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"], &(0x7f0000aed000)={0xffffffffffffffff, 0x1, [0x813, 0x0, 0x0, 0x100000]}) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x2003c0) mq_timedsend(r0, &(0x7f0000000100)="80239f533e88ba3f1f451a9c5ebf7636d4e5a59e92b3ea203a6cbd56705d9be45c3af73a9e5f466dfcf62ca8ae430e9514af2b11a2c106ed78400cffcff105690bdaf049380cb8504984f223d4369f8141db943cbccae958d8146ea20124e05dca110d", 0x63, 0x1, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x4001, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000200)=r1) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000000c0)={@mcast2}, &(0x7f0000000080)=0x14) 15:12:10 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8adf, 0xc2000) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x63e411bd) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000000)={0xa1, 0x6c}) 15:12:10 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000000c0)) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000100)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000080)) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000005840)="1c", 0x1}], 0x1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x228}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:10 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc0402002}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x78, r1, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3ff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x82ab}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x78}}, 0xc1) r2 = socket$alg(0x26, 0x5, 0x0) prctl$intptr(0x3d, 0x3) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x10000000) 15:12:10 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000080)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x1c) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0xffffffffffff8001}, &(0x7f0000000180)=0x8) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0185500, &(0x7f0000000000)={0xa1, 0x6c}) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x2) 15:12:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x1400000000000000]}}, 0x1c) 15:12:10 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) shutdown(r0, 0x1) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x600800, 0x0) sendto$inet(r1, &(0x7f0000000480)="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", 0x1000, 0x8000, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:10 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f00000002c0)={0x0, 0x0, 0x2080}) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000000)={0xa1, 0x6c}) 15:12:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = getpgrp(0xffffffffffffffff) getpriority(0x1, r2) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) [ 726.642337] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:10 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6b6b6b00, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:10 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:10 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xff, 0x800) accept$nfc_llcp(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x60) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$alg(0x26, 0x5, 0x0) 15:12:10 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000000)={0xa1, 0x6c}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0x50, &(0x7f0000000040)}, 0x10) set_mempolicy(0x4000, &(0x7f0000000140)=0x2, 0x0) 15:12:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x2, 0x6, 0xfffffffffffffff7, 0x33, 0x1, 0x5}, 0x2c) 15:12:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000080)='generic-gcm-aesni\x00', 0xffffffffffffffff) keyctl$invalidate(0x15, r1) 15:12:10 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x8a03000000000000]}}, 0x1c) 15:12:11 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) socketpair$inet(0x2, 0x80004, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f00000001c0)=""/101, &(0x7f0000000240)=0x65) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$DRM_IOCTL_SET_UNIQUE(r2, 0x40106410, &(0x7f0000000040)={0xb1, &(0x7f0000000100)="ac1baa21d550e880ee53b56f38ad353de43069d5041f2e915222bd6f5fc7cd20bec1505d1715e6ec9aeb254af59abdcb30ad1d6ede438c0d16adabe772bf961351abf80dda7d18ec8e2b8b0c0f70c27c20326566ac2754179fae975002855a6b3ed655ba99b1fe3ed7509f160cef7f328fd6b5aadc4c1d2813a0753c7f63242afca09c89d40a97620671978ae73d35902b1b01476cf8818aa85368873a4cd914c98318a9598b3c70515acc221d6e8ab4c4"}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={0x0, 0xb5}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000340)={r3, 0x100000001}, 0x8) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000000)={0xa1, 0x6c}) 15:12:11 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0xffffffffffffffaa) 15:12:11 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x400001) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040)={0x1, 0x4}, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x0) [ 727.225895] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:11 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:11 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:11 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x80000000, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) write$P9_RREMOVE(r1, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0, 0x6c, 0x0, 0x0, 0x8f48}) 15:12:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x4924988, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:11 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x3f, 0x4, 0x8000, 0x7fffffff, 0x0, 0x1, 0x800, 0x1, 0x100000001, 0x4b1, 0x3, 0x4, 0x0, 0x0, 0x0, 0x2, 0x401, 0x2, 0xff, 0x1, 0x6, 0xffffffff, 0x10000, 0x0, 0x8, 0x2, 0x1f, 0x9, 0x7ff, 0x8, 0x80000001, 0x7, 0xbc, 0x6, 0x80000000, 0x80000000, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0x2, 0x9, 0x2000000000000000, 0x5, 0x7ff, 0x4d15, 0x7ff}, 0x0, 0x2, 0xffffffffffffff9c, 0x1) fsetxattr(r0, &(0x7f0000000140)=@random={'btrfs.', 'aead\x00'}, &(0x7f0000000180)='\x00', 0x1, 0x3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffffb, 0x800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'ip6tnl0\x00', 0x3}, 0x18) syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x2a68, 0x8000) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) [ 727.607711] vhci_hcd: invalid port number 108 15:12:11 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x80000000, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) write$P9_RREMOVE(r1, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0, 0x6c, 0x0, 0x0, 0x8f48}) 15:12:11 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x1) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x13b, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x200, @dev={0xfe, 0x80, [], 0x20}, 0x164}, {0xa, 0x4e24, 0x32, @mcast1, 0x39}, r1, 0x7fff}}, 0x48) [ 727.697200] vhci_hcd: invalid port number 108 15:12:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xe00000000000000]}}, 0x1c) 15:12:11 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:11 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x80000000, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) write$P9_RREMOVE(r1, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0, 0x6c, 0x0, 0x0, 0x8f48}) 15:12:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) recvfrom$inet(r1, &(0x7f0000000040)=""/153, 0x99, 0x120, &(0x7f0000000100)={0x2, 0x4e24, @remote}, 0x10) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x80000003) 15:12:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="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", 0x1000) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x10000, 0x2) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040), 0x4) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) [ 727.903057] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 727.921122] vhci_hcd: invalid port number 108 15:12:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf00, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:12 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:12 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x80000000, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0, 0x6c, 0x0, 0x0, 0x8f48}) 15:12:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x8d, 0x3, 0x3, "1b05e13a698e029ffea632943210a211", "ca7c72e96339f324c200e066f93d61410c759a370d65a335035ad2c05e2fba95a45e14bf8a37a8a0ec6ab07587db3e249fd7f9d31aca7a37e7baf1c883edb0421b7f0e64f627f3ec27f0101e4bf1ce10d77d863d2c708c1aac6660def137395dc5763b00628fb674ba854bc2fc45250da73641ea5b868749"}, 0x8d, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x108) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000040)={0x3, r0}) 15:12:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xfff7fffffffffffd) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0xf2, 0x4, 0x9, "f77616a16d23ad582b72a4b43609cdb7", "5e36497553fafa1a690eb899dd1b9349bc1ece6d28d491ca6f430a78e82d21e5f7a3e7ca0c2b2c98da9c82adcf5e2546eac57313da08a2e7698663c9cbf71202726abe64b11f945992192eff937886ebb58d816c24e2c46b55b277e54735e2fd39ce9eabe3bf3608599dc8f74514fb7e0fd6159208b5562faaf35cb1df5498e659c7358b5a8d29ec500c75385099339849ed3a9cdbe7368f70b8df2f778dc4ea3f92722862559d710710ade2ceb3b2a3315b561edf2fba7ee0a7d3a98ec9d7c5c211d14abaf5b4648efbf278f3dd7f89da403dfe875a3eeb12495d7ecb"}, 0xf2, 0x3) 15:12:12 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x24080, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80004000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5e}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 15:12:12 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) [ 728.288832] vhci_hcd: invalid port number 108 15:12:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x800000000000000]}}, 0x1c) 15:12:12 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x80000000, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0xa0, 0x6c, 0x0, 0x0, 0x8f48}) 15:12:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'ip6_vti0\x00', 0x800}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x50000, 0x0) 15:12:12 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = memfd_create(&(0x7f0000000080)='/dev/vga_arbiter\x00', 0x3) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in6={0xa, 0x4e23, 0x4bd5, @loopback, 0x7}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, @in={0x2, 0x4e22, @rand_addr=0x9}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}], 0x5c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000280)) setsockopt$packet_buf(r3, 0x107, 0x6, &(0x7f0000000180)="c36d3c8ab4817deb02adef3585896ba6be5b59f27edef988f9b5f02c9e8499cac2bbc822916ba0f30fa746ba03e6a0fcb002af8856ca439c34d1b4051c4ca59cc6450abb048fabd420a557837a17b9b921dc4a5ec0f9989338669c658e0fddc039489b520edd149d6debd938943089e4e7570014bece5a3e1c8137b8403e2a161c672514170f1ee7b8a57eeb5803527d7b0d2c672d4e98d1f78375c85073e51253acf6329b743bb47245722598e706de82c671b79438d5246482826f5bd536b30c494f69532591", 0xc7) sendmmsg$alg(r2, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0xfffffffffffffd12, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x426}}], 0x2, 0x0, 0x0) r4 = dup3(r2, r2, 0x80000) setsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000000)=0x40, 0x4) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, &(0x7f0000000480)={0x0, 0x0, @ioapic}) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xe, 0x10, r4, 0x0) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0xb) socket$alg(0x26, 0x5, 0x0) [ 728.629715] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x1f, 'xts(camellia)\x00'}, 0x44) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x10000, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="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", 0xff) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x1}}, 0x18) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000240)={0x0, 0x1ff, 0x10001, &(0x7f0000000000)=0x5}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:12 executing program 5: socket$l2tp(0x18, 0x1, 0x1) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x6c, 0x0, 0x0, 0x8f48}) 15:12:12 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) [ 728.778497] vhci_hcd: invalid port number 108 15:12:12 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xfffffffffffffffc) socket$alg(0x26, 0x5, 0x0) r1 = memfd_create(&(0x7f0000000000)='generic-gcm-aesni\x00', 0x6) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x480, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000040)=0x1) 15:12:12 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x6c, 0x0, 0x0, 0x8f48}) [ 728.939499] vhci_hcd: invalid port number 108 15:12:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x11000000]}}, 0x1c) 15:12:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond_slave_1\x00', &(0x7f0000000000)=@ethtool_rxfh={0x0, 0x0, 0x1, 0x100000000, 0x9, "683117", 0x0, [0x8, 0x1, 0xfff, 0x100000000]}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f00000000c0)) 15:12:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x6c, 0x0, 0x0, 0x8f48}) 15:12:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = dup(r0) connect$unix(r1, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0x6e) 15:12:13 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) [ 729.261875] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x6c, 0x0, 0x0, 0x8f48}) 15:12:13 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x2) 15:12:13 executing program 5: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0xa0, 0x6c, 0x0, 0x0, 0x8f48}) 15:12:13 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x8000, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) r1 = socket$alg(0x26, 0x5, 0x0) sendfile(r0, r0, 0x0, 0x5) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000100)) get_thread_area(&(0x7f0000000080)={0x8, 0xffffffffffffffff, 0x0, 0x6, 0x1ff, 0x8, 0x7f, 0x2, 0x4, 0xffff}) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x7f, @multicast1}}, 0x9, 0x200, 0x800, "799434dc10a0eb3899a3631aee7dc192c5518d24bf27a55a7fcd3b039bf173284c11db40a3ec0801ba42fcfc2bc04d9a483703bc22a2aa807b2c444505c900aa0059c1ccf5ca8ec1e86f0fd7bc951451"}, 0xd8) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000000c0)={r1}) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x0) 15:12:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x200100, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000080)=[0xfff, 0x8001]) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x20}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) [ 729.626243] QAT: Invalid ioctl [ 729.641999] QAT: Invalid ioctl 15:12:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x5c020000]}}, 0x1c) 15:12:13 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x6c, 0x0, 0x0, 0x8f48}) 15:12:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x400000, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000480)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockname$packet(r1, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002cc0)=0x14) lstat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r1, &(0x7f0000003040)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003000)={&(0x7f0000002dc0)=@getpolicy={0x230, 0x15, 0x2, 0x70bd29, 0x25dfdbff, {{@in6=@dev={0xfe, 0x80, [], 0x14}, @in6=@remote, 0x4e21, 0x3, 0x4e22, 0x1, 0xa, 0x20, 0x20, 0x33, r2, r3}}, [@sec_ctx={0x5c, 0x8, {0x55, 0x8, 0x1, 0x9, 0x4d, "8698e384bd89998f4aff8e0760a436aebd58c75302720557ba55d9932ee7bb638ccb90dd9c05ce6debb18ed692df38481901470e56cd260c38a503f71d59db436c337d5dc39254f751a2e82bd8"}}, @mark={0xc, 0x15, {0x35075c, 0x8}}, @algo_comp={0x70, 0x3, {{'deflate\x00'}, 0x140, "99f38aea244ad758551dd91eed2811ada89091600f690947ba41b91f9a202fac8fa3ec897b383166"}}, @etimer_thresh={0x8, 0xc, 0x7}, @mark={0xc, 0x15, {0x35075b, 0xd2c}}, @proto={0x8, 0x19, 0x7f}, @sa={0xe4, 0x6, {{@in6=@remote, @in=@broadcast, 0x4e20, 0x0, 0x4e21, 0x0, 0x2, 0x80, 0xa0, 0x0, r4, r5}, {@in6=@remote, 0x4d4, 0xff}, @in=@multicast2, {0x100, 0xfff, 0xffffffffffffff80, 0x1f, 0x0, 0x2, 0x800, 0x40}, {0x0, 0x80000000, 0x1f, 0x9}, {0x0, 0x20, 0x2}, 0x70bd28, 0x3500, 0xa, 0x4, 0x80000000, 0x84}}, @tfcpad={0x8, 0x16, 0x7}]}, 0x230}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x5, 0x4) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000080)="711075493228610f9bc13ed2f1cec300076804387eaa2a24adf94441fe8dd932bf935cc5195633d886e20d3e373fa083242e6a6fd33ebf4f2d611a13e1823883c93485bfabd66c6e804321ad0a24afee2f4c05964771a2", 0x57}, {&(0x7f0000000100)="9673d17217d09e57a7313c74fe9b9c591065240434bcfc12a1ffc57b92734bb67d1fdec4af27343cffe19a2a1ac1fec8dae7e8a76e5d49ca086b10e2b81e7fc5f9d97a119a2ba6e6c0e1e5eda76169a7e2aeaec906dfd69db1410c2286", 0x5d}, {&(0x7f0000000180)="c55865cc931d59fe33469f125d32d92ec956813416fd5f78ac430175b6b212993af675f5caaf72f58d6c60e68717118ba395ad9b897bb2b0715b5cd80a86fca0b553ae1e8e91d51a90fd68b3569637f6d1bed939204253debbbcdf98358833983cd1e24e3eae800abeee215288db96754804866c4ee4e10885a723ac5273371cf36941cf62d9e8b4bdcd3de99e3a37ff9f97e783d25bbd332a9b31445b906415390a18b61fa2836c8a68672e596868bbdb4f4e6634f68e5e3180247c96f611aef0d20d256c63f69f95ca876b135804863ead740bd9b804bb8d5bfa", 0xdb}], 0x3) 15:12:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x80) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000040)={[0xbf, 0x7, 0xffffffffffffff00, 0x3, 0xdc, 0xa9b, 0x8, 0x4, 0x6, 0x4698d602, 0x1, 0xfc6f, 0x3, 0x3, 0x3f, 0x7], 0x1, 0x6080}) 15:12:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf0ffffff00000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:13 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xb29, 0x200100) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x200000000000007) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x800, 0x0) getpeername$packet(r1, &(0x7f0000000180), &(0x7f00000001c0)=0x14) r2 = memfd_create(&(0x7f0000000040)='generic-gcm-aesni\x00', 0x1) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000080)=ANY=[@ANYBLOB="0900000079000000d7d8e6d3716b1e8c05673de6f87de39e1f62d015f24501781e68b5425e0583d00775dd7421e8be219bd35ed6b28b9a66368856f31be6642e4c2e28258e480f19256060f670dbc3ef07524361edcdf1ffdea8fb49b3bd3bfe521b7dcc37e48b22c705adade58f8765871e95d56fb0c54790f91d793862f42740"]) [ 729.866768] vhci_hcd: invalid port number 108 [ 729.876373] vhci_hcd: default hub control req: 0000 v0000 i006c l0 [ 729.902815] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x8f48}) 15:12:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xffffbfffffffffff) 15:12:14 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:14 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x2cec0]}}, 0x1c) 15:12:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) semget$private(0x0, 0x4, 0x100) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:14 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:14 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) shutdown(r0, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x80, 0x193600) ioctl$KVM_SMI(r2, 0xaeb7) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f00000001c0)={r3, 0x1, 0x6, @local}, 0x10) 15:12:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) [ 730.482538] FAULT_INJECTION: forcing a failure. [ 730.482538] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 730.512885] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 730.532201] CPU: 1 PID: 7122 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #27 [ 730.539414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.548779] Call Trace: [ 730.551391] dump_stack+0x1c4/0x2b4 [ 730.555045] ? dump_stack_print_info.cold.2+0x52/0x52 [ 730.555067] ? perf_trace_lock+0x14d/0x7a0 [ 730.555114] should_fail.cold.4+0xa/0x17 [ 730.564541] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 730.564564] ? graph_lock+0x170/0x170 [ 730.564584] ? graph_lock+0x170/0x170 [ 730.564610] ? lock_acquire+0x1ed/0x520 [ 730.585361] ? __lock_is_held+0xb5/0x140 [ 730.589462] ? ___might_sleep+0x1ed/0x300 [ 730.593631] ? lock_release+0x970/0x970 [ 730.597627] ? arch_local_save_flags+0x40/0x40 [ 730.602317] ? __mutex_lock+0x85e/0x1700 [ 730.606409] ? __might_sleep+0x95/0x190 [ 730.610410] __alloc_pages_nodemask+0x34b/0xde0 [ 730.615107] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 730.620139] ? find_held_lock+0x36/0x1c0 [ 730.624229] ? __might_fault+0x12b/0x1e0 [ 730.628304] ? lock_downgrade+0x900/0x900 [ 730.632464] ? lock_release+0x970/0x970 [ 730.636444] ? arch_local_save_flags+0x40/0x40 [ 730.641039] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 730.646064] ? usbfs_increase_memory_usage+0xf7/0x1d0 [ 730.651267] ? usbfs_decrease_memory_usage+0x30/0x30 [ 730.656379] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 730.661926] alloc_pages_current+0x10c/0x210 [ 730.666343] ? check_ctrlrecip+0xa9/0x320 [ 730.670503] __get_free_pages+0xc/0x40 [ 730.674406] proc_control+0x227/0xef0 [ 730.678213] ? mark_held_locks+0x130/0x130 [ 730.682460] ? proc_bulk+0xa70/0xa70 [ 730.686191] usbdev_do_ioctl+0x1eb8/0x3b50 [ 730.690440] ? processcompl_compat+0x680/0x680 [ 730.695035] ? zap_class+0x640/0x640 [ 730.698757] ? mark_held_locks+0x130/0x130 [ 730.703003] ? zap_class+0x640/0x640 [ 730.706721] ? __lock_acquire+0x7ec/0x4ec0 [ 730.710975] ? graph_lock+0x170/0x170 [ 730.714786] ? zap_class+0x640/0x640 [ 730.718511] ? dput.part.26+0x26d/0x790 [ 730.722497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.728049] ? check_preemption_disabled+0x48/0x200 [ 730.733074] ? check_preemption_disabled+0x48/0x200 [ 730.738108] ? find_held_lock+0x36/0x1c0 [ 730.742188] ? avc_has_extended_perms+0x8cb/0x15a0 [ 730.747130] ? lock_downgrade+0x900/0x900 [ 730.751284] ? check_preemption_disabled+0x48/0x200 [ 730.756313] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 730.762117] ? kasan_check_read+0x11/0x20 [ 730.766273] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 730.771562] ? rcu_bh_qs+0xc0/0xc0 [ 730.775125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.780672] ? avc_has_extended_perms+0xab2/0x15a0 [ 730.785624] ? avc_ss_reset+0x190/0x190 [ 730.789613] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 730.795428] ? kasan_check_read+0x11/0x20 [ 730.799583] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 730.804876] ? rcu_bh_qs+0xc0/0xc0 [ 730.808450] ? ___might_sleep+0x1ed/0x300 [ 730.812607] ? arch_local_save_flags+0x40/0x40 [ 730.817203] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 730.822143] usbdev_ioctl+0x25/0x30 [ 730.825780] ? usbdev_compat_ioctl+0x30/0x30 [ 730.830196] do_vfs_ioctl+0x1de/0x1720 [ 730.834106] ? ioctl_preallocate+0x300/0x300 [ 730.838531] ? selinux_file_mprotect+0x620/0x620 [ 730.843306] ? __sb_end_write+0xd9/0x110 [ 730.847380] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 730.852920] ? fput+0x130/0x1a0 [ 730.856211] ? do_syscall_64+0x9a/0x820 [ 730.860202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.865747] ? security_file_ioctl+0x94/0xc0 [ 730.870170] ksys_ioctl+0xa9/0xd0 [ 730.873643] __x64_sys_ioctl+0x73/0xb0 [ 730.877546] do_syscall_64+0x1b9/0x820 [ 730.881442] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 730.886815] ? syscall_return_slowpath+0x5e0/0x5e0 [ 730.891758] ? trace_hardirqs_on_caller+0x310/0x310 [ 730.896784] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 730.901805] ? recalc_sigpending_tsk+0x180/0x180 [ 730.906570] ? kasan_check_write+0x14/0x20 [ 730.910823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 730.915688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.920885] RIP: 0033:0x457679 [ 730.924090] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 730.943012] RSP: 002b:00007f3d4e732c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 730.950735] RAX: ffffffffffffffda RBX: 00007f3d4e7336d4 RCX: 0000000000457679 [ 730.958012] RDX: 0000000020000080 RSI: 00000000c0185500 RDI: 0000000000000003 [ 730.965290] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 730.972561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 15:12:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) r1 = open(&(0x7f0000000000)='./file0\x00', 0x440000, 