6, 0x114, 0xa, &(0x7f0000000240)={0x1, 's'}, 0x2) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x1c}}]}, 0x4c}}, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000900)=""/4096) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=@newqdisc={0x190, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0x0, 0xffff}}, [@TCA_STAB={0x16c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x8, 0x5, 0x20, 0x2, 0x0, 0x8, 0x8}}, {0x14, 0x2, [0x2, 0x8000, 0x7fff, 0x3, 0x1a, 0x9, 0x8001, 0x7f]}}, {{0x1c, 0x1, {0x69, 0x5, 0x1, 0x10001, 0x5abafe42e0e7b3a, 0x49, 0x20, 0x3}}, {0xa, 0x2, [0x8, 0x1, 0x40]}}, {{0x1c, 0x1, {0x3f, 0x4, 0x1a9c, 0x7, 0x0, 0x7, 0x7, 0x1}}, {0x6, 0x2, [0x7ff]}}, {{0x1c, 0x1, {0x81, 0x0, 0xa0, 0x8, 0x1, 0x5, 0x5, 0x4}}, {0xc, 0x2, [0xfffd, 0x5, 0x0, 0x4]}}, {{0x1c, 0x1, {0x5, 0xff, 0x0, 0x8, 0x1, 0x20000, 0x15de, 0x3}}, {0xa, 0x2, [0x8, 0x1, 0x0]}}, {{0x1c, 0x1, {0x20, 0x5, 0xdb0, 0xc, 0x0, 0x5, 0x1b9, 0x5}}, {0xe, 0x2, [0xe781, 0x7, 0x7c8, 0x3, 0x6]}}, {{0x1c, 0x1, {0x29, 0x7, 0x800, 0x0, 0x0, 0x8, 0x1, 0x1}}, {0x6, 0x2, [0xff]}}, {{0x1c, 0x1, {0x1, 0x7, 0xc761, 0x3de, 0x0, 0x7, 0x200, 0x4}}, {0xc, 0x2, [0x7ff, 0x29f, 0x9, 0xe2]}}, {{0x1c, 0x1, {0x1, 0x7, 0x4, 0xfffffbff, 0x2, 0xfff, 0x6, 0x2}}, {0x8, 0x2, [0x25, 0x2]}}]}]}, 0x190}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000600)={{{@in=@remote, @in=@broadcast, 0x4e23, 0x329, 0x4e21, 0x6c, 0xa, 0x30, 0x40, 0x21, r7}, {0x8, 0x1, 0x8, 0x0, 0x1, 0x2793eb9a, 0x951, 0x7fffffff}, {0x8001, 0x8154, 0x7fffffff, 0x9}, 0x3, 0x0, 0x2, 0x1}, {{@in=@remote, 0x4d4, 0x3c}, 0x2, @in=@empty, 0x3507, 0x3, 0x1, 0x0, 0x7, 0x0, 0x101}}, 0xe8) prctl$PR_SET_THP_DISABLE(0x29, 0x0) dup2(r1, r0) [ 911.311603] raw: ffffea00029f2460 ffffea00029680a0 ffff88812fe50040 0000000000000000 [ 911.319492] page dumped because: kasan: bad access detected [ 911.325221] [ 911.326842] Memory state around the buggy address: [ 911.331767] ffff8880a0d42a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 911.339118] ffff8880a0d42a80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 911.346482] >ffff8880a0d42b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 911.353852] ^ 15:43:32 executing program 4 (fault-call:3 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000007c00)='msdos\x00', &(0x7f0000007c40)='./file0\x00', 0x0, 0x0, &(0x7f0000007d00), 0x0, &(0x7f0000007d40)={[{@fat=@check_relaxed='check=relaxed'}]}) 15:43:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r2, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x51}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xf8}, @NL80211_ATTR_REG_RULES={0x2c, 0x22, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x530}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x1a1e000}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1}, @NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x81}]}, 0x70}, 0x1, 0x0, 0x0, 0x4044}, 0x20004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000540)={'wlan1\x00', 0x0}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_OPER(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x88, r2, 0x400, 0x70bd2c, 0x25dfdbff, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000044}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) r9 = fcntl$dupfd(r7, 0x406, r8) sendto$inet6(r9, 0x0, 0x0, 0x4400, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "6e53b6d75e2600"}, 0x28) sendto$inet6(r7, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 911.360855] ffff8880a0d42b80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 911.368206] ffff8880a0d42c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 911.375552] ================================================================== [ 911.382897] Disabling lock debugging due to kernel taint 15:43:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000), &(0x7f00000000c0)=0x6) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendto$inet6(r0, &(0x7f0000000000), 