0x100) write$selinux_access(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="73797274656d5f753a6f626a6563745f063a666f6e74735f743a7330202f7362697de16468636c69656e7420303030303030303030303630309255215704c279d7"], 0x41) [ 730.979836] R13: 00000000004cf508 R14: 00000000004bf7f2 R15: 0000000000000000 15:12:14 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:15 executing program 5 (fault-call:1 fault-nth:1): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:15 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) [ 731.130025] FAULT_INJECTION: forcing a failure. [ 731.130025] name failslab, interval 1, probability 0, space 0, times 0 [ 731.142326] CPU: 0 PID: 7155 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #27 [ 731.149539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.158906] Call Trace: [ 731.161536] dump_stack+0x1c4/0x2b4 [ 731.161576] ? dump_stack_print_info.cold.2+0x52/0x52 [ 731.161603] ? perf_trace_lock+0x14d/0x7a0 [ 731.161638] ? graph_lock+0x170/0x170 15:12:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) mount$9p_xen(&(0x7f0000000280)=':\'\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x80, &(0x7f00000003c0)={'trans=xen,', {[{@msize={'msize', 0x3d, 0x7f}}]}}) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/icmp6\x00') fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r2, &(0x7f0000000200)={0x59, 0x7d, 0x2, {{0x0, 0x3f, 0x21bf, 0x6, {0x4, 0x1, 0x2}, 0x800000, 0x6, 0x8, 0x0, 0x5, 'aead\x00', 0x7, 'selinux'}, 0x5, 'aead\x00', r3, r4, r5}}, 0x59) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) [ 731.161683] should_fail.cold.4+0xa/0x17 [ 731.182592] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 731.187719] ? graph_lock+0x170/0x170 [ 731.191547] ? graph_lock+0x170/0x170 [ 731.195374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.200956] ? check_preemption_disabled+0x48/0x200 [ 731.206024] ? check_preemption_disabled+0x48/0x200 [ 731.211074] ? find_held_lock+0x36/0x1c0 [ 731.215167] ? proc_control+0x831/0xef0 [ 731.219179] ? ___might_sleep+0x1ed/0x300 [ 731.223350] ? arch_local_save_flags+0x40/0x40 [ 731.227956] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 731.233005] ? find_held_lock+0x36/0x1c0 [ 731.233046] __should_failslab+0x124/0x180 [ 731.233070] should_failslab+0x9/0x14 [ 731.233089] kmem_cache_alloc_trace+0x2d7/0x750 [ 731.233109] ? lock_release+0x970/0x970 [ 731.241406] ? arch_local_save_flags+0x40/0x40 [ 731.241435] usb_control_msg+0xc4/0x4e0 [ 731.241457] ? usb_start_wait_urb+0x5a0/0x5a0 [ 731.241474] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 731.241506] proc_control+0x99b/0xef0 [ 731.241535] ? proc_bulk+0xa70/0xa70 [ 731.241554] ? usbdev_do_ioctl+0x709/0x3b50 [ 731.284422] usbdev_do_ioctl+0x1eb8/0x3b50 [ 731.288682] ? processcompl_compat+0x680/0x680 [ 731.293290] ? zap_class+0x640/0x640 [ 731.297034] ? mark_held_locks+0x130/0x130 [ 731.301286] ? zap_class+0x640/0x640 [ 731.305032] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 731.310241] ? graph_lock+0x170/0x170 [ 731.314067] ? zap_class+0x640/0x640 [ 731.317810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.323366] ? check_preemption_disabled+0x48/0x200 15:12:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7fffffff, 0x2000) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, r2, 0x6, 0x2}, 0x10) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) [ 731.328400] ? check_preemption_disabled+0x48/0x200 [ 731.333441] ? find_held_lock+0x36/0x1c0 [ 731.337529] ? avc_has_extended_perms+0x8cb/0x15a0 [ 731.342475] ? lock_downgrade+0x900/0x900 [ 731.346634] ? check_preemption_disabled+0x48/0x200 [ 731.351665] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 731.351686] ? kasan_check_read+0x11/0x20 [ 731.351705] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 731.351725] ? rcu_bh_qs+0xc0/0xc0 [ 731.370499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.376058] ? avc_has_extended_perms+0xab2/0x15a0 [ 731.381044] ? avc_ss_reset+0x190/0x190 [ 731.385061] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 731.390881] ? kasan_check_read+0x11/0x20 [ 731.395051] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 731.400348] ? rcu_bh_qs+0xc0/0xc0 [ 731.404001] ? ___might_sleep+0x1ed/0x300 [ 731.408193] ? arch_local_save_flags+0x40/0x40 [ 731.412809] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 731.417767] usbdev_ioctl+0x25/0x30 [ 731.421419] ? usbdev_compat_ioctl+0x30/0x30 [ 731.425847] do_vfs_ioctl+0x1de/0x1720 [ 731.429764] ? ioctl_preallocate+0x300/0x300 [ 731.434199] ? selinux_file_mprotect+0x620/0x620 [ 731.438998] ? __sb_end_write+0xd9/0x110 [ 731.443094] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 731.448643] ? fput+0x130/0x1a0 [ 731.451943] ? do_syscall_64+0x9a/0x820 [ 731.455953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.461517] ? security_file_ioctl+0x94/0xc0 [ 731.461541] ksys_ioctl+0xa9/0xd0 [ 731.461564] __x64_sys_ioctl+0x73/0xb0 [ 731.461590] do_syscall_64+0x1b9/0x820 [ 731.477231] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 731.482618] ? syscall_return_slowpath+0x5e0/0x5e0 [ 731.487574] ? trace_hardirqs_on_caller+0x310/0x310 [ 731.492610] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 731.497647] ? recalc_sigpending_tsk+0x180/0x180 [ 731.502431] ? kasan_check_write+0x14/0x20 [ 731.506697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 731.511570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.516773] RIP: 0033:0x457679 [ 731.519993] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 731.538916] RSP: 002b:00007f3d4e732c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 731.546677] RAX: ffffffffffffffda RBX: 00007f3d4e7336d4 RCX: 0000000000457679 [ 731.553975] RDX: 0000000020000080 RSI: 00000000c0185500 RDI: 0000000000000003 [ 731.561262] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 731.561273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 731.561284] R13: 00000000004cf508 R14: 00000000004bf7f2 R15: 0000000000000001 15:12:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x240]}}, 0x1c) 15:12:15 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x49) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000180)={0x7, 0x0, 'client1\x00', 0x1, "123c874e079c7807", "bb4d18e1357c39cacff8ef41bc5bc99ec2377142141a35be0fe5bb182587482c", 0x867, 0x3}) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'wp256\x00'}, 0xfffffffffffffe38) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000140)=0x108000000) setsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000040)="85c6e88da023eab81d75bbb1b036c18ed866d380392c362ebd292572eb2556d473a17f8751831697702d4e9af8dff09f562c8e8ba9c457afffbf679b4b216963e1ea672253a40475e4ad2a95ec0790535af28010caa1e9bdd199b65f6ed111", 0x5f) 15:12:15 executing program 5 (fault-call:1 fault-nth:2): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) [ 731.706905] FAULT_INJECTION: forcing a failure. [ 731.706905] name failslab, interval 1, probability 0, space 0, times 0 [ 731.727870] CPU: 1 PID: 7183 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #27 [ 731.735090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.744470] Call Trace: [ 731.747116] dump_stack+0x1c4/0x2b4 [ 731.750769] ? dump_stack_print_info.cold.2+0x52/0x52 [ 731.750795] ? kernel_text_address+0x79/0xf0 [ 731.750827] should_fail.cold.4+0xa/0x17 [ 731.750855] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 731.750886] ? save_stack+0xa9/0xd0 [ 731.773257] ? save_stack+0x43/0xd0 [ 731.776909] ? kmem_cache_alloc_trace+0x152/0x750 [ 731.781769] ? usb_control_msg+0xc4/0x4e0 [ 731.785934] ? proc_control+0x99b/0xef0 [ 731.789934] ? usbdev_do_ioctl+0x1eb8/0x3b50 [ 731.794373] ? usbdev_ioctl+0x25/0x30 [ 731.798197] ? do_vfs_ioctl+0x1de/0x1720 [ 731.802279] ? ksys_ioctl+0xa9/0xd0 [ 731.805921] ? __x64_sys_ioctl+0x73/0xb0 [ 731.810010] ? do_syscall_64+0x1b9/0x820 [ 731.814092] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.819484] ? find_held_lock+0x36/0x1c0 [ 731.823596] ? ___might_sleep+0x1ed/0x300 [ 731.827765] ? arch_local_save_flags+0x40/0x40 [ 731.832375] ? rcu_lockdep_current_cpu_online+0x1f0/0x2d0 [ 731.834449] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 731.837930] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 731.837960] __should_failslab+0x124/0x180 [ 731.838001] should_failslab+0x9/0x14 [ 731.861614] __kmalloc+0x2d4/0x760 [ 731.865164] ? rcu_read_lock_sched_held+0x108/0x120 [ 731.870190] ? kmem_cache_alloc_trace+0x353/0x750 [ 731.875041] ? usb_alloc_urb+0x24/0x50 [ 731.878933] ? arch_local_save_flags+0x40/0x40 [ 731.883537] usb_alloc_urb+0x24/0x50 [ 731.887261] usb_control_msg+0x1dd/0x4e0 [ 731.891330] ? usb_start_wait_urb+0x5a0/0x5a0 [ 731.895830] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 731.901388] proc_control+0x99b/0xef0 [ 731.905208] ? proc_bulk+0xa70/0xa70 [ 731.908939] usbdev_do_ioctl+0x1eb8/0x3b50 [ 731.913200] ? processcompl_compat+0x680/0x680 [ 731.917796] ? zap_class+0x640/0x640 [ 731.921528] ? mark_held_locks+0x130/0x130 [ 731.925769] ? zap_class+0x640/0x640 [ 731.929485] ? __lock_acquire+0x7ec/0x4ec0 [ 731.933731] ? graph_lock+0x170/0x170 [ 731.937546] ? zap_class+0x640/0x640 [ 731.941273] ? dput.part.26+0x26d/0x790 [ 731.945257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.950801] ? check_preemption_disabled+0x48/0x200 [ 731.955825] ? check_preemption_disabled+0x48/0x200 [ 731.960856] ? find_held_lock+0x36/0x1c0 [ 731.964934] ? avc_has_extended_perms+0x8cb/0x15a0 [ 731.969880] ? lock_downgrade+0x900/0x900 [ 731.974035] ? check_preemption_disabled+0x48/0x200 [ 731.979072] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 731.984875] ? kasan_check_read+0x11/0x20 [ 731.989034] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 731.994318] ? rcu_bh_qs+0xc0/0xc0 [ 731.997881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.003427] ? avc_has_extended_perms+0xab2/0x15a0 [ 732.008379] ? avc_ss_reset+0x190/0x190 [ 732.012368] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 732.018172] ? kasan_check_read+0x11/0x20 [ 732.022326] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 732.027613] ? rcu_bh_qs+0xc0/0xc0 [ 732.031192] ? ___might_sleep+0x1ed/0x300 [ 732.035351] ? arch_local_save_flags+0x40/0x40 [ 732.039947] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 732.044895] usbdev_ioctl+0x25/0x30 [ 732.048533] ? usbdev_compat_ioctl+0x30/0x30 [ 732.052948] do_vfs_ioctl+0x1de/0x1720 [ 732.056856] ? ioctl_preallocate+0x300/0x300 [ 732.061394] ? selinux_file_mprotect+0x620/0x620 [ 732.066161] ? __sb_end_write+0xd9/0x110 [ 732.070239] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 732.075779] ? fput+0x130/0x1a0 [ 732.079065] ? do_syscall_64+0x9a/0x820 [ 732.083056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.088603] ? security_file_ioctl+0x94/0xc0 [ 732.093025] ksys_ioctl+0xa9/0xd0 [ 732.096497] __x64_sys_ioctl+0x73/0xb0 [ 732.100406] do_syscall_64+0x1b9/0x820 [ 732.104762] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 732.110135] ? syscall_return_slowpath+0x5e0/0x5e0 [ 732.115079] ? trace_hardirqs_on_caller+0x310/0x310 [ 732.120105] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 732.125128] ? recalc_sigpending_tsk+0x180/0x180 [ 732.129896] ? kasan_check_write+0x14/0x20 [ 732.134146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 732.139011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.144219] RIP: 0033:0x457679 [ 732.147423] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 732.166328] RSP: 002b:00007f3d4e732c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 732.174044] RAX: ffffffffffffffda RBX: 00007f3d4e7336d4 RCX: 0000000000457679 [ 732.181316] RDX: 0000000020000080 RSI: 00000000c0185500 RDI: 0000000000000003 [ 732.188587] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 732.195857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 732.203129] R13: 00000000004cf508 R14: 00000000004bf7f2 R15: 0000000000000002 15:12:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x20000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:16 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1, 0x10000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e21, @local}}, 0x64d, 0x800, 0x40, 0xf88, 0x2}, &(0x7f0000000280)=0x98) ioctl(r0, 0x0, &(0x7f00000008c0)="8983ec9e132df4b22a23d9155147c3432dc604acd0061a0132cc3ac9f5eb5378118e89190f991fab69203b2a8b27f0de27176715ea8f46fd99db54b3f85985ba716ab54d8632ed189f492b44cea39ddaa290") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r3 = fcntl$getown(r2, 0x9) fcntl$lock(r0, 0x0, &(0x7f00000003c0)={0x2, 0x1, 0x7, 0x3, r3}) r4 = accept4$alg(r0, 0x0, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000780)=0x14) bind(r2, &(0x7f00000007c0)=@xdp={0x2c, 0x3, r5, 0x4}, 0x80) sendmmsg$alg(r4, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x240, 0x0) recvmmsg(r4, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f0000000380)=[{&(0x7f0000000480)=""/208, 0xd0}, {&(0x7f0000000580)=""/195, 0xc3}, {&(0x7f0000000340)=""/31, 0x1f}], 0x3}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0xfffffffffffffddb, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x20, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0xfffffffffffffd93) ptrace$peek(0x2, r3, &(0x7f0000000700)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000680)) r6 = accept$alg(r2, 0x0, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6e0400, 0x0) signalfd4(r4, &(0x7f00000006c0)={0x9}, 0x8, 0x800) setsockopt$IP_VS_SO_SET_DEL(r7, 0x0, 0x484, &(0x7f0000000040)={0x3c, @multicast1, 0x4e24, 0x2, 'rr\x00', 0x2, 0x7fff, 0x2e}, 0x2c) r8 = add_key(&(0x7f0000000a00)='user\x00', &(0x7f0000000a40)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000a80)="2c8e7e58f00e9ec386d9e8be0b1144ef1448fdc767239a838bf7ec6d0991bb24b0298950dacad94250589298f1ddc0c9033448b221a8349e988ab4d6315a0ac1d8ed07d799151d00bd7548a4bea2a29faed993e4b94a220baf695f064f3275f9039350d48ddd9abd22442c50d2e2acc6b336080697d52cb9dad7e1b0c445708bf85c334322fdf569f240202cf4388289474dd8ce0213caff0ced4e8ccd7efd804a8404e63f7de184fcfbbfdfdf6cbeb237f0108ecf4a361e9fd138bab167352655b8", 0xc2, 0xfffffffffffffffe) r9 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000c00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$FICLONERANGE(r9, 0x4020940d, &(0x7f0000000d00)={r6, 0x0, 0xffffffffffffff2b, 0x9, 0x7}) keyctl$describe(0x6, r8, &(0x7f0000000b80)=""/95, 0x5f) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000840)={0x3, 0x101, 0xfffffffffffffffc, 0x9, 0x9e2, 0x4}) 15:12:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) eventfd(0x80) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:16 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:16 executing program 5 (fault-call:1 fault-nth:3): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) [ 732.370306] FAULT_INJECTION: forcing a failure. [ 732.370306] name failslab, interval 1, probability 0, space 0, times 0 [ 732.384603] CPU: 1 PID: 7206 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #27 [ 732.391824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.401191] Call Trace: [ 732.403803] dump_stack+0x1c4/0x2b4 [ 732.407460] ? dump_stack_print_info.cold.2+0x52/0x52 [ 732.412697] should_fail.cold.4+0xa/0x17 [ 732.416794] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 732.421910] ? debug_smp_processor_id+0x1c/0x20 [ 732.426598] ? perf_trace_lock+0x14d/0x7a0 [ 732.430856] ? mark_held_locks+0x130/0x130 [ 732.435110] ? graph_lock+0x170/0x170 [ 732.438927] ? zap_class+0x640/0x640 [ 732.442683] ? find_held_lock+0x36/0x1c0 [ 732.446793] ? ___might_sleep+0x1ed/0x300 [ 732.450961] ? arch_local_save_flags+0x40/0x40 [ 732.455580] ? usb_hcd_submit_urb+0x45d/0x22b0 [ 732.460189] ? _raw_spin_unlock_irq+0x27/0x80 [ 732.464712] __should_failslab+0x124/0x180 [ 732.468983] should_failslab+0x9/0x14 [ 732.472807] __kmalloc+0x2d4/0x760 [ 732.476374] ? kasan_check_write+0x14/0x20 [ 732.480631] ? do_raw_spin_lock+0xc1/0x200 [ 732.484887] ? usb_hcd_submit_urb+0x6f9/0x22b0 [ 732.489502] usb_hcd_submit_urb+0x6f9/0x22b0 [ 732.493936] ? save_stack+0xa9/0xd0 [ 732.497604] ? usb_create_hcd+0x40/0x40 [ 732.501593] ? ksys_ioctl+0xa9/0xd0 [ 732.505231] ? __x64_sys_ioctl+0x73/0xb0 [ 732.509310] ? do_syscall_64+0x1b9/0x820 [ 732.513394] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 15:12:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0xffffffffffffff81) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x800) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) [ 732.518773] ? __x64_sys_ioctl+0x73/0xb0 [ 732.522853] ? do_syscall_64+0x1b9/0x820 [ 732.526926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.532321] ? find_held_lock+0x36/0x1c0 [ 732.536406] ? __lockdep_init_map+0x105/0x590 [ 732.540926] ? __lockdep_init_map+0x105/0x590 [ 732.545462] usb_submit_urb+0x893/0x1590 [ 732.549575] usb_start_wait_urb+0x13d/0x5a0 [ 732.549591] ? usb_init_urb+0x174/0x1f0 [ 732.549611] ? sg_clean+0x240/0x240 [ 732.549651] usb_control_msg+0x332/0x4e0 [ 732.549669] ? usb_start_wait_urb+0x5a0/0x5a0 [ 732.549686] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 732.549723] proc_control+0x99b/0xef0 [ 732.561653] ? proc_bulk+0xa70/0xa70 [ 732.583254] usbdev_do_ioctl+0x1eb8/0x3b50 [ 732.587523] ? processcompl_compat+0x680/0x680 [ 732.592130] ? zap_class+0x640/0x640 [ 732.595868] ? mark_held_locks+0x130/0x130 [ 732.600124] ? zap_class+0x640/0x640 [ 732.603854] ? __lock_acquire+0x7ec/0x4ec0 [ 732.608110] ? graph_lock+0x170/0x170 [ 732.611928] ? zap_class+0x640/0x640 [ 732.615667] ? dput.part.26+0x26d/0x790 15:12:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RXATTRCREATE(r2, &(0x7f0000000180)={0x7, 0x21, 0x2}, 0x7) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x800) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) [ 732.619653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.625215] ? check_preemption_disabled+0x48/0x200 [ 732.630256] ? check_preemption_disabled+0x48/0x200 [ 732.635302] ? find_held_lock+0x36/0x1c0 [ 732.639394] ? avc_has_extended_perms+0x8cb/0x15a0 [ 732.644344] ? lock_downgrade+0x900/0x900 [ 732.648503] ? check_preemption_disabled+0x48/0x200 [ 732.653560] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 732.659368] ? kasan_check_read+0x11/0x20 [ 732.659389] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 732.659408] ? rcu_bh_qs+0xc0/0xc0 [ 732.659438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.677931] ? avc_has_extended_perms+0xab2/0x15a0 [ 732.677978] ? avc_ss_reset+0x190/0x190 [ 732.678003] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 732.678021] ? kasan_check_read+0x11/0x20 [ 732.678039] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 732.678060] ? rcu_bh_qs+0xc0/0xc0 [ 732.705765] ? ___might_sleep+0x1ed/0x300 [ 732.709942] ? arch_local_save_flags+0x40/0x40 [ 732.714562] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 732.719530] usbdev_ioctl+0x25/0x30 [ 732.723178] ? usbdev_compat_ioctl+0x30/0x30 [ 732.727613] do_vfs_ioctl+0x1de/0x1720 [ 732.731535] ? ioctl_preallocate+0x300/0x300 [ 732.735983] ? selinux_file_mprotect+0x620/0x620 [ 732.740769] ? __sb_end_write+0xd9/0x110 [ 732.744851] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 732.750399] ? fput+0x130/0x1a0 [ 732.753700] ? do_syscall_64+0x9a/0x820 [ 732.757698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.763253] ? security_file_ioctl+0x94/0xc0 [ 732.767687] ksys_ioctl+0xa9/0xd0 15:12:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xf0ffffff00000000]}}, 0x1c) 15:12:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x1}) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) [ 732.771162] __x64_sys_ioctl+0x73/0xb0 [ 732.775099] do_syscall_64+0x1b9/0x820 [ 732.779011] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 732.784401] ? syscall_return_slowpath+0x5e0/0x5e0 [ 732.789350] ? trace_hardirqs_on_caller+0x310/0x310 [ 732.794384] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 732.794403] ? recalc_sigpending_tsk+0x180/0x180 [ 732.794424] ? kasan_check_write+0x14/0x20 [ 732.794449] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 732.794478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.794496] RIP: 0033:0x457679 [ 732.821748] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 732.840662] RSP: 002b:00007f3d4e732c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 732.848394] RAX: ffffffffffffffda RBX: 00007f3d4e7336d4 RCX: 0000000000457679 [ 732.855673] RDX: 0000000020000080 RSI: 00000000c0185500 RDI: 0000000000000003 [ 732.855685] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 15:12:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4800, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x220, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf1f5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x24000804) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1020010}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)={0x1f8, r2, 0x700, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0xac}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x80000001}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x81}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8d}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x800}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xb}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x1f00}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x10}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x10000}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x400}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x17}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6000000000000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}]}]}, 0x1f8}}, 0x4048011) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast6-avx\x00'}, 0xfffffffffffffdeb) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x400000) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x18}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x50, r2, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2}}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:16 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:16 executing program 5 (fault-call:1 fault-nth:4): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) [ 732.855695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 732.855706] R13: 00000000004cf508 R14: 00000000004bf7f2 R15: 0000000000000003 [ 732.900193] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:17 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:17 executing program 3: r0 = userfaultfd(0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x0, 0x0, 0xe7, 0x7, 0x2, 0xffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) pipe2(&(0x7f0000000000), 0x4000) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x0) 15:12:17 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:17 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045510, &(0x7f0000000080)={0xa0}) 15:12:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:17 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x983a]}}, 0x1c) 15:12:17 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5421, &(0x7f0000000080)={0xa0}) 15:12:17 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) 15:12:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="7fe67a15cd9ea109d127be37fb292e2e3148f9a91c66b3", 0x17) shmget(0x2, 0x2000, 0x54001204, &(0x7f0000ffe000/0x2000)=nil) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:17 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40049409, &(0x7f0000000080)={0xa0}) [ 733.715167] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x7f}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={r2, 0x7fff80, 0x1, 0x5}, &(0x7f0000000100)=0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:17 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:17 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80086601, &(0x7f0000000080)={0xa0}) 15:12:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x40000, 0x200000) timer_create(0x6, &(0x7f0000000080)={0x0, 0x36, 0x4, @thr={&(0x7f0000000000)="533be2e057aa548a4b58f19f01f3d6b1db7a28383f6108b6f373368d41e806184bc9bf65bb72a7600870ce5977d4f7a8916dcce31cd5101e2449874fa0204c7072d092c66b581810d7301f24bb2d306904f6c6b0c00c5168", &(0x7f0000000140)="1c845d89f887367801892338d65c3476fb1fd78b005d41e9faf4e9c9cc259d75575e27d18c3737289df9b648e604aff3765d32356edbab39a7798280ce7725de0eacbe825cf1"}}, &(0x7f00000001c0)=0x0) timer_delete(r2) accept4$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10, 0x80800) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6(0xa, 0x201000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000100)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x11, &(0x7f0000000080)={@local}, 0x20) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:17 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xa00]}}, 0x1c) 15:12:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x9, 0x2}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r3, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) setpgid(r1, r1) 15:12:18 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4020940d, &(0x7f0000000080)={0xa0}) 15:12:18 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x200000000000000) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0), 0xffffffffffffff31}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfdffffff, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:18 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x41045508, &(0x7f0000000080)={0xa0}) 15:12:18 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) [ 734.390259] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000040)) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000100)={0x3c, 0x2d, 0x13, 0x13, 0x2, 0x4, 0x0, 0xc0, 0xffffffffffffffff}) 15:12:18 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0045878, &(0x7f0000000080)={0xa0}) 15:12:18 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) recvfrom$inet(r1, &(0x7f00000000c0)=""/223, 0xdf, 0x10120, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x100, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f00000001c0)="b553cbf1fd7a00359efc27440eb73c844a40a1ea37d833d781350698035d0ecd05aff2ad9628d432cd66b89a2dc1cfc3472084421b2e7fd5006c88022dffb0c3340873569d793ec1172f76efdd6cc1cf45b4de3313caae206f2a601d79e9fe4e6dd001fe774516c8ccc83063f24229c7d0eb724c8c4fc3aba410749e8c514db326f160c64359197194408f75756469b920329bf0c2c0428b18b12f8bd36ea44fc605f0e36bf9f1b5510e13a30c5fb56832e44b541cf9eba1fd754990fd048c4a3f4d0c2514b0f7b1c0beb3d64f3df11f7a9f1a1b25aaa714c2beffce45c157ef77416ebf07ec14e86c8a8ed5f4a25d116a") 15:12:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xb000000]}}, 0x1c) 15:12:18 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4b47, &(0x7f0000000080)={0xa0}) 15:12:18 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(lrw(lrw-camellia-aesni),sha512-avx2)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000240)=""/25, &(0x7f0000000200)=0x123) geteuid() ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x2, 0x6}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000040)={0x0, 0x0, {0xffffffffffffffff, 0x1, 0x9b9, 0x3}}) 15:12:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) rt_sigsuspend(&(0x7f0000000000)={0x8}, 0x8) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff8c, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:18 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5460, &(0x7f0000000080)={0xa0}) 15:12:18 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) [ 734.972949] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:19 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8010550e, &(0x7f0000000080)={0xa0}) 15:12:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x48a) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0x10) 15:12:19 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:19 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000080)={0xa0}) 15:12:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x30750000]}}, 0x1c) 15:12:19 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80087601, &(0x7f0000000080)={0xa0}) 15:12:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0xfffffffffffffcfc) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stack\x00') ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000140)={{0x2, 0x4e21, @local}, {0x307, @random="b104a1b84434"}, 0x18, {0x2, 0x4e22, @rand_addr=0x606}, 'bond_slave_0\x00'}) socketpair(0x1, 0x800, 0x80, &(0x7f0000000000)={0xffffffffffffffff}) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbff, 0x440}, 0xc) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x1, 0x200) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000200)=0x5) ioctl$VT_WAITACTIVE(r2, 0x5607) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:19 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) [ 735.751463] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="04000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000000c0)={r3, 0x10000}, &(0x7f0000000100)=0x8) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600000000000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x2000, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x20000) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000080)={0x34, 0x0, &(0x7f0000000040)}) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x1, 0x8, &(0x7f0000003500)=[{&(0x7f0000000480)="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", 0x1000, 0x5}, {&(0x7f0000000240)="8ab89171d8605326771a42efec393d1da149ed902da2823c9cb05bb9c54763ee46c72d7244b6393163b0974bfc0c9184ed4c43", 0x33, 0xcc7}, {&(0x7f0000000280)="067b0061dc84b8e851d820b910eba722a8ac5be859843f7ca72c7a23baf61a", 0x1f, 0x2400000}, {&(0x7f00000002c0)="8f9c7ccbd72d733cf4839b87d055565bf0b9a637ef64e43729c5b303f2f68023", 0x20, 0x81}, {&(0x7f0000000300)="50b29d5562c5decc76270fc563b0f046ea88a3d72c55e789fbe3b953c288da1e8908be5c1bfc32c3276c011d964530b10ae22c40f8f32c3dadb196f581cce67f58802f8c47685a802a612d03722c3920823821eba03827ac3a7c750dfcd5f07a20bb1ed411393f37f9cbbbc86990c437045ead93c9c1ba7a7917b0ac98537f0dc6bd5d4dac436a2510", 0x89, 0x4}, {&(0x7f0000001480)="97fde51a20f257e46017af35c59cbcc850a5d223ad9f5157e5ac3b7e0d01e56f558a884e1079aa0de1a05325dca47426e545e0b111f2391e11bcf8b2bc47a6bd83dfa173bd324e790b2bc8bbcefdb4ec2c4d0dfaf45752932b560c787e4efebd324e46b5ac7c4b6d120077e15bc13be679a7ad78f362395b876c8cc6601ff7315e637a01cfc1525c56d8b3fea75aabc4ffd09b6490dbfb8bb78598e0a5c6fc4448ece4a83c73954eadae2973fca65ecf42f74a54d57a0c7de532c4f3962389c082717cde1371927a6983210eb92dfe3371f9fc8e5b10ec3f29a4eb9445dba6918cab8f9b3491d8a3824adb7848f8ac7886d2e37d255ba1de1429a2022b8e216fa428375e67bcdcd5f90753680fac3c2fbec05eb7d40d1868a8cf3e6b3027f59adb3cac5bdde1ef9b0dc2f8f5c14cea821e7c08813c46dc2912b7070ab09f93885970fe7222ea538d4589d73aa1a881e4da24298f03ebd5d0b6a7db2474934418da73143a6d380d8cc48e07a3c37b5b90411f9a893e8b4a406dd5cb90c37ac8b6e7da843230dcb4117b417d786d82c8a48d46bdff414b697fd67a93a919a1c5236b80e984eeb06a9807825dc654e1ba80e0d0bc39fe97634ff5e49d8d5733cf248246e941d5f84686c0985c6b1b4badd9731fc6dfa3f23d08a1784985bfa973e9bc14d028e34299e823e2f8ae1c20fa2f9a4a07aa976655000f846872be78aab75bb313db7152984e8fab1f23ce110d7aefd4b57ec7c13d0736270bc59449ccbf67e0abfeeffbb953e51ddc3a4120a21556f911be941c18e967c98a62868583efe1cc0fd143f6c15540c264a05e2fac5a45b6bdabb68c0f63b116af5c7857bb18e2c03f49815acf35e865dca0c0315c95beac96c2dabe90f338ff0d14a5a9eab11aca6eaa03e9982ce1c0fba73537a0aefcc88b95256afbc5ce74f339c014404c832eba7a3290c574aa9f3561a6ce8df171787adedc404395ee14fadb14529fecce268568b6490475506cc6f84f921a48cc30bedda30e53cef34d5ebc8b137d0c3dee2196a1f64f93e15576f0e06a6e72b957786104dfcd516dbbc39e741965421b7ef2431e2db402ae39f765181d48edaea607e8567dcf7e81549eb64758d290ec6cb2c8f0593ca68b5835c4f3937d3db8636e070fdc3be3f8d1b22215e7b22fc1e595454f6dc09b344242d25a33fe0ac1c449352de4d5d57fe3c48f2e809e50827d1424679362096b047ebf08b58679d8417714569ac3780426d00cc8b6cb37d16a0874a4c95a9eb531f5ce61902b092d234baaf1df12abe4e9cbab46c8c0fa1efa3bae8078f8414ea5ae95e241f91b70acbdbe6507607b1b85c3aaf4ebe6676485b3e816e9cd0823f5b7be5770e3e10b69b0c4f4018a714b1bfd8973174801235063efb95820cf1070c6cc3f53b70a53fbed63e10a75260e74fe9091a58edaf3a2dc67116e77d5d4ca82177f2f994512d8b8f1db817da9e74cc64f98e841cb3498e7dde09d048f16ddc0ba02f53245b0b24b56bb2d61dd1ed4ddf46d677c3951898c5249a8c55ec6f080ce4310164d79c8902daca46dd0209db4004b05ea5abdd4a0bb88c53365819e0693a13cfa8d2537fcdbe6a59a983076ca1309d575ee598440671010eda996e161112d6acc2131e3289d91bdb3c16740937c54e4800cd53df58ea1b234536d488929daf32206b0dba5f13b8fdca957fe0227ed9d5adbdbb0f63f19353d49e0f82684db5180a414fb488da7a7dd0508310a5d684221fdab7914b4ad8d2d6b3246c232c014c544c9aee68859b41eee4304a986e180a03b390d761ff3a77f20c643d5a55e1e97ff536d81b8a7550465e9cfa6976a1f1b686c98416e3ae0f7cd16ad4515e1b3310dfcf2768beb346cf7dc759a4bcd7f017033d148ed4c0bc1433295c5bd5fdcda3591caea903117fa321a898ef5e7a85332cc6c0cae5a60a71c091702cc1d94f29900c5bcf6395743b4b920544eeb73cde7f9d700ec35224c26f1663abea687122d52c88b4f444bf3e67a480476f9e0998d07c729770a5158e704a913eeaf53ef41d11f7322737688b43632d8b8aa7943a583c5000d859d9847aed6be0bdc7417331d53c54cd9ddad4170b105ee3aa789520f1c70ec5702459237fdff6bee934b4e21f6240593bf381154fef209fb810ee33f055d660052f56c93f1998cc8da9b10e7f7ccdc2654229ba689eec9904586fc85065697a2755e285ba18dfd074d0026d11d5d366fc45142e91336b82d2ab4545d5fe22fe30b037c68a242da9f8489546b20342af7c232cfb731265663eeb6cdd86d31fcffa8eccefd9ca00e2481ee650b855de72fd80a8e69cf679bb55e602632e8a29d943de75a927ada56431eb97d99452ebc1997006bfbcf5ba82522c164b7df1ad5f709aab9d6fa1647870f2d135597f4d51c78217885b9aa5ff39aadac1671dbfbe7a7db09523dc57af5a50669dc7fa0e6b32036c9be78eac8e0526371b75dbad55cc7864323d1c3325906c9ba3537ba02aa0ac3acd3ca7a54506ea0218c1685c5b7c812a65ade28cdfc1d87bfbee4f698f5ddfb4d6b9519872a22b677c1de36e511649d0393cc0eca1b11ea9af8ce93fe3f7f7a665966fef53f284baba0e5d10ac39d2f8489ac46f7cdf26f7e0344e83ce401f946801229235a3fc0c262e14027d177e2f8138cd68575fbed093b5926d951040ed69da3330b2d3fe95bfe4cf498c727a6203baee5484ee66b5c19a8738ed10035c3d02dc6a8d5458eec4ee2327bc7dbda3301c08dba85ff58522ea26f4bedf13bc44265effef0da42fa8062454f35c3952b908786c7f4e533ae72d36814522b5c952aa68bb1eec28c0041dd6cd509ff462730f937904ff280b53a43acfe2050ad018b2748bc13f394d0815eafc55303f2c856e6b829a73fb07240ff38f93c407c49d83297d24640c20a84bff27c358e25a9242aa0f6fb4255d3ca862a10c3bfa50eb599ba4872a464f9b768baeb008411b26459d2ec898b776ca1c4ea65cafbaf84837bb54178dbd6ae8460aae88eda6e8d381a9ef1fef650a8b92ebd677cf4138882025667cafbf8730f91f1c84eb02c69772aa13a582d65bb785c82635c19698f3372671373033ac9bcfbd75799d57c9d661207662c5f99f90d830d2a3dfaaa91642716f1a93bcc31c0609e6ff3d9c03961e374137fdf404d7fde4975273f51fefaf7233b26540c65961570fc523a85ee1004fdcfd0a73f26456f99856c096a41f78ba25cb3105737945419a407cb0a84fca26fcfcc4007e9687633cb3e757c77810046abc355ecc6e31cfb20a0184acf869ead8d774da99f8a25a5a59c6b58e3220ef281485eb30d31845c87d84902c9df79cb144f3b5f9a30726a65f5c431e57cdead235b2aac0482278aa22edda10963ab48b25fff9b95937bf8a0c68928da2352a1c814b46d1286f014cfcb19f8a75590cc7179b496f041a38f3047c91685d07620e163a4d906a04a6646018c9ef33b796a3405e2823d0da437bc58931cfcaf8f3662a6ec22fcdb4dabdfa120f2be1e3bac8bec9745078be639f07301af5ddc95eea253693b3e9a7376119ccd5f8dade040722192b1250d0aa342fd87fd551cd6acd3145e938e0977ea6161473c6b028446275b0c6285d9049f0696438f4deaeba060a90f3b874cadc5698fd3a00cff07c83a91f7045f994c304d4bfcae747611509b4f034deb7cf6fbaea4e29388dc5a9f4273c814ed51dd827cd7864a8ef02836df07e30ce1f9e037be68e88c87cc350755630b9ced03bb21c6e2ab267a3cfa7d8ef2220a1f5486f72e2feb334c04c3489c0a6a883799b000d78e7128ae400fd93e15ddad4e59fc8e90b4597b7adfa263aa6cda107bca8baf3141b010216ef1bbe20fdc91069eb88dc596c72154174e813458f694dc2b98b527d4b5a974c074a37787e40a55997cae88a0a06b27887dd047d0b924b39b1dd7d32b065c930014f3b3755c5c6e20e5613d1779256468243cd933ae58a11116a2285b0bd8a1921876ef63283d23e6787493e0567cf1305fff203fe95dba669622eda9e1d29b042243ef8e9d5c9b740a488388d1ebbe7973e120428f2a935a167c67b80f248b137fb65352cbffa9426a818a48e10a473160f7031f0ecd74572dac7534e45f0e8812e1cbaa50d18009fedbc1de2d7aac19e987f5dc9cc19444f92b939a87ce565bf74590fbbe77b9bcf537d921913a07270c2429797477dec0c3618454e53ef8598cc6bed418de93a2542ddd0fe3ba74ccb7a31ae2aa7125819659534fbea144a6b81695e8c5091acd40678041cc5cfe058ce61d2b1dd54cf928adf551b6263c9da85e33eca9bfc5fe0164d95fc9f9980d6a48f996f899691358a1bad13376d5f49e86e2c655aa33eebcf644494ecaf6dc3fa46286a82fc8091f68e8948fb358861f02528a7b28f82edca8beba096e7f7c4594648140c36aa5184c460a852707942547f57fd61d330b4577ddaef47a261059a6125fb551d9ade17018cdd72ef532d2c0a1125b961a221d963b49d4f15f16514c72c3aeaf6bcc394c27be8ca1f0be6a84d7f929873e8b3fa8d0762e10abb0fa3ab9580facc8963f720f5f6c202b305eeb2b0c865571bff882c96ce16d0a2d61e129c97105e24fc31b1088355ef66f4a46963ceccac5ab78c5883f830ba608ef5521ff70fda2cbcd17f6f1697a9c0edecafcfad96c2e4887b9624fcd3105de0052cb0efd248a50ad33a58970eb6889c84d58d528ff3722a11e3881f2888d2375d3ded95b32d5cba3e4caf9f2c28a6b80b62b4791fdc845b7a8088800b73bd65667d20baf2ec31605afd3c5179c6e9470f90ac0deaee44f065564bf30ea8f2bd0ff7aa3d7772e49ad6dd3e987950d3f8648093a9dd837512274506e49c95f5532f3008b7015fcb0440a3f1c1b70f5825940db102049247515bcd4f8a94a1a649f8ac76623bde25407a760df9ab9232a674d8c8458b8ee3318c9baf16ab3518b28610b39dafbad9e6b6db6adcceff61c0e2c8c799bf10ee12b85f93e03e278e0f7402233fe810fbfd70c5f100dda669e4d7f50df772ab99703a739872b71a2a93207447172b82df2aa0c0d488dc58a92a4be27e3ed91c7de7e8b428944e4b81f2de32f03464d81ce7bf46df722372f46390bbca4e276ff153324259755f1c816519de1491cddf6f1f2adfabfae3c54e4358a537ccb752cc57ade0f9dbeb0aad9dc698f035a47c13cf1c026983605de2eb1b3c6cf4e0b65eb40f1b621b37e724ce3e8cfb16965e257ba0a09e022a24f7f57857d7bb46844d95803c5488b9bed3a17bec21bd48aef3cc25bc75a1fb1df40ab950a9d8356c827cce556555ac1c97dd179ad42d53266cfa43097921f5fe6234cc97466d0f41dca34a7b68b9e2b06476981f03a2807bd482e524386dff4a1e265ce394cbb3c0c4e67a7828e20b98b61d806d8608b40c0f80a1206a5a757a100945e14cbc7e37725747378efb597f3eb73ce8898e9d0e08bfa8f1478e83a530365c31f1ccd0cf9fa940434f102c93f1e9b5a0b2da18542cd2d29158f12f200a6e14e98bbb64a267eaa54fcc7f1b41b5537019851a055c5daf920687f8926397326343fb702926a625a29421920c4285402908c210223d709d00aeba9e33de9f3020f3060af32ab99ffc3920a985e79a6e729912daa787e4a892bc8dce5fa2f5d33217fa0cab8daf591271bf844afdcaf402538e114b2a076949fcedeeb670050c6dab44a1b0c838944f59fe15b7fb419164c55e47ccca561d474c4d2fc94ae5f88459210844c7d", 0x1000, 0xd45}, {&(0x7f0000002480)="2d355d099d9114f6c8871c4844e4f2af658b31197a74d9c2c4037059f9e3c9629f98efc67481e3922b2145deabb4021800472489f8b10c10f3cd175b601b4a4388f61d9edccbd006f41441cc69678d9eeb3a82575b1d457466b14100b59b33ae26bf0b74e33cd08ab89d898d7c", 0x6d, 0x4}, {&(0x7f0000002500)="683444653ca9ac6441466656553885058361e557c8206450500a625fbe346e9801390a2df6a2409aac543a90e4594c3da5249e47f9824146ec43af303ba55da2d73ef82998c9878d90d30cc7c325dae88cf5cbb6b8bf51fd23de8e6306f586ed7a9ee0684bc0815c5db4e438958c1eaffd633e934ed5c284abff0b9f94c80a4cc0a5fd6599bd506ee9cfc51e4a61669a7389402ecd5d6b9db03a03d677cab8b3d2c45df94d1de1dd12c2b56b5ca86063804a180a595623cf3f1c2f93d60668e4e33fb68b49b6c071e5f31e83083a702c4741df5f537aad0bfd4281197dd4b15aab2b3378888235fb57ca4094764cc6c3185327577a0c5899a1b52f91c3f186eeeb08b14403a752218068ba8e9df6ce56c2f32ed379b592e7b745ac2a76720692fe7df5ea8bba232e906ea5bd6bebd6f4dace67344385b5329a53358929a00f976324cef343c174f561417ab0c98c46b268b13718911852aec604f941067b276c53ee50f4f9d2e0162677e01fef28f7aac4846feb53f4a4bf4551b7f369f63b505b97630126586e21fd52e63530c27282ca0a2e292e76a34a9e4703e79deb2b1f74691a6749c5a21a7a607a290f59df6b534859fcc72b0849de62899020a6c36de7098e0daa3ab1a38458337ce8ba82348945132b4f1cb3541f447b641618bfbca91a46e2aa404ca7633eb0ae4edade4febbf22fb00a5ca7adf497aa51fa8664037f115eb5bea65527c6b17cf29b2b8fb70cf9bdc664886fed68380bad5c17fc707cf0322a19110f203028934219410e35ecf84e9fecd868c951d0c91f8ed4231111f42cee584856acecd015c483414f3d334ae8790cd4ef03b2256d8954f6eafe6ac1774c23e7c94f52d5b4f798c81abce394618155e23302089d79e545ec0f8e4ceb2658d938e501380e29c4db533e174f9de5c83679e5a64ad8321db8d644ac0c333c7f3b603331eaa0ec60c77d4b7143f20d3279bc3c5f809c3811e96465a0a34b0a4bd498766fdc29b1e1c3e56c1d0259cdde36cbe5da290f7c845f20643da86abade89f8a9c24e463c6c57db33245e949144015defce167152779078eb01349b86f19e183dc3c94b5d64d7f0be68a4ffc6e417fbaa56eacfeedd591969b3a275ae49326ba6bf2f50689f545eec608e72e579c4e9c0d35841b0609d2eebb0f91480c6c34c9dd57d6b283debeb15a843877bdda3e1d2720fe5fc54ecf2300fb8579b22ee3efcf58f5b0f3ce64a631a214809129552533d9a158d1c17f1e8028c323d2d3388cb39fc646428a2a529bc74c03f5ea42c629a349090b3c5c4d970543ec221df85c009cde5e4cad2240ccfcf8dcc5df4564ca3717ec144233e427a6653419a507b2e93dd828b3a916410ade791f03986109ccb7b4b60415588eb2583326c335518dbcaf89c6288ab875d14e09afd9248bea28e327cb00b2f19c289c605093d9e22f595d5c9025815872e2f86d46809a212a613ec525d57d11ecf3f0195da6a9f3233efea228e6a857c61fe14e52aa00467bd9b06e591da2b40297e14fc9d898e8f5004ce53269e1e722d97a318d48b237aea827d17bd12b44fee84c9a23d3a740909a9237cd887706ca94d09661dffbb4e1c652d9af86b54e2bad00a63721223948293562d67965d2627d4fadad229f59c422d1ac573f30cc5b63ba0a1ae97a70ad95f7a5a5513f514f21ccb4ca7cef6ce99822f2b6f49c1cd12679136c9e035bda5af8926765a1c3deb260ed7e4977c838d27214777c116a0f26d990dead9727b21c4c995003ba493a03ab3690aa2ad4acf16a32aaa1b6ee02359482d0a29028bf08d3f2edd77886a9b168bd34782e9ca8286221deafbbc7b27d16a91103ca22872824d9e44213d4d2bd198cf640126750c5cff66a6dd9ae9ba1a68cfc3b4a8be29fbe13351f9a56e748802a630aed76e5d768610dab706f97352233a1a62a3514eb3ddca8c950372a89384809655362e5ff469025a21a0ea205bb2b7bf406b51fd4bc5963a4cca31533952efdd36fbf477dad5169df4c548d720e98b91a5669371cf8833036fde127e09c32c7f5289897cd93566af32163514ba64566f85fdf3b428dd3e68559434d743bf9a596f4298fb3fb516429e5c043077683bf5181037cd899b95701a76305d672dd86c9f05e51566656a58d6007e040469758ada387d449d0c87f58c4f6bbfe2e7147afe8f5f2f720bf072f0b5cae50169cd6da7fe186e6008bd487c5fdd291f636adaa65d3ee3fdcdbdef99ba2862bf140502b92a023004f951ff4254e80e9aa566621c734b3c6c68a13e711377e84a9d1bd3cec1dcf4334f9868e04e35190a369b43cc8559752b162b226db3d2b1aa295eeb25976a1e4a26f77cefae12d83540ed57c3a818fcf4216760659cf3af6835f0795bc65bf9363e0ba4ac76e2d08a39ce06c5105115eee74545b7afcca747bc0056f36b9322a0560dfe2faecf721e2072562ad41a68d1c3d599bd384f04d1a731ac7cf3c53c516d2cac9fb483d93b424a65faa46254e84f1f887cd03c7c0e18dc600399df349fb0ca8e5deb028adf5101448198c1ff73b87bd1c74961d34129b104b0ac24feb898725a8f3ea0f0f3d94e64ea3b8b3f8fb7708e6f2d423ac22d5e344d217f03bd92dde9842d5a5316281eb7aff3e928d32f937d5e32884156b7af9f649863c87b9b4628b6ebae9e641dd49ecd99545326412a84256b7606839b46c7e5e507dbc2c95a5c6fbaefa45a798d6011aaa3b70da0cdc507c9582d40f51491f071d214de27735115c4017bb21e669f50ca13c28f5718c2aba5ea4503c44430aa265f14f3b973da593a48502bd852658d11cb979ba2a03faf09cf1b34d5dfb2b17cc1562e77fe1263ee9b8867c17468a8617ba00167fb2171d89ba4c2b6e3efcc8e2631ed1b427f669f5e364f3a983ee99d16a869f66ffc9482ffccef35c09732855ceadca220c165fc10a592eb73104759a764a3ceeb00a6936f18592fce668511f904db25279af4af8ab9689a89ed4a3236d56917eba3f9f2316ecc9bb2f8e01d4876256b252fccc9f26b386b229e1eb3c7d5c46c0e46de81c0a008217b8c9cd5f7b46bd399a6d402949569ee65fd1514c9059970a8f406881d9ec85f7c468a23daa8a06f901029ffd7e2c2a76721153bae4e8d8f65f4648dac4c18ddf225512dce471217b00900d0cef47b9f0800c5f39b8a2b2edbe19e2bfbf2898ac377fce73005be832f9fddb1e1f46c122d936aca79c58785d863bf579df3be583ad02f046aa1ee1d0ca79854b915ee90cda9002d94051922610a1f2336a5f24f818b9a8cbfb70e77f48fab54051ded618beb6b5cee3eaea24bde09b500f24cc497e0140c85f8c1d07b8ab53a6caa6aa395b91af776d143eabd947b212b88c2450a9d772966c6862396498f0c7d10bfcdd03491b21ccc3ea13cec692e9d3394e96fe34a43a2707e46b69d757f82c479569655b81815776bec5208c4264d56b2c822b31e84188698776a3d2150eb33b6e7172c4a634cbdc843ecfe42a2312eaa7236cbb9790429d9c3a82cd0132c0069fd7cbfceb580e4983c9be56486d7429fc266ede5cddf5e53857b4b9c7dd0467c16ead51290ae3db67c48276935df22f970b42e053cef57fcfae6fe27c0c3401224e78baa42d6e9f8f6dfb84d82a9ccda22c177df6f3297ce9d0cba446783627e44a51ead66144b69bea793896a7f39e3cd243d683ca31ca6acc4afcc954d68b3c13d40518fac9750ccf1ed6340df3f615e935247312963fc965a1433c9676ab35a73e42a9dd1c0cce6203acc8ec96c46706512c9eeace97e5f62a2d889c4302f0809a73ce1b8564f59476d20e497ebe447bd1b77a12ce0ac837756a85edfa5e14ca57ce54569819e841b542f62bfa7df69dff74982e97218fd73a9b8351d6989dd00558f715ed885e81a86bea0b32431d57a0995b669fcc831d37fe7f91c412105bf7c02bec378df0c8971c3ba1c98a5e85d74f8fd395ead468c72273118a1ca60a1c969b37b6cd762ef5b8bd41cec2e045a48a96889e8f1b8ffe0890c77156be233877b6af95db69a7e9ae6305a0ced31bca205dd6bc2de894e75556b6eeb4c11608f07d2022aa28f0073f75a990bc0eea16c44bc318aa46d649a421c66bdc02f07a38feb4642865d9069376a7f59ba44e61e70ea44d038c175cb8ec1aca6cdc25bd06fb82d4b8bba3d7c67d98c1104b6f81db3c2ea8a26cad40c979d9f028f8a00c802fe8260db5a27f277c3e791faebea2c965c1bffa534cd9a50ac736f75bfae71b9565f181355d9dcc85578a252e9b05a9921f1cd1f4c75800631653c8ac83b2221bb3dd5e92a3aa7a6255fdf0953b8ce001b356be03939aac2aefdd37fbd1497d845ab01a28a34df24585fc314012c5b426ddd55207f8fcf6ea7e476d99ac4190e3a4d22159dae6467605f06e7d2c029554ac95cd321e60b18b686c623c816df32b41b124f26b0a7ab249e685c003f75cbe72a0f25897d3834caaabb20a87a4baf1ba63a817415b21cebe940e081a6d712b27304df8307e4c0cacced9e6f6393748535be8ee054ff35fe0b9073e1ffb41d12c4c3f84069fa11a5423fd231f749ad505a3b4728a8375d76ccf05122dc48093c527f07256e5bbbef3eaafc7ed014ba682cd8e5d56f9a291a18c9dfdad27860563fcd778608b2668c8597ba5c90fd4c5188412666a9a6749e1d598447e3b2c34eabda696070d2f675db311bbec0ae0379acd3fffb8d691d8256cd3d5fb45e2ac1b7c3ff1623ed1441c1e9902456bbdc9146633d3b063e6021dc165c43a469cf78371553f91d866d83b1800c974ec2e818b3a8596c93a9b5255f2cbe714d1fcc7c12b868db98d7d8c3d668c90dc9a9294744016214e5090c41a6c8bf7af123a43904a7f381649ece94015523141912420c1029af5e1dee152ad7aa1f5b017960e0580437cd55aa6a94e947b1d47107861f4d675308c46144baa1032e739e3c05eeeafe98bbb2fa53b4249d2f58c66c234f7ed8cca79ea5c62b38e8efd29d40feff48559a5b90fe6bc5c0d68c3bbb32208da1cb87a502609bf29d8a4ea27a44b026dbbf0c0a73314413a09cd3851ff6b145bf77249152f8a6ee17d62cf5db56fa2f694218cd95ee0590f1cc8cebc16da479e9db19d8f2ec429cf424d3407effedde6e55afb2cb0c7fd56e66ee8765c614fd4e103f9ea0b3bbbd52cad3c5555eee1d84a3d193076658b2f8ced9c3191555778dc5429daacd302896ea69f5590c17069c7480e1d453a0f0c880538383ff5df15b1a3591e5dc0f1daaf927f34d6e5d0b68f35b855926a49be0fb72263a442d8bf2972af86500def8fd4547f14a3ceeb01e62f0d040f93bff65c1bb98cf3d57ac297c72ae6ddfe64d05151ec63fd92e96445e6bd48c6f708318d748536601d634bdc745ff4ac6fc676644c88befc854f551aa0be1af1405de227fcc45fc27a50a5212d7b441c0a8111401cfbfdd192303c4c6ac92fd1ed7d58914450d1a95cf16f84f178857cf081e5ad1975f5431c3e4475151128b6978c824ae71644dbb41661f84cc59594faa8d2ef2aed24a3914c0c7b770b061a73986fe7e79947368c88af1749f5efc24f8af70362e9e1143e71d3b8cdb668acf0f0202271ec0a1359d5d79c9af872034858d0714c3f7ed43678506bf135328535fb09db78076b6258710a3b25fef3f1e5bf3c8af7cbf3606c040446b62c3d03dd4b561b643119a737422b17077e5d95d4ae2b8254cacbc63765c541cfdd74d3c63f792283937d871e53ecfe3ac79c2919a483d282", 0x1000, 0x1}], 0x0, &(0x7f00000003c0)={[{@quota_on='quota=on'}, {@localcaching='localcaching'}, {@spectator='spectator'}, {@loccookie='loccookie'}]}) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000140)={&(0x7f0000000100)=[0xffffffffffffff80, 0x0, 0x40, 0x1], 0x4, 0x1, 0x8, 0x9, 0x6, 0x1, {0x1d, 0x6, 0x20, 0xfff, 0x6, 0x3, 0x9, 0x6, 0xedf, 0x1, 0x1, 0x7, 0x8b, 0xffffffffffffff67, "ca607e2cfa205e150898189188cbdbad3542795444e164db9542e07f8547d15d"}}) 15:12:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004551a, &(0x7f0000000080)={0xa0}) 15:12:20 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xe4ffffff]}}, 0x1c) 15:12:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x541b, &(0x7f0000000080)={0xa0}) 15:12:20 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) [ 736.154221] gfs2: not a GFS2 filesystem [ 736.155558] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 736.210063] gfs2: not a GFS2 filesystem 15:12:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x60000) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x5, 0x5, 0x1}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:20 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105500, &(0x7f0000000080)={0xa0}) 15:12:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x8, 0x1) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000100)=0x3) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x10000, @mcast2, 0x7fffffff}, @in6={0xa, 0x4e24, 0x5e01, @dev={0xfe, 0x80, [], 0x21}, 0x1}, @in6={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x21}, 0x5}, @in={0x2, 0x4e22}], 0x64) 