0xffffffac, 0x4040, 0x0, 0x0) [ 911.438959] FAULT_INJECTION: forcing a failure. [ 911.438959] name failslab, interval 1, probability 0, space 0, times 0 [ 911.483503] CPU: 1 PID: 4758 Comm: syz-executor.4 Tainted: G B 4.14.198-syzkaller #0 [ 911.492538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 911.499626] Kernel panic - not syncing: panic_on_warn set ... [ 911.499626] [ 911.501888] Call Trace: [ 911.511803] dump_stack+0x1b2/0x283 [ 911.515416] should_fail.cold+0x10a/0x154 [ 911.519570] should_failslab+0xd6/0x130 [ 911.523526] kmem_cache_alloc+0x28e/0x3c0 [ 911.527658] get_empty_filp+0x86/0x3e0 [ 911.531528] alloc_file+0x23/0x440 [ 911.535054] __shmem_file_setup.part.0+0x198/0x3c0 [ 911.539967] ? shmem_create+0x30/0x30 [ 911.543750] ? __alloc_fd+0x1be/0x490 [ 911.547537] SyS_memfd_create+0x1fc/0x3c0 [ 911.551669] ? shmem_fcntl+0x120/0x120 [ 911.555550] ? SyS_clock_settime+0x1a0/0x1a0 [ 911.559943] ? SyS_ioctl+0x5c/0xb0 [ 911.563471] ? shmem_fcntl+0x120/0x120 [ 911.567342] do_syscall_64+0x1d5/0x640 [ 911.571216] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 911.576389] RIP: 0033:0x45dd99 [ 911.579562] RSP: 002b:00007f6b831d1a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 911.587260] RAX: ffffffffffffffda RBX: 0000000020007d00 RCX: 000000000045dd99 [ 911.594516] RDX: 00007f6b831d1ae0 RSI: 0000000000000000 RDI: 00000000004c27c3 [ 911.601772] RBP: 0000000000000000 R08: 00007f6b831d1ad8 R09: 0000000000000000 [ 911.609035] R10: 00007f6b831d1adc R11: 0000000000000246 R12: 0000000000000000 [ 911.616290] R13: 0000000020007c40 R14: 0000000020007d00 R15: 0000000020007d40 [ 911.623561] CPU: 0 PID: 4737 Comm: syz-executor.1 Tainted: G B 4.14.198-syzkaller #0 [ 911.632568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 911.641943] Call Trace: [ 911.644533] dump_stack+0x1b2/0x283 [ 911.648156] panic+0x1f9/0x42d [ 911.651344] ? add_taint.cold+0x16/0x16 [ 911.655313] ? ___preempt_schedule+0x16/0x18 [ 911.659716] kasan_end_report+0x43/0x49 [ 911.663682] kasan_report_error.cold+0xa7/0x194 [ 911.668342] ? tls_write_space+0x238/0x2d0 [ 911.672574] __asan_report_load1_noabort+0x68/0x70 [ 911.677523] ? tls_write_space+0x238/0x2d0 [ 911.681747] tls_write_space+0x238/0x2d0 [ 911.685799] tcp_check_space+0x395/0x640 [ 911.689851] tcp_rcv_established+0x727/0x17a0 [ 911.694340] ? rt6_check_expired+0xa0/0x160 [ 911.698651] ? tcp_data_queue+0x3ac0/0x3ac0 [ 911.702967] ? rt6_check+0x15a/0x250 [ 911.706674] tcp_v6_do_rcv+0xc60/0x1190 [ 911.710645] __release_sock+0x12a/0x350 [ 911.714621] release_sock+0x54/0x1b0 [ 911.718327] tls_sk_proto_close+0x575/0x8b0 [ 911.722637] ? locks_remove_posix+0x242/0x4b0 [ 911.727153] ? tcp_check_oom+0x440/0x440 [ 911.731208] ? tls_write_space+0x2d0/0x2d0 [ 911.735434] ? ip_mc_drop_socket+0x16/0x220 [ 911.739750] inet_release+0xdf/0x1b0 [ 911.743459] inet6_release+0x4c/0x70 [ 911.747169] __sock_release+0xcd/0x2b0 [ 911.751050] ? __sock_release+0x2b0/0x2b0 [ 911.755188] sock_close+0x15/0x20 [ 911.758635] __fput+0x25f/0x7a0 [ 911.761906] task_work_run+0x11f/0x190 [ 911.765788] exit_to_usermode_loop+0x1ad/0x200 [ 911.770363] do_syscall_64+0x4a3/0x640 [ 911.774246] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 911.779423] RIP: 0033:0x4176f1 [ 911.782598] RSP: 002b:00007ffcc687f9c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 911.790292] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004176f1 [ 911.797549] RDX: 0000001b31b20000 RSI: 000000000000086e RDI: 0000000000000003 [ 911.804806] RBP: 0000000000000001 R08: 00000000216a486e R09: 00000000216a4872 [ 911.812062] R10: 00007ffcc687fab0 R11: 0000000000000293 R12: 000000000118c9a0 [ 911.819339] R13: 000000000118c9a0 R14: ffffffffffffffff R15: 000000000118bf2c [ 911.827900] Kernel Offset: disabled [ 911.831544] Rebooting in 86400 seconds..