15:12:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x100) write$UHID_INPUT2(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="0c000000ab00f9fcfefe40a26b44658ef5ed0869295b32b2437dcd162d56116cfa6b8a3e68506de117be9672d0c0c5830c839dd441f84ae00b37921af01e3d22b920e3bb2bee8f43045616b9a2437b12661c9c8fb5a48e9bd8e81eeb1a4525e4e5490429bfc233f6c4e8762ede1bf0adea1e1e6ff93dd0f90e6e097ab3ad82d9cfb42fa6ea0bd6c6f6e99143a3d97ecd3b571c7c35d3deefc4110a74617fa23c9358a7b54e5cb59c4bd285000000000000"], 0xb1) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) setsockopt(r0, 0x0, 0x6, &(0x7f0000001d00)="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", 0xe5f493117023558) 15:12:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x200000000000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x15000000]}}, 0x1c) 15:12:20 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x2, &(0x7f0000000080)={0xa0}) 15:12:20 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x200000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) r1 = socket$alg(0x26, 0x5, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = msgget$private(0x0, 0x112) msgsnd(r2, &(0x7f0000000080)={0x1, "b76a6358d4e221b6905a0673d8b43bf5e5cadfa62f4c573edf9ac88be591b070963766235f6055d74f3c98ed334789cf9b297d9be300c7ba93c5a94e289f1cd099a5f3a96ad004855eabab94652d806cc6ce4244e42deb291f58f633afb1dcd62fd1ae67a010fabb0a57788e58e961eb95d136e08343fecdfd0f042be774ce9c254c7fc0f439ae49f35e270ee0e65a2288eeaca848070f49299f4451000cc035c7"}, 0xa9, 0x800) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x1) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) 15:12:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) rt_sigaction(0x1d, &(0x7f0000000080)={&(0x7f0000000000)="f3aac40125da9472199f00008fe960961ec462c501f736457cffc4a2b0f35e00c48171d0f846dd9700000000c481b5628f0a000000c462b53a06", {0x695}, 0x8000000, &(0x7f0000000040)="f20f5fc0366436362e0405c4232548162266f011684af2cf8fc888a210013e460fedf2c4a231a923a300000100000000008f6810eec00c"}, &(0x7f0000000180)={&(0x7f00000000c0)="40d32fc441795b9d0000000081034bc91b9cc4e111148e0d00000066440f383208c4e17929a304000000c482f930492af2410437426d410f970462", {}, 0x0, &(0x7f0000000100)="0f9946bec422150cc3c4a12455b9ceac0000c4c2a90aa9f5000000c40238f35cf9daf3410f5f09400f41a301000000c4c17877c4825d2fb7000000003e41def8"}, 0x8, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:20 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0xfffffd0d) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000007, 0x80010, r0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x1f0, 0xc0, 0x3d8, 0x3d8, 0x1f0, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x98, 0xc0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@loopback, @dev={0xac, 0x14, 0x14, 0xb}, 0x0, 0xffffffff, 'ip6tnl0\x00', 'ip6tnl0\x00', {0xff}, {}, 0x84, 0x1}, 0x0, 0x108, 0x130, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @common=@unspec=@helper={0x48, 'helper\x00', 0x0, {0x0, 'H.245\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x15}, @broadcast, 0xffffffff, 0xffffffff, 'teql0\x00', 'eql\x00', {0xff}, {0xff}, 0x5f, 0x3, 0x4}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x1ff, [0xff, 0x8001, 0x5, 0x7f, 0x9, 0x2], 0xa055, 0x7fff, 0x20}}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x35}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x11, 0x3}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x30, 0x8, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4) [ 736.877584] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40086602, &(0x7f0000000080)={0xa0}) 15:12:20 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x84000, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x40}, &(0x7f0000000080)=0x8) open$dir(&(0x7f0000000140)='./file0\x00', 0x6001, 0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={r2, 0x4, 0x6, 0x5}, &(0x7f0000000100)=0x10) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) 15:12:21 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045519, &(0x7f0000000080)={0xa0}) 15:12:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4800000000000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$getsig(0x4202, r1, 0x8, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:21 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:21 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550c, &(0x7f0000000080)={0xa0}) 15:12:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="703a2700000000bfaea4fe4c6f6e38b499cab849e57f79576268d266614cb06f7787e49d6fe2a52f6e0a524ef919e722539caa49372f71114486f1c36707d9b0593ed142a1b5bd9d5aa3e6462f4edf8f1a18c336f3942bd47ccdf7fa", 0x5c}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) io_destroy(r2) 15:12:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x200000000000000]}}, 0x1c) [ 737.538594] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:21 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x7ffffe) 15:12:21 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 15:12:21 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x480800) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000180)={0x0, @loopback, @multicast2}, &(0x7f00000001c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@broadcast, 0x4e21, 0x3, 0x4e22, 0x8a0, 0xa, 0x20, 0x80, 0xaff4899a2bef1737, r3, r4}, {0x1ff, 0x100000000, 0x7, 0x6, 0x7137, 0x93d5, 0xffffffffffffff75, 0x3}, {0x2, 0x2, 0x6, 0x5}, 0x7d, 0x6e6bb9, 0x0, 0x0, 0x3, 0x3}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0xa, @in=@loopback, 0x3502, 0x0, 0x0, 0x9, 0x9, 0x104, 0x2}}, 0xe8) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00000000c0)=0xf000) bind$bt_rfcomm(r5, &(0x7f0000000080)={0x1f, {0x8, 0x100000000, 0x8, 0x6, 0x8, 0xffff}, 0xc407}, 0xa) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f0000000040)=0x3000) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1f000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:22 executing program 3: pause() r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x3, @ipv4={[], [], @loopback}, 0x3}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1, 0x1}, 0x8) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ip_vti0\x00', {0x2, 0x0, @multicast1}}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:22 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) getsockopt$sock_int(r1, 0x1, 0x3d, &(0x7f0000000000), &(0x7f0000000040)=0x4) connect$unix(r0, &(0x7f0000000200)=@abs={0x1, 0x0, 0x1}, 0x6e) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045503, &(0x7f0000000080)={0xa0}) 15:12:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0xfffffffffffff001) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) r3 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) sendmmsg$alg(r2, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x3000000]}}, 0x1c) 15:12:22 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7400, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) [ 738.407151] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5451, &(0x7f0000000080)={0xa0}) 15:12:22 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x550b, &(0x7f0000000080)={0xa0}) 15:12:22 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) recvfrom$unix(r0, &(0x7f0000000400)=""/115, 0x73, 0x140, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000300), &(0x7f0000000340)=0xc) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) select(0x40, &(0x7f0000000000)={0x0, 0xd, 0x8001, 0x3, 0x9e, 0x8, 0xffffffffffffffc0, 0x3b5}, &(0x7f0000000040)={0x6, 0x3, 0xff, 0x9a, 0x10001, 0xc86, 0xed0, 0x10000}, &(0x7f0000000200)={0xffffffff, 0xf6, 0x8, 0x0, 0xafc, 0x8000, 0x7}, &(0x7f0000000240)) pipe2(&(0x7f00000000c0), 0x0) 15:12:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc020660b, &(0x7f0000000080)={0xa0}) 15:12:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0xffffffffffffff54) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x111802) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000040), 0x4) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:22 executing program 0: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x9}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000640)={r1, 0x6}, &(0x7f0000000680)=0x8) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xbbf020cb6a61922f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x410001) write$UHID_CREATE(r3, &(0x7f0000000500)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000400)=""/218, 0xda, 0x81, 0x0, 0xffffffff80000001, 0x1750, 0x3}, 0x120) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bind(r3, &(0x7f0000000200)=@in6={0xa, 0x4e23, 0x9, @mcast2, 0x80}, 0x80) pipe2(&(0x7f00000000c0), 0x0) 15:12:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000080)={0xa0}) 15:12:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff00000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xe6050000]}}, 0x1c) 15:12:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:23 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x551f, &(0x7f0000000080)={0xa0}) [ 739.076798] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:23 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) accept$packet(r2, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001580)=0x14) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000015c0)={@rand_addr=0x4, @broadcast, r3}, 0xc) 15:12:23 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000080)={0xa0}) 15:12:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$KDENABIO(r1, 0x4b36) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000180)) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x80) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x7}, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x82000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x0) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000140), 0x2) connect$can_bcm(r2, &(0x7f00000000c0)={0x1d, r3}, 0x10) 15:12:23 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105502, &(0x7f0000000080)={0xa0}) 15:12:23 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) 15:12:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x80000) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0xfffffe95, &(0x7f00000003c0), 0x1b}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @rand_addr=0x1f}, @in={0x2, 0x4e24}], 0x20) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) 15:12:23 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc00c5512, &(0x7f0000000080)={0xa0}) 15:12:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x10240) openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffff00000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:23 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) pipe2(&(0x7f00000000c0), 0x0) 15:12:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000004540)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004340)=[{{&(0x7f0000000080)=@generic, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/121, 0x79}, {&(0x7f0000000000)=""/47, 0x2f}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000000180)=""/200, 0xc8}, {&(0x7f0000000280)}], 0x5, &(0x7f0000001480)=""/220, 0xdc, 0x7f}, 0xfffffffffffffbff}, {{&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001580)=""/192, 0xc0}, {&(0x7f00000003c0)=""/62, 0x3e}, {&(0x7f0000001640)=""/158, 0x9e}, {&(0x7f0000001700)=""/184, 0xb8}, {&(0x7f00000017c0)=""/219, 0xdb}, {&(0x7f00000018c0)=""/63, 0x3f}, {&(0x7f0000001900)=""/142, 0x8e}, {&(0x7f00000019c0)=""/16, 0x10}], 0x8, &(0x7f0000001a80)=""/149, 0x95, 0x9d6}, 0x5}, {{&(0x7f0000001b40)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001bc0)=""/210, 0xd2}, {&(0x7f0000001cc0)=""/192, 0xc0}, {&(0x7f0000001d80)=""/213, 0xd5}, {&(0x7f0000001e80)=""/55, 0x37}], 0x4, &(0x7f0000001f00)=""/247, 0xf7, 0x8}, 0x5f}, {{&(0x7f0000002000)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000003700)=[{&(0x7f0000002080)=""/140, 0x8c}, {&(0x7f0000002140)=""/86, 0x56}, {&(0x7f00000021c0)=""/209, 0xd1}, {&(0x7f00000022c0)=""/254, 0xfe}, {&(0x7f00000023c0)=""/115, 0x73}, {&(0x7f0000002440)=""/224, 0xe0}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/171, 0xab}, {&(0x7f0000003600)=""/224, 0xe0}], 0x9, &(0x7f00000037c0)=""/93, 0x5d, 0x4}, 0x1f}, {{&(0x7f0000003840)=@generic, 0x80, &(0x7f0000003ac0)=[{&(0x7f00000038c0)=""/174, 0xae}, {&(0x7f0000003980)=""/11, 0xb}, {&(0x7f00000039c0)=""/18, 0x12}, {&(0x7f0000003a00)=""/164, 0xa4}], 0x4, &(0x7f0000003b00)=""/122, 0x7a, 0x9}, 0x40}, {{&(0x7f0000003b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000003cc0)=[{&(0x7f0000003c00)=""/130, 0x82}], 0x1, &(0x7f0000003d00)=""/4, 0x4, 0x6}, 0x80000001}, {{&(0x7f0000003d40)=@xdp, 0x80, &(0x7f0000003e80)=[{&(0x7f0000003dc0)=""/164, 0xa4}], 0x1, &(0x7f0000003ec0)=""/183, 0xb7, 0x2}, 0x4}, {{&(0x7f0000003f80)=@nfc, 0x80, &(0x7f0000004280)=[{&(0x7f0000004000)=""/134, 0x86}, {&(0x7f00000040c0)=""/74, 0x4a}, {&(0x7f0000004140)=""/133, 0x85}, {&(0x7f0000004200)=""/103, 0x67}], 0x4, &(0x7f00000042c0)=""/114, 0x72, 0x1}, 0x4}], 0x8, 0x12100, &(0x7f0000004580)={r1, r2+10000000}) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f00000045c0)={{0x2, 0x4e21, @broadcast}, {0x6, @dev={[], 0xc}}, 0x48, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, 'veth1_to_bridge\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000040)={0x1, 0x1, 0x800, 0x9, 'syz1\x00', 0x8}) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:23 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4b49, &(0x7f0000000080)={0xa0}) 15:12:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000040)=0x4) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x10001) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x8a03]}}, 0x1c) 15:12:23 executing program 3: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r0, 0x401) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x141801) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'lo\x00', {0x2, 0x4e24, @rand_addr=0x3}}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cast6)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x0) 15:12:23 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)=0x7fff, 0x4) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in=@dev, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) 15:12:23 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40087602, &(0x7f0000000080)={0xa0}) [ 739.831297] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:23 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0045878, &(0x7f0000000080)={0xa0}) 15:12:23 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200080, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000300), &(0x7f0000000340)=0x8) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x1868d5da5afc7741) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000200)="1da4fbd67baae8e4ea0c694b5b68128d2611b36e4a8305f0967d0dde7df9f3adc70fbed9fea7888f89c7c4e24401de1274390c68185821fe17f34a7e292505dff148be2f98c243d279518fa861943d0d9e98f6b9fdd602b78d3e64f1eb0b45b43c7966434db8b34e3c2da8ea57") accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x18000, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xffff) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x8, 0x20}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000000c0)={r2, @in={{0x2, 0x4e24, @rand_addr=0x5}}}, 0x84) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r3, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x16}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x30}}, 0x40008c0) 15:12:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700000000000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:24 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='reno\x00', 0x5) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:24 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185503, &(0x7f0000000080)={0xa0}) 15:12:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0xa8, "b4652a4f1f557723e7b8dbedd71dd9f19d7d570bef8e28047a667394f27cc8eaa6983dc21f11ab36fe9663b3bdda73e5dcfa6b901ea0612cc1bae94d2d2a7942094f3535aae5e6234a2bc575250e5e31135840c527b67fb2e4f45ddbf417794b5c5297152b37dfe9dbac44a78f79e5fd2d29e8cbf2f9e34d111ba78c5760dafc193367ef5311bafdba47375cfb58df42b6ec6f0085b1103b734fa08b04de9c4c3788b0b1e436ce54"}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140)={r3, 0xffffffffffffffff}, &(0x7f0000000180)=0x8) 15:12:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000040)={0x3, 0x0, [{0xb, 0x6, 0x9df, 0x9, 0x8}, {0x40000000, 0x40, 0x0, 0x9, 0x4}, {0x0, 0xfffffffffffffff7, 0x7f, 0x8, 0x26}]}) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xe605]}}, 0x1c) 15:12:24 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f0000000080)={0xa0}) 15:12:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:24 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) setsockopt$inet_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000000)=0x7fffffff, 0x4) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) write$binfmt_aout(r0, &(0x7f0000000400)={{0x0, 0x1, 0x5, 0x227, 0x265, 0x7, 0x12, 0x4}, "23044984997c39baf7d30fdd44440d914fef0082e030c8e807543d025b46a1aaf38127bb36656b55b90a73bd268d52af6edcaf80bab8ac1c0794e15ee1a543cd6758ec8fea1e3fe912a01f9a97a3c883e40328da120da9034866d403d0e779c4e214ad0f8a23f7c3542e45ff4b4c1beab06188f8067e84d0793964ff066a138d99013a0b181ac921dd2ae0d8aac0915ecbec58609ac716b4c73bef4deb66412341283e7b1a181b1714bea28f66a0e040caadeba827aa002e7be39d2f65cbe6cda7", [[], [], [], [], [], [], [], []]}, 0x8e1) pipe2(&(0x7f00000000c0), 0x3ffffff) 15:12:24 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000400)={@empty, @local, 0x0}, &(0x7f0000000440)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'rose0\x00', r2}) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x800, 0x8000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000004c0)={0x2, 0x70, 0x7, 'queue0\x00', 0xffffffffffffff00}) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x401, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x10000000000}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000580)=@assoc_value={r5, 0x19}, &(0x7f00000005c0)=0x8) fstat(r1, &(0x7f0000000200)) pipe2(&(0x7f00000000c0), 0x0) [ 740.630501] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:24 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5450, &(0x7f0000000080)={0xa0}) 15:12:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7f, 0x800) getsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000040)=""/119, &(0x7f00000000c0)=0x77) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:25 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000340), 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x7, 0x1, 0x80000001, 0xfa5d, 0x0}, &(0x7f0000000240)=0x10) sendmmsg$inet_sctp(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=@in={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000400)="77878231733913d695dae5ca0645aa9e34665642c3724e5cefbe0e2c7b0bb42c9c801888567c2166415d8afbc063cc84c5c6ddbd531cb5ccca758dd22c046a15ca994ad7749b66e392eeddfbc0c22e02e7bed20a654df7694dffb9a359c2ced3aa56ca358b284964ee76693feca37fa13fa79975af4876d482c17e38b202b61682e46d92616f5a2811813b9dd27912e59894af2460043a688e8e1726b7", 0x9d}, {&(0x7f00000004c0)="fd32404d7d1f4b4daf40ba1aad54ef59047204599504c92af8b454fe6839b61f8bfc8298337acb54c5c9264888ed5c9572f34b33650d2e9841482b94a12e149e39e5a0f901c39abc0617ac1f2dd48db6126afd7076ec46685801ae0c228e7a52c576c8770e23115a949f8b928d57ae63279b7e4586a27f1221e2f5cf7b67cea2a5b3eb26bbfdd64d635ad29bc57c45c045b64a3a66805df91001efe9c7adbb2c1e8ddc92848e0c02b730", 0xaa}], 0x2, &(0x7f0000000580)=[@authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @authinfo={0x18, 0x84, 0x6, {0x3}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @sndrcv={0x30, 0x84, 0x1, {0x100000001, 0x0, 0x0, 0x9a, 0x5, 0x0, 0x4, 0x1214, r1}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}], 0xa8, 0x20000000}], 0x1, 0x800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:25 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3016cf65, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0189436, &(0x7f0000000080)={0xa0}) 15:12:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffd, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xffffffe4]}}, 0x1c) [ 741.118352] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:25 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={"08006e645f02000000000000003be610", {0x2, 0x4e24, @rand_addr=0x7}}) write$selinux_user(r0, &(0x7f0000000000)={'system_u:object_r:getty_exec_t:s0', 0x20, 'user_u\x00'}, 0x29) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x8000, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000200)={0x5}) pipe2(&(0x7f00000000c0), 0x0) 15:12:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000080)={0xa0}) 15:12:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x8000, 0x2, 'client1\x00', 0x0, "23c80e3fc2a10f9a", "4de16fee3e9795f4e04e8e10a47f34808f3d3f237bcc577c21b19bb7395ef04a", 0xffffffffffffffc7, 0x4}) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551c, &(0x7f0000000080)={0xa0}) 15:12:25 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0xc00ff, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x800, 0x110) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0xfffffffffffffe02) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x0) 15:12:25 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80085504, &(0x7f0000000080)={0xa0}) 15:12:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) socket(0x9, 0x80000, 0x400) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x20000) 15:12:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x2, 0x4) 15:12:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551d, &(0x7f0000000080)={0xa0}) 15:12:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xb804000000000000]}}, 0x1c) 15:12:25 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x100, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000180)={0x3ff, 0x6, 0x7, 0x1f, 0xff, 0x2}) fcntl$setlease(r0, 0x400, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/194, &(0x7f0000000100)=0xc2) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x9) r2 = accept4(r0, &(0x7f0000000300)=@pppol2tpv3in6, &(0x7f0000000380)=0x80, 0x80000) getsockopt$inet_mreq(r2, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @local}, &(0x7f0000000240)=0x8) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x8000, 0x0) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000002c0)=0x9) 15:12:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000080)={0xa0}) 15:12:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x800) 15:12:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8108551b, &(0x7f0000000080)={0xa0}) 15:12:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) fcntl$setlease(r0, 0x400, 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x49569d7ced8bff06) accept$alg(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100000001, 0x400000) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000040)={0x2, 0x2, 0x5, @link_local, 'bridge0\x00'}) [ 741.910765] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor5' sets config #160 [ 741.927026] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:25 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) userfaultfd(0x80000) pipe2(&(0x7f00000000c0), 0x0) 15:12:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4008550c, &(0x7f0000000080)={0xa0}) 15:12:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x100000000000a, 0x3, 0x8, 0x10}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000180)={r0, &(0x7f0000000080), &(0x7f0000000040)}, 0x20) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x0) 15:12:26 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000040)=0xe8) connect$packet(r0, &(0x7f0000000200)={0x11, 0xf7, r2, 0x1, 0x7fffffff, 0x6, @broadcast}, 0x14) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000240), 0x4) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x6000000]}}, 0x1c) 15:12:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x22080, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:26 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000002880)='/dev/vhci\x00', 0x400, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000400)={0x4, 0x0, [{0x80000007, 0x3, 0x4, 0x38, 0x8, 0x1, 0x1}, {0x40000005, 0x3, 0x1, 0x8000, 0x401, 0x2, 0x40}, {0xb, 0x3, 0x3, 0x7fff, 0x80000000, 0x2, 0x80000001}, {0xb, 0xffffffffffffff01, 0x2, 0x5, 0x8, 0x7, 0x3}]}) sendmsg$key(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x2, 0x5, 0x1783b0ac, 0x8, 0x8, 0x0, 0x70bd26, 0x25dfdbfd, [@sadb_ident={0x2, 0xa, 0x7f, 0x0, 0x80000001}, @sadb_lifetime={0x4, 0x7, 0x2, 0x6, 0x80, 0x7fffffff}]}, 0x40}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x9) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000002780)=""/8) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000025c0)='/dev/snapshot\x00', 0x400001, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) pipe2(&(0x7f00000000c0), 0x0) recvmmsg(r0, &(0x7f00000024c0)=[{{&(0x7f00000004c0)=@hci, 0x80, &(0x7f0000000740)=[{&(0x7f0000000540)=""/67, 0x43}, {&(0x7f0000000340)}, {&(0x7f00000005c0)=""/89, 0x59}, {&(0x7f0000000640)=""/248, 0xf8}], 0x4, &(0x7f0000000780)=""/110, 0x6e, 0x80000001}, 0x5}, {{&(0x7f0000000800)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000880)=""/36, 0x24}, {&(0x7f00000008c0)=""/171, 0xab}, {&(0x7f0000000980)=""/36, 0x24}, {&(0x7f00000009c0)=""/95, 0x5f}, {&(0x7f0000000a40)=""/104, 0x68}, {&(0x7f0000000ac0)=""/252, 0xfc}, {&(0x7f0000000bc0)=""/61, 0x3d}, {&(0x7f0000000c00)=""/195, 0xc3}, {&(0x7f0000000d00)=""/20, 0x14}, {&(0x7f0000000d40)=""/150, 0x96}], 0xa, &(0x7f0000000ec0)=""/158, 0x9e, 0x7}, 0x9}, {{&(0x7f0000000f80)=@nfc, 0x80, &(0x7f0000002440)=[{&(0x7f0000001000)=""/46, 0x2e}, {&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000002040)=""/168, 0xa8}, {&(0x7f0000002100)=""/217, 0xd9}, {&(0x7f0000002200)}, {&(0x7f0000002240)=""/130, 0x82}, {&(0x7f0000002300)=""/36, 0x24}, {&(0x7f0000002340)=""/229, 0xe5}], 0x8, 0x0, 0x0, 0x3}, 0x5}], 0x3, 0x0, &(0x7f0000002580)={0x0, 0x989680}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002680)={{{@in=@multicast2, @in6=@loopback, 0x4e20, 0x5, 0x4e22, 0x8, 0x2, 0x80, 0x80, 0x6a, r4, r5}, {0x5, 0xfffffffffffffffa, 0x4, 0x0, 0x5a, 0xfffffffffffffff8, 0x4, 0x7fffffff}, {0xa198, 0x0, 0x6, 0xfffffffffffffffd}, 0xfffffffffffff801, 0x6e6bc0, 0x2, 0x1, 0x1, 0x2}, {{@in6=@local, 0x4d5, 0x2b}, 0xa, @in=@rand_addr=0x6, 0x0, 0x3, 0x1, 0x0, 0x20, 0x9, 0x2}}, 0xe8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000340)=0x0) write$FUSE_LK(r1, &(0x7f0000002200)={0x28, 0x0, 0x8, {{0xd71, 0x7a4, 0x0, r6}}}, 0x28) 15:12:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="71e67a15cdf0319fa22748f9f20fa91c66b3", 0x12) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) [ 742.662265] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:26 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x1) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000000240)=0x6e, 0x800) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000400)=0x2b) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000000c0)={@rand_addr, @broadcast}, &(0x7f0000000280)=0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f0000000000), 0xffffffffffffffff) 15:12:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x8000, 0x0, 0x4, 0xc1, 0x6, 0x5, 0x3, 0x9}, &(0x7f0000000040)={0xffffffff, 0x7c, 0x3, 0x200, 0x10000, 0xffffffff80000000, 0x177, 0x9}, &(0x7f0000000080)={0x8c, 0x101, 0xffffffff, 0x9, 0x4, 0x8c5, 0xb90}, &(0x7f0000000100)={r1, r2/1000+10000}) 15:12:26 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) accept(r0, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000240)=0xfd6c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x9, 0x80) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000180)) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x8000000000000, @loopback}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000200)={0x3, 0x4}, 0x2) linkat(r3, &(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000040)='./file0\x00', 0x0) 15:12:26 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40085511, &(0x7f0000000080)={0xa0}) 15:12:26 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000f515f7270b1b554300000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000300)={0x16, @empty, 0x4e20, 0x0, 'sh\x00', 0x4, 0xb1, 0x51}, 0x2c) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000400)="c933de3bf9a682117daffcefc94f0a00405b564b18afef0549fb518029f1dc30f277b85296664243ecbeebd4c9326c0599613f1486992d8694b058041a8589ce59a0381d446d421c2427a888557e6a2b6fe415a2849adcb35320430a0453cb73d4cad87e13adfc4c5edc98f84d9d62785876a0c029accd590c3ec43911d22a2a1d0ab97fdad11b8c77d3ad8a8e0a9a1c3b57a78203e6b93ee846588b6c3e2d60fbefe242843c405c8e55c4f24863382649d5906eb2f5e894f3ccf5dc472657fb64be52de21cc7a8acc523d4c7c9e34116b1812", 0xd3, r1) pipe2(&(0x7f00000000c0), 0x0) 15:12:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x31, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x0) [ 743.034359] IPVS: set_ctl: invalid protocol: 22 0.0.0.0:20000 [ 743.064000] IPVS: set_ctl: invalid protocol: 22 0.0.0.0:20000 15:12:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x801000c9]}}, 0x1c) 15:12:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) socketpair(0xa, 0x80005, 0x400, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0xf4a7}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r3, 0x5}, 0x8) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:27 executing program 3: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote}, &(0x7f0000000080)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x0) 15:12:27 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) write$P9_RSTAT(r1, &(0x7f00000004c0)={0xac, 0x7d, 0x1, {0x0, 0xa5, 0x100000001, 0x101, {0x83, 0x3}, 0x200000, 0x80000000, 0x3, 0x2, 0x0, "", 0x5a, "88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d800", 0xb, "5b5d657468307070703081", 0xd, 'bond_slave_0\x00'}}, 0xac) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000400)="79a1e476c4577c9881c684ad80abfcaf2989f2af41efc7bd75430d66edfcc8ba532e663f314da1e19a1b996cfd57262f140af8db926d4eccc6cb2e3dff35c69c01ef1f4e0d5a8869a1b83df283fedddf5a4f59af8efa2e95233e7b66132d730157221e0c12040142d7e358dbb86b3a65bb006949071c62224d2fe176cab1c930713146", 0x83) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:27 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008550e, &(0x7f0000000080)={0xa0}) 15:12:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) exit_group(0x401) lseek(r0, 0x2, 0x3) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x33, 0x40) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x3}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="98643a0869c1999aa189fb61eaef21cdf5193cca53361876355d17ca98b7cd950cf5e9dbd04e055bdf12e70f502d2895d020b78628016f4245f4b92115490b95db6bd8eb5f0f89435a961db3814af07e6c0dd6f569f87c8d59139a1cc10b3009406795835a8e4bd3f472760d07614f02ce47eb1787729af4b3ae8ea04f8bf1fc06d564ebc68c3876ea9ef08b01cc265249d861e4c2e5f69881414e4bc6a1e0c02ab75179c7e96f42cf2d16d5134472e8c92578c3df26834e76e8", 0xba}, {&(0x7f0000000180)="510040a8c89d4d5e37632f792d2dfc7a7881f748c6e4f592f4bea388aab8f187775fc452e1c9fdccc9dc38c8839507b4a696", 0x32}], 0x2, 0x0, 0x0, 0x10}, 0x20000000) 15:12:27 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4008550d, &(0x7f0000000080)={0xa0}) 15:12:27 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) sched_setscheduler(r1, 0x6, &(0x7f0000000200)=0x3) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x100000000, 0x8, 0x1, 'queue1\x00', 0x8}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) [ 743.321894] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:27 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045518, &(0x7f0000000080)={0xa0}) 15:12:27 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x208000) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) accept4$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0xfffffffffffffe45, 0x7fffe) 15:12:27 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'teql0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f0000000200), 0x0) 15:12:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x2000000]}}, 0x1c) 15:12:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = dup3(r0, r1, 0x80000) r3 = memfd_create(&(0x7f0000000000)='aead\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x1, 0x3f}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x10001, 0x8, 0x207, 0x101, 0x10001, 0x0, 0x2, 0x4, r4}, &(0x7f0000000140)=0x20) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0xffffffffffffffa4) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x1000000, 0x10, r2, 0x0) writev(r0, &(0x7f0000000380), 0x0) dup3(r3, r1, 0x80000) 15:12:27 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5514, &(0x7f0000000080)={0xa0}) 15:12:27 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xc800, 0x0) write$binfmt_elf64(r0, &(0x7f0000000d00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x1, 0xffffffffffff0000, 0x80000001, 0x2592b0fb, 0x11dead9f7bf17707, 0x3f, 0xffffffffffffffff, 0x27d, 0x40, 0x2a7, 0x9, 0x1533, 0x38, 0x2, 0x6, 0x10001, 0xd4}, [{0x60000000, 0x6b2, 0x7, 0x81, 0xfd53, 0x0, 0x401}, {0x6474e555, 0x0, 0x6e, 0xe49, 0x2, 0x400, 0x2, 0x3}], "1a2a5a1b8bbecf148411bef5665a5eaaedb273de7daf00ab6b75c199dde508872c2575710394cf525039d40bb0b6de50d68433ff559d3e06e3471d5da2b4139d96685821e4fee1d12dc803995296f3afc6cba1fc15d6dbf4bae1d5ae06e44ec8e9a2911c67b943b26b3abeeccbdbda9e43507f5fb861b9eff3af1b6407fcf28d26d5eaf6de806aee1b7436193fbb05c3f47d21aa5b783cefa9cda6f0208cdce60a05a5fa14ed61e0967b45ca901e6184ae3117ce7bdfd158a6e8dd1a66abfcc8259f8defe90f", [[]]}, 0x276) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x6a}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x2, 0x8, 0x201, 0x7f, 0x8, 0x8, 0x6, 0xfff, r1}, 0x20) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:27 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x90800, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0x30) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000040)={0x81, 0x9}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000240)={"6c6f6ec6fa50bd6176653000", {0x2, 0x4e24, @multicast1}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c00, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) [ 744.046680] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004551e, &(0x7f0000000080)={0xa0}) 15:12:28 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000440), &(0x7f00000004c0)=0x68) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}}) chmod(&(0x7f0000000400)='./file0\x00', 0x44) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x3, 0x80000001}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000300)={r2, 0x4, 0x2, [0x0, 0x4]}, &(0x7f0000000340)=0xc) pipe2(&(0x7f0000000540), 0x3ffd) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) 15:12:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x7) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000080)={0xa0}) 15:12:28 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={r1, 0xfffffffffffffff9, 0x30, 0xf06, 0x7}, &(0x7f00000000c0)=0x18) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) connect$l2tp(r0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @multicast2}, 0x1, 0x0, 0x4, 0x2}}, 0x26) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x2) 15:12:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xb8040000]}}, 0x1c) 15:12:28 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x101000) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000200)=r2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5452, &(0x7f0000000080)={0xa0}) 15:12:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) accept4(r0, &(0x7f0000000000)=@vsock, &(0x7f0000000080)=0x80, 0x80000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) write(r1, &(0x7f00000000c0)="d53ab1eecaf3da6b6a1e4dc1c8d032f7d679c77f734754eca54c30621d47d48ff9480d21aa3cf372555f39281d", 0x2d) 15:12:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:28 executing program 0: socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000500), &(0x7f0000000280)=0x30) r1 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000000)={'bcsh0\x00', {0x2, 0x4e22}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r2 = request_key(&(0x7f00000002c0)='blacklist\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580)='ppp0vboxnet1&(vmnet1\x00', 0xfffffffffffffffb) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000780)=0xff) keyctl$setperm(0x5, r2, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000005c0)=0xc) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bridge_slave_1\x00', {0x2, 0x4e23, @rand_addr=0x3f}}) write$FUSE_NOTIFY_DELETE(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x83) rt_sigaction(0x39, &(0x7f0000000300)={&(0x7f0000000140)="0fd13df8e6756b677a0fdfa714c0352cc4e3812012aac4c30d0ab700000080cecf66440fe18b35a4a23d40040067430f381d156f000000c4817ee62be30ea4", {0x80000000}, 0x48000000, &(0x7f0000000240)="cca27d6d34cdd1008e08612ef2f66f008f0f15d5a400003626440f002500000080f347ac479266460fe31f8f0978db6a8c664723720d"}, &(0x7f0000000480)={&(0x7f0000000400)="2e67660f7e86f842bc9c0f70a5bcf8a00d68660f11c3c4815dd4b0ffefffff430f788729000000660f383fb7b894ce5f2626660f38318700000000650fc4acafb700000006f242a4f04681aa9642002a32233333", {}, 0x0, &(0x7f0000000340)="c4a3292253e2ffc4037960550f01f043f71ec441f9f2c2c48215ba6807c423ed496c96b574c4224516123ef390f20f78f96d062ef30f2aa2aa3f0000"}, 0x8, &(0x7f00000004c0)) pipe2(&(0x7f00000000c0), 0x0) 15:12:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0xa0}) 15:12:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8ff0000000069a2f8ff00000000bf2000000000000095"], &(0x7f0000000100)='GPL\x00'}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_emit_ethernet(0x66, &(0x7f0000000140)={@empty=[0x2b], @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0xb}}}}}}, &(0x7f0000000000)={0x1, 0x1}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) [ 744.733560] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:28 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0xffffffffffffff00) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185508, &(0x7f0000000080)={0xa0}) 15:12:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xa0]}}, 0x1c) 15:12:29 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) fdatasync(r0) 15:12:29 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa1}) 15:12:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x800) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x600, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="f70000000ac15ac06a6b41233a58bc97f25af56e63add91293ea2f3e99a563d3351beeac4e7078bf622db2947bdc8f456088a335d0ae16a3257307c4aba2925e71296fc91a49a60ac633c21200587cd76bd34a7aaa90f34ed69bc69407a69953ecd0f3bb1be111dfd7f9cb07fac0c9fff44889fb057ef2755c23cb76b71099a4aad46da7b10120d81b255a64c216fd5d27aa968e54083e06c4e19e0bed7a5f10f72d2250cff88a6377720981b107b45486ce2ca752823a16b0016f5582dc1bf1eb9025fe811c0becea81dc305524a56bdbee208492c3dc0f2932e211e557b9bc7dfa77e6c85da269563f3139f724375dc4b4130f7935feed079607ce9b97ba6ab56783"], &(0x7f0000000180)=0xff) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000001c0)={r3, 0x80000000, 0x1000, 0xfffffffffffffc01, 0x2, 0x80}, &(0x7f0000000200)=0x14) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x3a, &(0x7f00000003c0)}}, {{&(0x7f0000000240)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000340), 0x178, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:29 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getpeername(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000400)=0x80) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000240)={"b51513715f736c047665763000", {0x2, 0x0, @local}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) pipe2(&(0x7f00000000c0), 0x0) [ 745.337276] usb usb5: usbfs: process 8280 (syz-executor5) did not claim interface 0 before use [ 745.346783] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:29 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0xfdfdffff00000000}) 15:12:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x404) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(seed-generic)\x00'}, 0x58) 15:12:29 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) prctl$getname(0x10, &(0x7f0000000500)=""/4096) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'ip6_vti0\x00', {0x2, 0x4e23, @multicast2}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={'syz_tun\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x8100, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000240)={0x3, 0x9}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000340)={'erspan0\x00', {0x2, 0x4e21, @multicast2}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) sendto(r1, &(0x7f0000000400)="8e8fd5400aec172377a96cd83146f46bacbc0102e4b60adecec37c9c4d55e5635ebb57a956e74ddf63ed8b34d03340920136a76f13cd0ecd867d0302a96256a3a479f967a17e73165ba42841f0a03168c6df9cdb3bf37ba534a8917d35562d5d13d8277234f0ea562c28703af83367672b482ce225bd2f9e587f36e5408c393a94f326ba58adaa52432bc2f216e9c87a46eba8b16840e7a3de4b43f6fbdc064467323b167074166edd0caa3cd2fe8dd4c7446439448a0f932d4f4fecd289adcf290fee72a4619f1ccbdc8e49b7ec5ffbb336eb5516e1eacab457ae5f469400f212", 0xe1, 0x4, &(0x7f0000000000)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) 15:12:29 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0xc8, "953577a957594125c2909560d8606fdea374ab11bce195f0435bb82d5adbefd7c0f80e277643ba0641d8cdd5ba095c44da57b5304cd6ba86b8b23bd5cde71d9d2fb058c2bbeca7f2dad885c60ae46c8f03140956e4693ea8dde68a9d72650948baa2030001388d366cee86bd84336a6dfa03709c32b2d5ed284cb9be7c81e6ee337ebb2ab1d0f8ad812b4a17d1bc37081d59d9f7ca8ce93b06cbefd1342a6ca03350722919d8eb4becde44e6cf9ec38fe82fd10a0ccbe2eca37e5145bf24f4084ea3252ebcc809da"}, &(0x7f0000000100)=0xd0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r1, 0x200, 0x8, 0x5}, &(0x7f0000000180)=0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) [ 745.595854] Unknown ioctl 1074835114 15:12:30 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000040)=0x30) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_netdev_private(r0, 0x89f8, &(0x7f0000000000)="664160308c35767511def5c4") ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:30 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x3000000}) 15:12:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4840, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000040)={0x6, {{0x2, 0x4e21, @local}}}, 0x88) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x3, 0x28, 0x8000, 0x2ab, 0x94, 0x0, 0x100, 0x1, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x7f, 0x8201, 0xfa2, 0x5, 0x10000, 0x8, 0xe7, r2}, &(0x7f00000001c0)=0x20) 15:12:30 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x800) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000480)=ANY=[@ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="93115b38705d6c9e9d1f31491acc055ce5b5d8803a767fd69aa7d907c5d0a6664fa70564a7dfea64c82d274f76e5726954d942403bcf281dda899f1b63d3a4ebadc5400f5f8a546dffd5bf45cc5f23a4f775ea7a6969ab90b1048aa9", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="d90bf747ab67096bca0a9e49d83f6307b30a1f0d5c9da5287b0fc0e247700f4a334f50c1848640b1933b02be14413461bdd63251a07a87f97053a42ef6bdb841e024ccc7a103d0697cd14948d96204f0c093b700523526000f0783223076ead8b2d162f45678436fa44fb44b33064aa770f521fd44dde307cc8821c686391aea0f74b137464b3f0b59d47b92f52a7cec0cf2548c359efa334dc92d24b8dbeab458e2a10ee08e814b838bfa01275030fd86da9246f79a8888b1bb81bd81003ecb92edff18d3fae5886cd08d31ec0da951180fc8b4c3c43869b0935cdb651ef2"], @ANYBLOB="080000003500050001000100ce00000024c48659342c1ccf32e71712bb284a73f6e6291a9677fb9032ff3d6d967f651f562f2f6346b1741862cd6d6501c2f3dbc38dae2ded4f3a40b57dc8c31cd27dabdc1e16bf7f60d9ce9d9999e04ac119ea99c71e3a9f870b9cfc15f7f17cb566459f350df58ab9384485706d3c175cd93644c0749903a52959028c00cdcb514678bde47b0b972adb74f28674f86e3320cec8488003a1a37395b16ae42682aade9c4e5004ec1b402e2941f07bce40eebe40c131d4dcd83f95fcedfb5b65a66eff719f848d22ebdf614f58bb"]) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x6400]}}, 0x1c) 15:12:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7c0c, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:30 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x10}) [ 746.185253] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:30 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) pipe(&(0x7f0000000080)={0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x234, 0xffffffffffffffff) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f00000000c0)) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000140), 0x4) r3 = memfd_create(&(0x7f0000000000)='aead\x00', 0x4) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000040)=""/19) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) [ 746.286801] vhci_hcd: invalid port number 16 15:12:30 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x3}) 15:12:30 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000040), 0x4) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)=0xcb) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200010}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0x44, r4, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x101}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r3}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x4000001) 15:12:30 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2}) 15:12:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x742d193f) 15:12:30 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x100000000000000}) 15:12:30 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x3b, &(0x7f0000000000), 0x0) 15:12:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) epoll_create1(0x80000) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xc]}}, 0x1c) 15:12:30 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x1000000}) 15:12:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x80) getsockname$unix(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x2) 15:12:30 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x25) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x81, 0x200) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x32, 0x4, 0x0, {0x0, 0x4, 0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x32) pipe2(&(0x7f00000000c0), 0x0) 15:12:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c00, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) socketpair(0x0, 0xb, 0x10, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@broadcast, @dev, 0x0}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f00000001c0)={@empty, r3}, 0x14) accept4$alg(r0, 0x0, 0x0, 0x80000) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) [ 746.837622] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:30 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="040028bd7000fcdbdf25050000000c000200400000000000000008000100000000005400070008000100", @ANYRES32=r0, @ANYBLOB="0800271f730da9cd84723d247f90b36a17d811df8b3461d8b0128918abbaecd02d71ffcd3682e88c0db04c4fabcb7a7e28be1abf69d4f3f94cb7217cf89907f2a4b12c21544e643b8bfe69b411e811309114cd022591b360fecc3c484f2647ffdcf1ec20b92b050ed82b0f4c2faf9e5949a4d91e064036e452ca02a949632e086f9c30dc4b0490fd4977160731d57917cebd13350af0b8ba7d7c91f4592f3a5773faea49c7a0ca1873661f2c3b5f15f7ea44c8a99c49b1338eabc1bec572a9fdef4faabef248ac9f29d2a5347b6dedf2b579f42c56", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="d1f7d800", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x14) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0x17, "be2789272251390948a6fafd65ecf0a3cf0937dcce5890"}, &(0x7f0000000300)=0x1f) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000340)={r5, 0x95, 0x10, 0x5, 0xea25}, &(0x7f0000000380)=0x18) 15:12:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000040)={0x0, 0xffff, 0x8, 'queue1\x00', 0x40}) 15:12:30 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x8000000}) 15:12:30 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000200)=""/125, &(0x7f0000000300)=0x7d) 15:12:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 15:12:31 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000280)=0x30) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)=0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8001, &(0x7f00000000c0)=0x1, 0x41, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000340)=[0xee01, 0x0, 0x0, 0xee00, 0x0, 0xee01]) mount$9p_xen(&(0x7f0000000440)='bond_slave_0\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='9p\x00', 0x18002, &(0x7f0000000500)={'trans=xen,', {[{@loose='loose'}, {@cache_fscache='cache=fscache'}]}}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={r2, r4, r5}, 0xc) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x1ff, &(0x7f0000ffc000/0x3000)=nil, 0x2) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/enforce\x00', 0x26e401, 0x0) 15:12:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xc00000000000000]}}, 0x1c) 15:12:31 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x100000}) 15:12:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x200403, 0x0) timerfd_gettime(r1, &(0x7f0000000040)) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000080)={0x2, 0x2}, 0x2) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:31 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000400)={0xfffffffffffffb9b, 0x81, "aa47bb23bfc56e98ce213f67a5f4dc09894d845e9ed2862e03974297e5e0e7637b658982ee1ac9db5473f0b686421a169684faf866516aeef663ad6f2305fbf9077822fc08dac582bb0cfcc2e9b338fa872c10306f3777e6292ba97013615856f0d22f1402aaacf09b67e0ce606422a1f087dc921931f9205f2fd49cead3fde208"}) 15:12:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) getpeername$llc(r1, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000040)=0x10) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80040, 0x0) recvfrom$unix(r1, &(0x7f0000000480)=""/4096, 0x1000, 0xe846ba8b2ce47ee, 0x0, 0x0) mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, &(0x7f0000000040), 0x4a5, 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24}}, 0x80000000, 0x5}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={r2, 0x6}, 0x8) [ 747.547439] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:31 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x300}) 15:12:31 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xffffffffffffff15) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x7fff, 0x80) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, &(0x7f0000000240)={0x6, 0x5, 0xff, 0x6, 0x4, 0xfb48}) accept$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r3, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x840000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=@gettclass={0x24, 0x2a, 0x0, 0x70bd2d, 0x25dfdbfb, {0x0, r4, {0xffff}, {0xfff2, 0xfff7}, {0xf, 0xfff3}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0xd0) 15:12:31 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x300000000000000}) 15:12:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10001, 0x801) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x80000001, 0xd1c}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={r2, 0xee0b}, &(0x7f0000000180)=0x8) 15:12:31 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000000)=0x30) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x300]}}, 0x1c) 15:12:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x8) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:31 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x800000000000000}) 15:12:31 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x400) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) fcntl$lock(r0, 0x6, &(0x7f0000000240)={0x1, 0x2, 0xb5, 0x4, r1}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000340)={0x0, 0x7, 0x2, 0xee8c}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000440)={0x846, 0x1, 0x205, 0xfffffffffffffff7, 0x9, 0xd6d, 0x3ff, 0xffffffff, r2}, 0x20) r3 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) fcntl$getownex(r3, 0x10, &(0x7f0000000300)) pipe2(&(0x7f00000000c0), 0x0) [ 747.957178] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000000)='aead\x00'}, 0x30) ptrace$peek(0x3, r2, &(0x7f0000000080)) r3 = add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000180)="ee67bb8b280c25bdfb757a04d398f304015cb12563bf632cca9bc29053444fb1cb0ace2d778f6d0429913951520156a5e09ae643138b5d4964ed3334924c57efba3061c6619070a0c0bb4c09d725c16adebefbdf0e6f1d128e74ca84b339b0bef0123ca1b1142b50e53ac3f1b47a5f1878adb082e8848e08df9cdb23ebf1b55effcf080adb237fb6eef79efeb35c9c5069d43150", 0x94, 0xfffffffffffffffa) r4 = add_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$reject(0x13, r3, 0xffffffffffff987f, 0x815, r4) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xa0]}}, 0x1c) 15:12:32 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0xffffffff00000000}) 15:12:32 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x6, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}}, {{0x2, 0x4e22}}}, 0x108) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/61, 0x3d, 0x2, 0x0, 0x0) 15:12:32 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x10000000000000}) [ 748.360279] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:32 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f0000000240), 0x4000) 15:12:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x12e]}}, 0x1c) 15:12:32 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0xfdfdffff}) 15:12:32 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f0000000000), 0x0) 15:12:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000040)=0x1) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:32 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x8}) [ 748.766678] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff6, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:33 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:33 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0xfffffdfd}) 15:12:33 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000400)={0x4, 0x6, 0x0, [{0xfffffffffffffffb, 0x6, 0x7, 0x49, 0x8000, 0x0, 0xfe}, {0x6, 0x7, 0x10000, 0x6, 0x1, 0xbcb1}, {0xfffffffffffff001, 0x0, 0x3, 0x3, 0x6, 0xfffffffffffffffc, 0x5}, {0x8000, 0x55d9, 0x8000, 0x4, 0x78, 0x5, 0x3}, {0x6, 0x7f, 0x7ca03d8a, 0x4, 0x80, 0x200, 0x7}, {0xff, 0x2, 0x1, 0x3, 0x3c06, 0x3580, 0x6}]}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x1, 0x4) pipe2(&(0x7f00000000c0), 0x0) 15:12:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x8, 0x3, 0x1, 0xdc}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x142, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000080)=0x57) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:33 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x2cf) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndctrl(&(0x7f00000004c0)='/dev/snd/controlC#\x00', 0x0, 0x4000) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000140)={0x0, 0xfffffffffffffffe, [0x0, 0x99e]}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)={0x0, 0x90, "f093adf455fd36ccff07f6e386f644564d6908e42bf41f9d3a91564a2551ac922f3492d6ef9f5fdb19f9e2c6fcaa25a3df1cc933c8fc9f79c6b091572ee54a75605053bc4d90ebcd3866897652a67e0d6da333b2c81327327af80ab4c954597ff2fbdfd875dba54a1a5af97d94ce6796edae99949fda39953dedf3f06f9dcda3f7fe3a5c207ca012fc6834a27d589fb8"}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r3, 0x6, 0x30}, 0xc) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xffffffffffffffe1, 0x1bd, 0xffff, 0x2, 0x0, 0x3, 0xb555984ba5b5189d, 0x4, 0xffffffffffffff00, 0x90d, 0x200, 0x8, 0x5, 0x8, 0x2, 0x6, 0x1f4, 0x9, 0x81, 0x80, 0x3, 0x49, 0x9f, 0xa0, 0xffffffffffff0810, 0x5, 0xfffffffffffffffe, 0xef82, 0x6, 0x6, 0x2, 0x3, 0x3, 0x100, 0x0, 0x8, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x20, 0xfffffffffffffffe, 0x4, 0x7, 0x9, 0x3f, 0x9}, r4, 0xf, r1, 0x8) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:33 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x983a000000000000]}}, 0x1c) 15:12:33 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x200000000000000}) 15:12:33 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:33 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x300000000000000}) [ 749.393987] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:33 executing program 3: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:33 executing program 3: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:33 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x8000000}) [ 749.553205] QAT: Invalid ioctl [ 749.568185] QAT: Invalid ioctl 15:12:33 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0xfdfdffff}) 15:12:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xab8, 0x410000) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x58) setsockopt$inet_dccp_buf(r1, 0x21, 0x8d, &(0x7f0000000d00)="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", 0x1000) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x606840) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='illinois\x00', 0x9) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0), 0xffffffffffffff4f, 0x4040}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:34 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000200)=r3) 15:12:34 executing program 3: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:34 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x2000000}) 15:12:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x2e010000]}}, 0x1c) 15:12:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:34 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x10}) 15:12:34 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) [ 750.234718] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:34 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x2}) 15:12:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x48, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:34 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:34 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:34 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x10000000000000}) 15:12:34 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x50000) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000140)={0x7f, 0x4, 0x2}) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000040)={0x3, 0x800000000000000, 0xd4}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={'bond_slave_0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:34 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:34 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0xfdfdffff00000000}) 15:12:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xffffff8d]}}, 0x1c) 15:12:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'tgr192-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x80003, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000040)=0x2, &(0x7f0000000080)=0x2) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={r2, r2, 0x7, 0x2}, 0x10) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1f00000000000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:35 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) [ 751.039205] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:35 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x100000000000000}) 15:12:35 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:35 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x3}) 15:12:35 executing program 3: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:35 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0xfffffdfd}) 15:12:35 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x4e20, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:35 executing program 3: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:35 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0xffffffff00000000}) 15:12:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x22000, 0x20) bind$vsock_dgram(r2, &(0x7f0000000040), 0x10) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x8a03000000000000]}}, 0x1c) [ 751.857701] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x74000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:35 executing program 3: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:35 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x100000}) 15:12:36 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x2000000}) 15:12:36 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x3000000}) 15:12:36 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x2000000}) 15:12:36 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x300}) 15:12:36 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14, 0x800) pipe2(&(0x7f00000000c0), 0x0) 15:12:36 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x8}) 15:12:36 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x2000000}) 15:12:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x1000000]}}, 0x1c) 15:12:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0xffffffffffffff83) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000000)=0x3) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) [ 752.691266] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:36 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:36 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x200000000000000}) 15:12:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000040)=""/138) r2 = accept4$alg(r0, 0x0, 0x0, 0x80800) sendmmsg$alg(r2, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:37 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x800000000000000}) 15:12:37 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:37 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x1000000}) 15:12:37 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0xfffffdfd}) 15:12:37 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x3000000]}}, 0x1c) 15:12:37 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0xfffffffffffffcb5) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000400)={@llc={0x1a, 0x125, 0x5, 0x151, 0x0, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, {&(0x7f0000000000)=""/12, 0xc}, &(0x7f0000000040), 0x44}, 0xa0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0xffffffffffffff65}], 0x1, &(0x7f00000000c0)}], 0x49249249249267a, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000080)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) [ 753.545607] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700000000000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:38 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x100000}) 15:12:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x3075]}}, 0x1c) 15:12:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80400, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x40003, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x7, 0x2, 0xfff, 0x3, 0x0, 0x3, 0x220, 0x3, 0x6, 0x100000000, 0x1, 0x6, 0x5, 0x800, 0x0, 0x5, 0x7ff, 0x4, 0x1, 0x1ff, 0x200, 0x401, 0x9, 0x7d9a, 0x1, 0x6, 0xa8, 0x3, 0x3, 0x80000001, 0x4d8, 0xb8, 0x4, 0x6, 0x3, 0x6e7, 0x0, 0x7, 0x5, @perf_config_ext={0xfff, 0x1}, 0x80, 0x2, 0x7, 0x7, 0xbf, 0x1, 0x6}, r2, 0x0, r3, 0xe) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x10600, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r4, 0x227b, &(0x7f0000000040)=0x1) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) ioctl$KDDELIO(r4, 0x4b35, 0x7) 15:12:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:38 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='rose0\x00', 0x746c}) [ 754.418218] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:38 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x300}) 15:12:38 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x300000000000000}) 15:12:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xb000000]}}, 0x1c) 15:12:38 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x1000000}) [ 754.655734] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:38 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x2000000}) 15:12:39 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendto(r0, &(0x7f0000000300)="126ffe135a99bc0d4f8c126bca752f4883967e61386392e51272bb15f5d0cd752ac868cac1554bb2408c486972e7e55c20b924b37ce67ac5e56dc118c6daa0d84f7580eb7716090dade29ae7625048f0130a7e9b1e842f1b8f7ab6c9cd99c536844045d5af2a55983b12665486b054e85e05849418ccef51a57b95896e519da43a0bbef0edca32af24ab3b5e67e1201f84ca446de71f92330655f81f440bf687f893a4", 0xa3, 0x8040, &(0x7f00000003c0)=@in={0x2, 0x4e20, @broadcast}, 0x80) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440), 0x10) r1 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x7dd, 0x6, 0x2000}, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480), &(0x7f00000004c0)=0xb) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000000)={'veth1_to_bond\x00', {0x2, 0x4e22, @multicast2}}) 15:12:39 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x8000000}) 15:12:39 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x2}) 15:12:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xc]}}, 0x1c) [ 755.252339] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000080)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000480)={0x0, 0x0, 0x3, 0x0, [], [{0x7fffffff, 0x20, 0x0, 0x3, 0x3, 0x10000}, {0x7, 0x5, 0x40, 0x287, 0x89, 0x100}], [[], [], []]}) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000180)={0xf876}) sendmmsg$alg(r3, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)=[@iv={0x58, 0x117, 0x2, 0x3d, "bf90fc5cf05343e6638393fd0169e7b9e55556fb187dbb22185275ed31623778ab14765c58cbd9a0cd8285d8cc55774a2dbda71c63fc470c4879031633"}], 0x58}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x9, 0x2}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r3, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) setpgid(r1, r1) 15:12:39 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x3}) 15:12:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) pread64(r0, &(0x7f0000000000)=""/76, 0x4c, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f000000, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:39 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) accept4$unix(r0, 0x0, &(0x7f0000000000), 0x80000) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x9, 0x2}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r3, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) setpgid(r1, r1) 15:12:39 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x10000000000000}) 15:12:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x801000c900000000]}}, 0x1c) 15:12:39 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x200000000000000}) 15:12:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x9, 0x2}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r3, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) setpgid(r1, r1) [ 755.934032] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:39 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0xfdfdffff}) 15:12:40 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x8}) 15:12:40 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0xfdfdffff00000000}) 15:12:40 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0xffffffff00000000}) 15:12:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r1, 0x7) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r3, 0x28, 0x6, &(0x7f00000001c0)={0x0, 0x2710}, 0x10) r4 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r4) sendmmsg$alg(r2, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000200), &(0x7f0000000240)=0xb) 15:12:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xfcae0300, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x9, 0x2}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r3, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 15:12:40 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x10}) 15:12:40 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x100, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5e1, 0xa080) pipe2(&(0x7f00000000c0), 0x0) 15:12:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xa00000000000000]}}, 0x1c) 15:12:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:40 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x800000000000000}) 15:12:40 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x100000000000000}) [ 756.772274] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0), 0xffffffffffffff28}], 0x1, 0x20000000) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x7, 0x101001) ioctl$BLKRRPART(r2, 0x125f, 0x0) r3 = semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f0000000000)=""/212) r4 = openat$selinux_policy(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) getpeername$inet(r4, &(0x7f0000000180)={0x2, 0x0, @dev}, &(0x7f00000001c0)=0x10) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) 15:12:40 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x3000000}) 15:12:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x9, 0x2}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r3, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:40 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x8}) 15:12:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x8000000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:41 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x200000000000000}) 15:12:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x9, 0x2}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r3, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:41 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'syz_tun\x00', {0x2, 0x4e23, @multicast2}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xe803000000000000]}}, 0x1c) 15:12:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x29) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000040)={0x9962, 0x100000000, 0x3}) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-aesni\x00'}, 0xfe40) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) ioctl$TIOCGPTPEER(r1, 0x5441, 0x3) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) r3 = shmget$private(0x0, 0x2000, 0x1, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r3, 0xb) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x9, 0x2}, &(0x7f00000000c0)=0x10) 15:12:41 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x100000000000000}) [ 757.483985] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:41 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0xfdfdffff}) 15:12:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:41 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x3000000}) 15:12:41 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x300}) 15:12:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2f00, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:42 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x2}) 15:12:42 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) fcntl$setlease(r0, 0x400, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fchmod(0xffffffffffffffff, 0x100) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0xfffffffffffffffd, @rand_addr=0x7}}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f00000000c0)=&(0x7f0000000040)) ioctl$NBD_DISCONNECT(r1, 0xab08) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f0000000200), 0x80000) socket$alg(0x26, 0x5, 0x0) 15:12:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000180)) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000040)={{0x6e, @rand_addr=0x6f93, 0x4e24, 0x1, 'dh\x00', 0xa, 0x1, 0x3f}, {@multicast1, 0x4e21, 0x0, 0x5, 0xfffffffffffffffc, 0x100000001}}, 0x44) 15:12:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x1000000000000000]}}, 0x1c) 15:12:42 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:42 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0xffffffff00000000}) 15:12:42 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x2000000}) [ 758.366220] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:42 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) getpid() waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:42 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:42 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1048, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:42 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0xfffffdfd}) 15:12:42 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:43 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000200)={0x81, @random="cb46f321bec6"}) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-aesni\x00'}, 0xffffffea) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x8001) r4 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8, 0x90000) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000000)=0x401, 0x4) recvmmsg(r2, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f0000000080)={0x24c1, 0x8000, 0x2}, 0xc) 15:12:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x63000000]}}, 0x1c) 15:12:43 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) 15:12:43 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) [ 759.154669] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:43 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x100000}) 15:12:43 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x10}) 15:12:43 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x3}) 15:12:43 executing program 3: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1074, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:43 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x800000000000000}) 15:12:43 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x400040, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000400)={0x6, 0x7, [{0x1ff, 0x0, 0x1}, {0x6, 0x0, 0xffffffffffffffff}, {0x80, 0x0, 0x9}, {0x80}, {0x0, 0x0, 0x5}, {0x2, 0x0, 0x8}]}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000000)) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r4, 0xc04c5349, &(0x7f0000000200)={0x100000000, 0xffff}) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000500)={'nat\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) 15:12:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x10000000003) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000040)={0x2, 'teql0\x00', 0x3}, 0x18) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:43 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x10000000000000}) 15:12:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xc0ce0200]}}, 0x1c) 15:12:43 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:43 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x8000000}) [ 759.741474] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:43 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x1000000}) 15:12:43 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x300000000000000}) 15:12:43 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:44 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1006, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:44 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000040)={0xd8, 0x0, {0x1, 0x2, 0x2, 0x0, 0x200}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1d}}}, [0x6, 0x7, 0x2, 0x8, 0x8, 0x7ff, 0x8, 0x5, 0x0, 0xd58, 0x40, 0x8, 0x6, 0x0, 0x81e5]}, &(0x7f0000000280)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000340)={r2, 0xfffffffffffffff9}, 0x8) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r3, &(0x7f00000000c0)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000940)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0xffffdbe, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:44 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x30750000]}}, 0x1c) 15:12:44 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'ip6tnl0\x00', {0x2, 0x4e21, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:44 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:44 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) [ 760.448362] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:44 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:44 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:44 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:44 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000006c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xa0200, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/137) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in6=@mcast1, 0x4e22, 0x2, 0x4e22, 0x0, 0xa, 0xa0, 0x80, 0x2c, 0x0, r2}, {0x3f, 0x18223317, 0x191, 0x6, 0xe7, 0x99, 0x6, 0x4}, {0x2, 0x7, 0x2d583527, 0x1ff}, 0x4, 0x6e6bbf, 0x3, 0x0, 0x2, 0x3}, {{@in6=@loopback, 0x4d5, 0x3f}, 0x0, @in6=@mcast1, 0x3505, 0x3, 0x1, 0x4, 0x8, 0x20, 0x20000000000}}, 0xe8) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005840)="f98088703a27b9df5d9dcc181e7a2768b8", 0x11}], 0x1, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f00000003c0)}}, {{&(0x7f0000000340)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/36, 0x24}], 0x1, &(0x7f0000000c80)=""/69, 0x45}}], 0x2, 0x0, 0x0) 15:12:45 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:45 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8001, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:45 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) socketpair$packet(0x11, 0x1, 0x300, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept(r0, &(0x7f0000000200)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000040)=0x80) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e23, 0x3f, @local, 0x7}}, 0x800, 0x401}, &(0x7f0000000080)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000003c0)=ANY=[@ANYRES32=r2, @ANYBLOB="34eed400dc763241dfab1434e2c7aaae1745421b8446804dc5b5a7cb00eefa84038db4a401fe99a451a501bcf4854f706c5a57753a3e32a9c8288ab3acfd38c3a44724351bbef89078ab5386bce9bb16138ef566da83f1a173b4c2320255c180634772fdd3d8c3411d26cda99407916312ceb9c47e6393aecd86d5881ea6b3d586bb2d8793936ed1aa4f2d7924c3e61d5c3325699b9308b73c58e48ef4e9e8e95e7d9fd7aa447f09012ad56d5f92729c2838270b934e6ca596107bc26e0d185c4123f19a75f8eac7a793b8e4c0add503614b3ce7d0ff3427"], 0xdc) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xd]}}, 0x1c) 15:12:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x104c, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:45 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) [ 761.120288] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:45 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x8, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:45 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:45 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:45 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3, 0xe0}, &(0x7f0000000140)=0x14) 15:12:45 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f0000000000), 0x4) 15:12:45 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x10000000000000}) 15:12:45 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:45 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, 0xe0}, &(0x7f0000000140)=0x14) 15:12:45 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xa00, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xf00]}}, 0x1c) 15:12:45 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:45 executing program 3 (fault-call:4 fault-nth:0): socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:45 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:46 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) [ 762.090346] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 762.169387] FAULT_INJECTION: forcing a failure. [ 762.169387] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 762.181472] CPU: 0 PID: 9401 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #27 [ 762.188677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.198036] Call Trace: [ 762.200672] dump_stack+0x1c4/0x2b4 [ 762.204319] ? dump_stack_print_info.cold.2+0x52/0x52 [ 762.209526] ? perf_trace_lock+0x14d/0x7a0 [ 762.213801] should_fail.cold.4+0xa/0x17 [ 762.217913] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 762.223062] ? graph_lock+0x170/0x170 [ 762.226880] ? graph_lock+0x170/0x170 [ 762.230705] ? lock_acquire+0x1ed/0x520 [ 762.234702] ? __lock_is_held+0xb5/0x140 [ 762.238796] ? ___might_sleep+0x1ed/0x300 [ 762.242949] ? lock_release+0x970/0x970 [ 762.246943] ? arch_local_save_flags+0x40/0x40 [ 762.251578] ? __mutex_lock+0x85e/0x1700 [ 762.255673] ? __might_sleep+0x95/0x190 [ 762.259673] __alloc_pages_nodemask+0x34b/0xde0 [ 762.264372] ? __alloc_pages_slowpath+0x2d80/0x2d80 15:12:46 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 762.269399] ? find_held_lock+0x36/0x1c0 [ 762.269429] ? __might_fault+0x12b/0x1e0 [ 762.269447] ? lock_downgrade+0x900/0x900 [ 762.269467] ? lock_release+0x970/0x970 [ 762.277592] ? arch_local_save_flags+0x40/0x40 [ 762.277616] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 762.277634] ? usbfs_increase_memory_usage+0xf7/0x1d0 [ 762.277656] ? usbfs_decrease_memory_usage+0x30/0x30 [ 762.305643] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 762.311213] alloc_pages_current+0x10c/0x210 [ 762.315639] ? check_ctrlrecip+0xa9/0x320 [ 762.319814] __get_free_pages+0xc/0x40 [ 762.323723] proc_control+0x227/0xef0 [ 762.327543] ? mark_held_locks+0x130/0x130 [ 762.331790] ? proc_bulk+0xa70/0xa70 [ 762.331819] usbdev_do_ioctl+0x1eb8/0x3b50 [ 762.331841] ? processcompl_compat+0x680/0x680 [ 762.331866] ? zap_class+0x640/0x640 [ 762.331885] ? mark_held_locks+0x130/0x130 [ 762.352337] ? zap_class+0x640/0x640 [ 762.356066] ? __lock_acquire+0x7ec/0x4ec0 [ 762.360322] ? graph_lock+0x170/0x170 [ 762.364149] ? zap_class+0x640/0x640 [ 762.367882] ? dput.part.26+0x26d/0x790 [ 762.371880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.377425] ? check_preemption_disabled+0x48/0x200 [ 762.382431] ? check_preemption_disabled+0x48/0x200 [ 762.387455] ? find_held_lock+0x36/0x1c0 [ 762.391523] ? avc_has_extended_perms+0x8cb/0x15a0 [ 762.396443] ? lock_downgrade+0x900/0x900 [ 762.400580] ? check_preemption_disabled+0x48/0x200 [ 762.405589] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 762.411375] ? kasan_check_read+0x11/0x20 [ 762.415516] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 762.420782] ? rcu_bh_qs+0xc0/0xc0 [ 762.424317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.429855] ? avc_has_extended_perms+0xab2/0x15a0 [ 762.434779] ? avc_ss_reset+0x190/0x190 [ 762.438743] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 762.444552] ? kasan_check_read+0x11/0x20 [ 762.448687] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 762.453952] ? rcu_bh_qs+0xc0/0xc0 [ 762.457505] ? ___might_sleep+0x1ed/0x300 [ 762.461655] ? arch_local_save_flags+0x40/0x40 [ 762.466236] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 762.471160] usbdev_ioctl+0x25/0x30 [ 762.474803] ? usbdev_compat_ioctl+0x30/0x30 [ 762.479202] do_vfs_ioctl+0x1de/0x1720 [ 762.483089] ? ioctl_preallocate+0x300/0x300 [ 762.487491] ? selinux_file_mprotect+0x620/0x620 [ 762.492240] ? __sb_end_write+0xd9/0x110 [ 762.496308] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 762.501846] ? fput+0x130/0x1a0 [ 762.505115] ? do_syscall_64+0x9a/0x820 [ 762.509093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.514656] ? security_file_ioctl+0x94/0xc0 [ 762.519060] ksys_ioctl+0xa9/0xd0 [ 762.522506] __x64_sys_ioctl+0x73/0xb0 [ 762.526408] do_syscall_64+0x1b9/0x820 [ 762.530298] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 762.535663] ? syscall_return_slowpath+0x5e0/0x5e0 [ 762.540596] ? trace_hardirqs_on_caller+0x310/0x310 [ 762.545599] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 762.550607] ? recalc_sigpending_tsk+0x180/0x180 [ 762.555352] ? kasan_check_write+0x14/0x20 [ 762.559590] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 762.564442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.569642] RIP: 0033:0x457679 [ 762.572842] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.591734] RSP: 002b:00007f4ed2f2fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 762.599446] RAX: ffffffffffffffda RBX: 00007f4ed2f306d4 RCX: 0000000000457679 [ 762.606702] RDX: 0000000020000080 RSI: 00000000c0185500 RDI: 0000000000000003 [ 762.613990] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 15:12:46 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4400) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000400)={0x6, 0xffffffff, 0x101, 'queue1\x00', 0x800}) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) sched_getparam(r3, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x2, 0x4) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @multicast1}}) r4 = msgget(0x3, 0x401) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000340)='bbr\x00', 0x4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000004c0)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) msgctl$IPC_RMID(r4, 0x0) pipe2(&(0x7f00000000c0), 0x0) 15:12:46 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000480)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000005c0), &(0x7f0000000640)=0x2) r2 = socket(0x10, 0x802, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000980)=@sack_info={0x0, 0x800, 0xe86}, &(0x7f00000009c0)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000003c0)={'team0\x00'}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) pipe2$9p(&(0x7f0000000940), 0x4000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:46 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) [ 762.621252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 762.628510] R13: 00000000004cf508 R14: 00000000004bf7f2 R15: 0000000000000000 15:12:46 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:46 executing program 1 (fault-call:1 fault-nth:1): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) [ 763.093071] FAULT_INJECTION: forcing a failure. [ 763.093071] name failslab, interval 1, probability 0, space 0, times 0 [ 763.133947] CPU: 0 PID: 9436 Comm: syz-executor1 Not tainted 4.19.0-rc4+ #27 [ 763.141234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.150602] Call Trace: [ 763.153215] dump_stack+0x1c4/0x2b4 [ 763.156864] ? dump_stack_print_info.cold.2+0x52/0x52 [ 763.162073] ? perf_trace_lock+0x14d/0x7a0 [ 763.166327] ? graph_lock+0x170/0x170 [ 763.170153] should_fail.cold.4+0xa/0x17 [ 763.174236] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 763.179354] ? graph_lock+0x170/0x170 [ 763.183174] ? graph_lock+0x170/0x170 [ 763.187010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.192573] ? check_preemption_disabled+0x48/0x200 [ 763.197599] ? check_preemption_disabled+0x48/0x200 [ 763.202632] ? find_held_lock+0x36/0x1c0 [ 763.206715] ? proc_control+0x831/0xef0 [ 763.210721] ? ___might_sleep+0x1ed/0x300 [ 763.214885] ? arch_local_save_flags+0x40/0x40 [ 763.219498] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 763.224551] ? find_held_lock+0x36/0x1c0 [ 763.228639] __should_failslab+0x124/0x180 [ 763.232898] should_failslab+0x9/0x14 [ 763.236713] kmem_cache_alloc_trace+0x2d7/0x750 [ 763.241398] ? lock_release+0x970/0x970 [ 763.245395] ? arch_local_save_flags+0x40/0x40 [ 763.250028] usb_control_msg+0xc4/0x4e0 [ 763.254035] ? usb_start_wait_urb+0x5a0/0x5a0 [ 763.258543] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 763.264118] proc_control+0x99b/0xef0 [ 763.267944] ? proc_bulk+0xa70/0xa70 [ 763.271690] usbdev_do_ioctl+0x1eb8/0x3b50 [ 763.275945] ? processcompl_compat+0x680/0x680 [ 763.280568] ? zap_class+0x640/0x640 [ 763.284326] ? mark_held_locks+0x130/0x130 [ 763.288574] ? zap_class+0x640/0x640 [ 763.292297] ? __lock_acquire+0x7ec/0x4ec0 [ 763.296544] ? graph_lock+0x170/0x170 [ 763.300359] ? zap_class+0x640/0x640 [ 763.304088] ? dput.part.26+0x26d/0x790 [ 763.308075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.313624] ? check_preemption_disabled+0x48/0x200 [ 763.318658] ? check_preemption_disabled+0x48/0x200 [ 763.323693] ? find_held_lock+0x36/0x1c0 [ 763.327814] ? avc_has_extended_perms+0x8cb/0x15a0 [ 763.332754] ? lock_downgrade+0x900/0x900 [ 763.336906] ? check_preemption_disabled+0x48/0x200 [ 763.341936] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 763.347753] ? kasan_check_read+0x11/0x20 [ 763.351949] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 763.357246] ? rcu_bh_qs+0xc0/0xc0 [ 763.360816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.366363] ? avc_has_extended_perms+0xab2/0x15a0 [ 763.371326] ? avc_ss_reset+0x190/0x190 [ 763.375328] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 763.381137] ? kasan_check_read+0x11/0x20 [ 763.385303] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 763.390607] ? rcu_bh_qs+0xc0/0xc0 [ 763.394192] ? ___might_sleep+0x1ed/0x300 [ 763.398354] ? arch_local_save_flags+0x40/0x40 [ 763.402971] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 763.407936] usbdev_ioctl+0x25/0x30 [ 763.411589] ? usbdev_compat_ioctl+0x30/0x30 [ 763.416020] do_vfs_ioctl+0x1de/0x1720 [ 763.419935] ? ioctl_preallocate+0x300/0x300 [ 763.424373] ? selinux_file_mprotect+0x620/0x620 [ 763.429146] ? __sb_end_write+0xd9/0x110 [ 763.433225] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 763.438772] ? fput+0x130/0x1a0 [ 763.442081] ? do_syscall_64+0x9a/0x820 [ 763.446079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.451633] ? security_file_ioctl+0x94/0xc0 [ 763.456057] ksys_ioctl+0xa9/0xd0 [ 763.459528] __x64_sys_ioctl+0x73/0xb0 [ 763.463431] do_syscall_64+0x1b9/0x820 [ 763.467334] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 763.472711] ? syscall_return_slowpath+0x5e0/0x5e0 [ 763.477655] ? trace_hardirqs_on_caller+0x310/0x310 [ 763.482685] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 763.487714] ? recalc_sigpending_tsk+0x180/0x180 [ 763.492483] ? kasan_check_write+0x14/0x20 [ 763.496737] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 763.501603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.506806] RIP: 0033:0x457679 [ 763.510016] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.528928] RSP: 002b:00007f4ed2f2fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 763.536660] RAX: ffffffffffffffda RBX: 00007f4ed2f306d4 RCX: 0000000000457679 [ 763.543941] RDX: 0000000020000080 RSI: 00000000c0185500 RDI: 0000000000000003 [ 763.551243] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 763.558523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 763.565803] R13: 00000000004cf508 R14: 00000000004bf7f2 R15: 0000000000000001 [ 765.584470] device team0 entered promiscuous mode [ 765.594840] device team_slave_0 entered promiscuous mode [ 765.602712] device team_slave_1 entered promiscuous mode [ 765.611471] 8021q: adding VLAN 0 to HW filter on device team0 15:12:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x983a0000]}}, 0x1c) 15:12:49 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:49 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0xc8, &(0x7f0000000280)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0x100, @local, 0x8}, @in6={0xa, 0x4e22, 0x1000, @local, 0x9}, @in6={0xa, 0x4e20, 0x7, @empty, 0xff}, @in6={0xa, 0x4e22, 0x4, @mcast1, 0x7}, @in6={0xa, 0x4e24, 0x0, @loopback, 0x81}, @in6={0xa, 0x4e23, 0x8, @mcast2, 0xbc1}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0xfff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000003c0)={r2, 0x0, 0x0, 0x5, 0x7, 0x6}, &(0x7f0000000400)=0x14) write$P9_RREADDIR(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="a6000000290200894900001900000000060000000000000005000000000000000007002e2f66696c6530d504000000050000000000000003000000000000000707002e2f66696c65304003000000017007002e2f66696c6530040200000005000000000000000700000000000000093200000066696c6530800200000005000000000000000000000080ffffff0107002e2f66696c6530000000000000000000000000000000"], 0xa6) 15:12:49 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L-', 0xffffffffffffffaa}, 0x28, 0x2) pipe2(&(0x7f00000000c0), 0x0) 15:12:49 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:49 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) [ 765.909500] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:49 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0x30) r1 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000040)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) bind$unix(r1, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000400)={0x0, 0x5, 0x3, 0x5, 0x5, 0x17, 0x5, 0x7, {0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x40, 0x8, 0x200, 0x4, 0x1}}, &(0x7f0000000100)=0xb0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000300)={r3, 0x1f, 0x6, 0x9, 0x9, 0x6}, 0x14) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) write$P9_RLINK(r4, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) 15:12:49 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:50 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:12:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() r2 = dup(r0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x0, 0x4) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="77812fe6c83f084d73dc2a2a30ee1a7c4338a03ec13775bf0581e17a54eac1d60f1785c232db2f3956a6bebfd4fc0841f8a609fc406f307888a7ff545b1aa40a93bd5a1cd9766baf86c796defd137a1517a280c3fb6f7d03580f98752b9ba88a2c9f", 0x62, 0x5}, {&(0x7f0000000300)="375dbed22f242540b556e5db0b837f9e1dc6d7f254d99ade5d4e3e75aaf130734956faf13632f4f466451a90a580de7169c04fad3b06ffefa4ee8b03d2334e18b73b6b533cc647883a8d337ee6690e4f081440830b8a6077586016dc76801a5f50bdc795369504bfa6723cb8b282a40580a3b827b098ad2d2115014c9073c1acdaf90fa93a60f942110c21da724a42534d1e2f0e4f27f7bd1cd67db9727e07556aa5a7abf53cc64208440df8c763e71f731561014b8fb1a5dbdbb3dab78cf9dd", 0xc0, 0x100000001}, {&(0x7f00000003c0)="f222c2bb1c7e9ad4f4d7e2e31d292b6d8e8fd43e6d7c2cf312cd1119ccded45e0fe36d73db8bdd732205d809453dd0509aad517ebecbeff1e3e76c424c033a77e90341a801e5408ae5e27e5f1d7141dda7b7cc65112499f900795b669293f3928b469cbc87925e39e679c5de0ce2c2b7ee4a3aefd3d97c5150c483f8f3b5315b00cfa7248ae29523b6c449dccdf0d6f05d8da5e1d56553d7617e86c942212a966e4aa8", 0xa3, 0x5}], 0x2200080, &(0x7f0000000580)={[{@umask={'umask', 0x3d, 0x2}}, {@barrier='barrier'}, {@nobarrier='nobarrier'}, {@part={'part', 0x3d, 0x1000}}, {@nls={'nls', 0x3d, 'cp865'}}, {@nodecompose='nodecompose'}, {@force='force'}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "3cc88e2f"}}]}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x100000000}, &(0x7f0000000140)=0x14) 15:12:50 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) [ 766.403557] hfsplus: unable to find HFS+ superblock 15:12:50 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x8000, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000180)=0x20000, 0x4) write$selinux_context(r1, &(0x7f00000000c0)='system_u:object_r:usbtty_device_t:s0\x00', 0x25) ptrace$cont(0xc, r0, 0x1, 0x1) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:50 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x300}) 15:12:50 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40085511, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x1100000000000000]}}, 0x1c) 15:12:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1007, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:50 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xc02, 0x8a002) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xf) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000000)=0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000300)={0xc8, @time={0x0, 0x1c9c380}, 0x81, {0xffa7, 0x1}, 0x0, 0x0, 0x100000000}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) [ 766.804836] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:50 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x10}) 15:12:50 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x8}) 15:12:50 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:50 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x800004, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f00000002c0)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)=0x200) write$P9_RXATTRCREATE(r0, &(0x7f0000000300)={0x7, 0x21, 0x2}, 0x7) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffffc, 0x40000) fstat(r2, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000180)={0x80000000, 0x4, 0x7ff}) 15:12:51 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 15:12:51 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x3000000}) 15:12:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x2, 0x0) recvmsg(r0, &(0x7f0000000740)={&(0x7f0000000280)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000300)=""/94, 0x5e}, {&(0x7f00000000c0)=""/10, 0xa}, {&(0x7f0000000380)=""/170, 0xaa}, {&(0x7f0000000440)=""/84, 0x54}, {&(0x7f0000000180)=""/10, 0xa}, {&(0x7f00000004c0)=""/76, 0x4c}, {&(0x7f0000000540)=""/244, 0xf4}], 0x7, &(0x7f00000006c0)=""/124, 0x7c, 0x4}, 0x2021) bind$can_raw(r1, &(0x7f0000000780)={0x1d, r2}, 0x10) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) eventfd(0x8) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000007c0)={[{0x7, 0x5, 0x1ff, 0x7c, 0x6, 0x6, 0x0, 0x2, 0x4, 0x2, 0x40, 0x3, 0xf5}, {0x9, 0xfffffffffffffff9, 0x7, 0x3, 0x6, 0x100000001, 0x18c, 0x87, 0x6, 0x8f, 0x7fffffff, 0xffffffff, 0xd59}, {0x80, 0x6, 0x0, 0xa6f, 0x33490129, 0x4, 0x8, 0x7, 0xfffffffffffffff9, 0x4, 0xfffffffffffffbff, 0x5, 0x4}], 0x6}) 15:12:51 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x100000}) 15:12:51 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xf00000000000000]}}, 0x1c) [ 767.432433] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x107a, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x4) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400000) write$binfmt_misc(r0, &(0x7f0000000280)={'syz0', "a86486e161484cd72535640202452231a828fea7f1cf478d6487133e38a7efc3e49a634ff39e73"}, 0x2b) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000180)=&(0x7f00000000c0)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:51 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 15:12:51 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc020660b, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:51 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x9, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000300)={0x0, 0x200}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000400)={r2, 0x17c8}, &(0x7f0000000440)=0x8) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) accept(r3, &(0x7f0000000200)=@llc, &(0x7f0000000040)=0x80) 15:12:51 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f00000000c0)={0xef, 0x233}) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:51 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}) 15:12:51 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 15:12:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xff000000]}}, 0x1c) 15:12:51 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}) [ 768.012123] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:52 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x200802, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, r1, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) signalfd4(r0, &(0x7f00000000c0)={0x1f}, 0x8, 0x0) 15:12:52 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 15:12:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000040)={0x882, 0xffffffffffffffff, 0x101, 0x6}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) waitid(0x3, r2, 0xfffffffffffffffd, 0x40000000, &(0x7f00000003c0)) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x3fffe) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/97) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x3, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff}, &(0x7f0000000140)=0x14) 15:12:52 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}) 15:12:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1003, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:52 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045518, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:52 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f00000001c0)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r2 = semget(0x1, 0x1, 0x100) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000400)=""/240) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) pipe2(&(0x7f00000000c0), 0x0) 15:12:52 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}) 15:12:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xffffffe4]}}, 0x1c) 15:12:52 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000080)=0xe1e, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ptrace$peek(0x3, r1, &(0x7f00000000c0)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:52 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) [ 768.754311] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:52 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x100802102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 768.808191] audit: type=1400 audit(1537542772.730:185): avc: denied { setopt } for pid=9652 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:12:52 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x2}) 15:12:52 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x200000, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xf2, 0x200a00) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x1000, 0x1}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:52 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x3}) 15:12:53 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) 15:12:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1005, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:53 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) 15:12:53 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000000)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:53 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x2, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$dmmidi(&(0x7f00000006c0)='/dev/dmmidi#\x00', 0x7fff, 0x101) r1 = getpid() r2 = accept$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) openat$userio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/userio\x00', 0x8000, 0x0) r3 = accept4$inet6(r2, &(0x7f0000000580)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00000005c0)=0x1c, 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e20}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e23, 0x3, @mcast1, 0x3}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e21, 0x2864, @loopback, 0x4}, @in={0x2, 0x4e20, @local}], 0x98) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RLOPEN(r4, &(0x7f0000000540)={0x18, 0xd, 0x2, {{0x4a, 0x3}, 0x428}}, 0x18) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r5, 0x12, 0x2, &(0x7f0000000300)=""/102, &(0x7f0000000380)=0x66) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x4, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r6 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000180)={@local}, &(0x7f0000000280)=0x14) epoll_ctl$EPOLL_CTL_DEL(r6, 0x2, r0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:12:53 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0, 0x8000000}) 15:12:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x38a]}}, 0x1c) [ 769.617690] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:53 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0x5, 0x0, [], [{0x3, 0xffffffff00000000, 0xa053, 0x100000001, 0xffff, 0x7}, {0xd5, 0xb3a, 0x1, 0x8, 0x9, 0x800}], [[], [], [], [], []]}) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000000)) 15:12:53 executing program 5: accept4(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0xffffffff, 0x80}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000001c0)={r1, 0x1ff}, &(0x7f0000000200)=0x8) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) connect(r2, &(0x7f0000000240)=@nl=@unspec, 0x80) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000080)={0xa0, 0xfffffffffffffffe}) 15:12:53 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7fff}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x287400}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7f}]}, 0x54}, 0x1, 0x0, 0x0, 0x14}, 0x80) ustat(0x100000001, &(0x7f0000000000)) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000240)={0x2, 0x3, 0x9}) 15:12:53 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f0000000280)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffffe, 0x7f) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:53 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x8, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:54 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000100)={{0x3, 0x3, 0x1, 0x3, 0x7fffffff}, 0xffff, 0x1}) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) [ 770.202701] Unknown ioctl 1078481924 [ 770.222177] Unknown ioctl 1078481924 15:12:54 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002a40)='/dev/ppp\x00', 0x200000, 0x0) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @rand_addr}, &(0x7f0000000380)=0x10, 0x80800) msgget$private(0x0, 0x40) sendmsg$kcm(r0, &(0x7f00000029c0)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23}, 0x3, 0x4, 0x1, 0x4}}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000440)="9c544256a079798e2c8b44e179318437919d6f4d6f6ccb097ffd10e9af686b1e1ff41eb52a6c0887049e7b4276f52132e101385300b9c4fe69fe95f859ab40def1e60c955d9fe809e68870a75a79ff7da706b249c6208de6fad3e52763251d5456458625c0c24564b33812c93bd99cda0a2940757012c97ffc471b13120319aa816a3ff27682c5b4ccf5a39e44", 0x8d}, {&(0x7f00000005c0)="7b04971f2c29835b99e91e30c2e9928b81c51127a6cc939f00fe659e57ea1becf295a1d70eb7e57fa6c22be8f9095d1b6d514b548f7ea501751fa9789c18e4ad901d4c2025d02c9c31a6fc947289325b10b2154a9ebcd38184358b90e0c08fbaa455d3e8ba186c5cc1c778006c6dee5b711f71e8c625defd6aad8ab5e51430be69f471b6445dbe549f31eecebeecd78686fe15e5934ac218bba3daae19b99db9c9216736eb25d53ee01e915e4c33c3387d5b853ccc259c72ef11834766d6040bf37a7d434de27333790ffff5ce5d4359a49d1803e8fbc0e0a3bd263936a17df0dbcab6d54ebf050bf0102a06ff5ed2093cd264b574ce9ba9fd7ee12a571d", 0xfe}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f0000000500)="64736f338ccf1bc9a197b117479478151e15ad", 0x13}, {&(0x7f0000000540)="4a350c39464370b10ef6df00cfa814f4d52600347189a1781404a9096a877612149521", 0x23}, {&(0x7f00000016c0)="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", 0x1000}], 0x6, &(0x7f0000002740)=ANY=[@ANYBLOB="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"], 0x258, 0x4}, 0x40c0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r2 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x5, 0x2}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r4, 0x40, 0x3, [0x5, 0x0, 0x8001]}, &(0x7f0000000240)=0xe) pipe2(&(0x7f00000000c0), 0x0) 15:12:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xff00000000000000]}}, 0x1c) 15:12:54 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4b47, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:54 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x101000, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x5, 0x1, 0x8001, 0x8, 0x0, 0x1, 0x0, 0xe, 0x391, 0x2d5, 0x3f, 0x8000, 0xfffffffffffffffa, 0xffffffffffffffc0, 0x1, 0x6, 0x6c71, 0xa821, 0x3, 0x9, 0x100000001, 0x7, 0xfffffffffffffff7, 0x4, 0x10001, 0x20, 0x80000000, 0x1, 0x20, 0x400, 0x1, 0x0, 0x3, 0x8, 0xa52, 0x8, 0x0, 0xfffffffffffffffc, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x8021, 0x7, 0x81, 0x7, 0xfffffffffffffffd, 0x80, 0x8}, r0, 0xf, r1, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in=@rand_addr, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, r3, r4) socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000680)="4379e5da00acbd290619c6d6", 0xc) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000300)={0x0, 0x7fff}) ptrace$pokeuser(0x6, r5, 0x5, 0x6) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000740)=0x14) ioctl$BLKRAGET(r1, 0x1263, &(0x7f00000006c0)) 15:12:54 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000100)) getsockname$packet(r0, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) connect$packet(r0, &(0x7f00000007c0)={0x11, 0x7, r1, 0x1, 0x2, 0x6, @dev={[], 0xe}}, 0x14) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa1, 0x1, 0x0, 0x87, 0x100000000}) connect$packet(r0, &(0x7f0000000040)={0x11, 0x1f, r1, 0x1, 0x101, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) [ 770.431568] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 770.453743] usb usb5: usbfs: process 9773 (syz-executor5) did not claim interface 1 before use 15:12:54 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000000)=0x3ff) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) [ 770.489983] usb usb5: usbfs: process 9773 (syz-executor5) did not claim interface 1 before use 15:12:54 executing program 3: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = semget(0x2, 0x2, 0x402) semctl$SEM_STAT(r1, 0x5, 0x12, &(0x7f0000000400)=""/218) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000000c0)='team_slave_0\x00') r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='ip6gre0\x00') clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000580), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) r4 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x1, 0x108000) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000000280)=""/180) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:54 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5451, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:54 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x20040000, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000002c0)={'team0\x00', r2}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x4000000, 0x6}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 15:12:54 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x400000) openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x4af0300, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:54 executing program 5: r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, "73656c662474727573746564f524"}, {0x20, 'trusteduserem1^]'}, {0x20, 'posix_acl_accessvmnet1*&'}, {0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '%'}, {0x20, 'vboxnet1ppp0+'}, {0x20, '/dev/bus/usb/00#/00#\x00'}], 0xa, "534b0ca039549dbf198f44d4611a3b9d28d9af7a6f3c1109532a399975ff4a5c2c1f3a8dc2a2c058eee605fb21ad66f935f272c04d13bc46374906c533053e9745"}, 0xc1) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:55 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)="88000000bb4a636ab4b44f780e62e158766f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce00040000000000006f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000b60e30a84a5bfd3a108704ebcd60e586474c3c9f0129bfa5a23469ab538deecb8e72c75788f6e0cae74d8ce1008173748a8c2d6181c9e0c98a66aa", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bridge_slave_0\x00', 0x100}) 15:12:55 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4008550c, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x20000]}}, 0x1c) 15:12:55 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40, 0x0) sendmsg$nl_generic(r0, &(0x7f0000001980)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x16f0, 0x32, 0x400, 0x70bd27, 0x25dfdbfd, {0x9}, [@nested={0x1004, 0x10, [@generic="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"]}, @nested={0x400, 0x15, [@generic="77d3e9e43cb3fb098ba16c25126bae706aecbbcd6085adace724f7a5cf131867f61fa4a523212b067451a4f83e392d0fd191c93ebca5483072a24553076dabb83c851a20e876fffbef67a868dc6e47863e93561259aa3da797c93decbc8fa0bd850fa7422738291a6d39dd5cdd8b508d390ceb50760d74e5f7b1bc3c618467b2e34cb497e0b144fb8882c2bf7bcddd44d158dfd5a4da5f39d404ae870d05a23dae2981de0c54fec29374c09fd7d71ea8e28b207b6ecb3da98a70519dc9ed13dc", @generic="52e53b0720a7fdaeb80c997b8db66e9e5758ff0d7872a16711ff7d5d58b22425458a58f80b9caf71e03bc7e447c62c37b0b9785b37fa407a16d15a6a040bf646c5d9f2e811e7b51a6461960171eb3b10d7034885ec00e08f1d4035f9b4ee112e0f890d62a40cd099ad45c6a9333c8108740421dcfae5b53898a9de037df8ba7cc5e34a447f683e967d9600aecdb93886c52a3aa77c110dd54c5f3987dc2fe056b77c105aa3db9a6e55fab928b267fa195cd09fb2e7279f898a", @generic="44b7ff2c7c9946e0ae4ad70a3fa8c8b9c5da6f0d2b2da4960001b6c498bf9ff9b5fc29581ce7631b00f4bf639b2424563cb71044cc2c595c1b40d1bafee292391db419bc699dc432ecda461a1972b28bb32bf00be6ee47cbe630fb2dad3e7fa8eff37e954614fd3d8857785cc17bd952f857d932252ecb4d750ea529f5c6b4b131e2b72a761275cd3294c00fea2882c00216e2c9d64aeb746f3e399d5f8b6cd2f39735d8c1ddfde4444bc92d4d0741840cb24e4c6afce6b3d0e89bb686304f24b2531c02d12961ca19ee2a094b4625bc9ff2", @generic="1ed6e5c02e5bd6dd38efc125a1a21cc2782644321e7e33e8b80eaaf1c9eaaeb63c29bc42c7d33f3e6913201ed10c9f3c7dfba52639cc97c8c3daada3d5813ee822e2765350902a11ad5381f64bf490f5a12ca08567aa1fa10607263849533cb1c6250bb2c932ac202bc5e1db4c5f526c045573c9551d2d988a331f732a9f69337612aa2a9d96827b9dda646effdf88eb9832425469f2baa97b1bc47a48d25339217337128c05ff6ac61e170121d8b73f7a2c8ee0e9cf4401cde55d94bd03329941501f58a3e65dd8d73c5ffcfdcf34af11520b1b6dedf2a9f806fa8861358c31c1ea7557e5b3db", @typed={0xc8, 0x4, @binary="f4f14f805a7bf24d1597eade8accbc4a8499c45a6941daa6b12ac8953979aada07e7cd7549c038743a60ac61b17a200bfe134412ad9b741db1c39903f8fa37c39ecdc9136180840512475da0d980a45d59f68bdb726540a6c758a55e524621336662df91e70ec0125b213b2ed1b9ba3048a9b2933df67fda8ee455189f0ab8c221c8e64c3888a6d9537749d565bb230bb73d9b68dea8da355d77d773561b037956c0f501a8d62b4457a03ede0d0ab5902f32440b2e8b7a4875d1c0a3a0ef3b9c3c73"}]}, @generic="a1248e1c5bce1166a4e398d647cfb2a3cd2794070211ae796cd05d733cf99ebdffd08b63ef8aec09b622f6dd393c179b9a3028a1f6ed07f77ca12eff73cdcf417457071c5df01063fdc1a3106900f4aa4f42a7ff4779a10901df3118b62e846953695d66b340aa5e0fc3964f77260712a84ba5462df8e23973571df0435e0e40faa2b5a2bd75e75062f61d776eb664c9e7b1d429c59a79a3abaa062872e4b5e4bdab6663664a592f3a65f71927903a68c447b0d381c2de4b9432e1757bc730c726af8d857fad40c65647e27f6490ba8b76f2bafa72495575a2381fb1dd776800a76cb5e2014d58b13f3ee5f0a911852b", @nested={0x10, 0x6d, [@typed={0xc, 0x45, @u64=0x447c800000000}]}, @generic="10cde970f7a82d64d2a9390c9f9cede03b585bb47a2db017ade2e2089dda9021399dabefd2ef6a75f54f543932a32fd244164ced1b3ec05a319e146511ffd3cfac3a761e1e7ec8c7a377ed31f153cf39ab1d270494047cd4a2422f51705a14e2422ba5bd62b110df0e2116a16ae413f9bca1529fcf8f2e6f6b3441934728", @generic="c5064fd9ef4d7b2725eb0fc7ee10e0bb35c66b13a425465ff52e9feccd4df7bf635d902bfc84d2da156cdfe69cd9faa138811080e274586ba031f4b98e74cb3b4460511e83a53afe1ae5af4877f13a107c0401571323d61a0092153cb9e9ce414d340e87609f9ed372a548cf3b", @generic="cce09f007cbdec2933f58be348d8e5aaaa1f66c4c6b91e9813d8298e3b75e724ea2161b9cd0de987de6077a8077b96bb70b5d38bed84cc1b2639a3fd9f82674c7df44b2eb0fc752a857e877d3dd1ba4c8d8b1dadbedfaf96cdda8891e3f074f33a56d1ed2fe56dab3b4d3500a3f69c6040242a15427ee8a4ffb66c4a0f1713b3cd8e95484fbac60104ff50de8280ad29e542488dd686aa109933b560166a864174e2633fea534a3cca35550fbb98602363340de4b5ad2726910de5cd7136a0601dca10d1d55b94967064e405edaf8146467eae08621ce7af89907453c8ce6f6df0e71ec606d308301b915466"]}, 0x16f0}, 0x1, 0x0, 0x0, 0x20000010}, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000019c0)={0x0, 0xffffffffffffffff}, &(0x7f0000001a00)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000001a40)={r2, 0x4, 0x8, 0x7, 0x6, 0xab}, 0x14) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) getsockopt$inet_int(r3, 0x0, 0x17, &(0x7f0000001a80), &(0x7f0000001ac0)=0x4) 15:12:55 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x7, 0x400, 0x0, 0xfffffffffffffff3, 0x100000000000000}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000300)={r1, 0xb5, "88bbc9267c61189befc6bd97f1ccd601b7a8937279aef55c7a664c2ffc589fdbbe9f25b3d63269f6a721224b4366482a96faf7db83cd95363806e556bbdc764a44df745a9158a2e41f03ad3bfc5d77b44535a37f779a2d1187e677de14837ebffd7d2b4406ac760561396b0576df8c073b3d2ef08053eac4c62335ee332b44262b0a2f37514e82e96a7b3ce477f5ee7f0820e5a2413793e21ae9ce03540a920e1bcad6aad9198fdcf9466794b48eb310a67489950a"}, &(0x7f00000003c0)=0xbd) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0xc}, 0x8}}, 0x9, 0x8001, 0xb3, 0x3, 0xebd}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={r2, 0x7f}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) 15:12:55 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0x80000000000000a0, 0x1, 0x3, 0x10000, 0x1}) fstat(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x7, &(0x7f00000014c0)=[{&(0x7f0000000100)="f0551160a18748b53924ce61aac93ba5055ae7883eea5711651f1ea872580988401ffb93f872de2581c26d9ec00ab16a92b3acbc72ff3e286634308e159d7b288eec68cee1bb31cc7a09e3f05d7b86cf8a69766977b8fd1af05290db248919f6f278f4668e1acaae8448b77597cee0712bc2fb3ec5f3f3de96fcb732d39ef7650078d3ae4cbb88fb8d256ad579283263dab74eeecb1f27197d1f30ff6e57cd70dc8b8f5c42f1970a3c783ca30e0c029d465924dbebd7b9d6da7ac72c50d214b6ec7e1f96cc799e1f263bd71585d0f9674412617c41f74584124ed1d0571a87b6eac3b161c5bd38a68af724fc6511c09c4c413900d2bc2d8626315223c9a141ce6320721ffa11db82a7c0778e8cb9c7e78235dfe26a2b64f5866ec08a789e09dea5a09ec28d521eb4590b0784407e2b7d6a87c13e19cdc81b34cff5d3493fd8acc317d5dd8121f7dbea7883daf5060377c95e594c2e9643ec95a1864409f86b4d8c215a4340786fa5ae62cc3fd180047f4222754d0669d869d4381eeadf8d76029477056287f08aeed6718085c809d7fd4b5634af2497ff686fe7b6c3775d47361115b3ab6680655dbcfc97ca2c7fdfb3e8baa013da02ee1435807fe819136d3c084ccf0368f213f704cbfa1b17159938ecdbb24adaf2a5a94e5e8c25986f3b74a42989566bc1ff656ab590096339347084ed18bbf3d4d8037c34d03e8c420a0604e1f5c8b4e362a210bb3c2b9f725adc9eff76103dd7cd2d85c3087b6e87ac2b601a49ce52447cec287b58840319c9cfd9b993287365007fd302e4182b21149ad9f7182672029d3f1a629f61ca92337434c0b10f9eabd60ed30cb61948b3d0f3cddbbefbd4774c7c116402300e459d70a774aa992e988ad5c5cc0b3e98da09449f3eb56dbfe48e5a2b41d7dff591f808b540337862c519f12207009522433265e9b324156b5563797252d8143ffe2dd29f877f2b63639b55b04dd7bc544576d22cdc212e2da5b1735dedf616b7fa8598fe048a95f75cd1a9f3bbfdcdba0e7b99b0c089ff0563ed32cfb934064dcbd2152cf217547692da7d859bb4ff6030a910fb134a5bad8bde147cb9d8de4a8edf506028bde1a06db93c1cd8e88cfeb429475bbd95438adcf6f3685cd88e4c68eff13dc2978bc697c98e3bfa4bb09e8acfb3938b1b58e5ac0c8a76f8fe4a29ecbe61db13f7ebe2a088c4706d8668020c609694a6e0ac20792e7ecf4b9b43d2109b5329acbd2927386cd3ebd1ef7acf18244211463637eb4c4ce4e1cd504cbdc35773cc607ccf3b87ffc32a2115211fcd3dbb208a1eb49959a00369a6e1f59b25bafcc3430053acaf41f91af896e20caa4cbaf4facbbfa4d30949b87c8ca93c58c5b9f4a22a2798060e85ab7cd8d6a32dfc190f04661185814aa71a7340c5d7910bc6f0e570ad9604cb5d1a857dac649501e32bdf9d7dd4dbf096791d66e07f40e492cb9c26255d9ba01495fba2f2f2b7cae79d302c25d4b364bd0816f3ffa197ed15220d0770362f854552f58271fd87dd931ac619024cc6fc3344cc03aee9d3fb54a1ab460f2dbdaf88be46368a8c33f3c342d1dbabce4542997fac9926da5de8ff950bb71d83eea6b341d7c709ca7f3bfc6d727a0f6da325954e4456f29499e8fefca46faa9debcb20e6c5e67c6ed25d316ae587efd1d9c71a26ca82e0b35241727cd299bc5f6f68741020bf29a96c1988d7823ed4caf92b535d1d29a527aa1bf32e9e93f9582ea9cf15c3bb2483459d64f7aa10e90b27613ac7835ccd679c36b25a427cc9d79e726dae1a0863090af7f57a14fbdb03fa7e3daff29abcaa9168a16baa0b01e16f31a0e451d9ba26f512106eecca54ca0e0ffd028c1159ed774fc9eb27c52382a55c587905e3ad0e1c319ed5ab0d0dd3246154ff86fbd03cd09d0985321b8f95274382cff8cb64df93e3f767ec07f49a0cd22b41962580186b8453ebffb27b1988825e71683897db04a443bc2a4e41f97ae20f101a661472b97078be05fe41a63632618f99f4f47d644c7b8918fd5456aa754118e40f10682d33384462d06a8f5a9d3788ac3285ed14e9d5185c7fba358eee37c0ab63923a44bf423495ab660d36cc17254d98f8bd4bec2c3a65d67f45a4138a9c661078e8dbb86ac574794b710bea8b5cdda47b9aa557573d78f6162278a1dc138f10a489c407ba397a67a88a45f3983546d4a667f74b5c9b376aafd5eab8e91c70fa1513ebae07b39913625bd994bb79da62b587e9905ecd52394aa5cc4c77ccb9cbbb3e19e321834559a3129f817bda7c325f653db4c9e923b0f06b85bdbd9f35d94aa4c425af938e1164903b216826e3891737e25321841825872f7e458a746468da2fc819c751c49b85707ebf3404938b649c4f4d8b3fd8074b07a36a762d9348dec878b8ee27d0272a12063234884f6f9b445cf0750a1f0e9fb0d2f31de421d30de3d5137ee1d07902a9dc412f0f87b52e1175412db5afa4190933cc1a5c7b3f2c91a549e9d1a90f746b11c4f95082e37e4a460c23504d644b2538251055dfbe58cedb17d42ad73456868becb2fdd3b9b911a24cde3d774e32a1b69851b65eecfc5082ea7afb2f30c2de7eb9ceadd8957e5bb150a6b1c3831e8abc145b3ed5a7c952bd9ceaa14a1b11e91839fb92d41dd4c5360f5d367e215c9e90dc316e7438ddf1cede2074f42592609c25a20e78efff40b7d5949b5de2db739f3823f5383d768e87ac3e49493ba72c8cd6bf8f581276f76166ef725ed26ea9d2d3bebb0063c7353958d3be5b679d724a25396ef9f82871ab6f1fda2fc4c236e53174cbadcf8707c8b0dc75bd9b2727323065851db9ae128719d0a93011737d8bec5249769c27e882ee0032b4f04a4f3c945bb45070bd90de21d202cefd661ee152dddd5f924cab7d7f508520b7f3a5c370aebd8864ab6cb7b13030a9916ae474c3ad5e6066f3fed0e58074e9de5c696dcebd9e4e57a9483daf24dfd2af7667f1085635bd507e59141c161a2b0ff42974477039e351426eaa15d96297613e898bf54d8ba279a698ccf048d79e26aba192291278431b9fd43d2a7a57dfa4fa7d19854212098e03ebeebe882daec03eb5075bb2fe57eec4601ee679918394e0737903a3795b135190da82ea35cc01e40e2b4eae3bee5fc904ea0341f76e4bd2223007c46e48439cec975b02aeeb9354fe574e585854c4076a5aea34f49a44caa66dbda5c9eef7e8762b4e6a9444b582f23dbff0e5d4da3876350d2ed83afff7eeb9b2c2effc2f383648cc49a22af9106c5116da2c4cfbd6a89bf3897093c068c699e054cf9196488080369300aaac3a4726a3d335138f77693ffe9a301802e78f35882a38de7ae84f922780ceef471a872cea58d9193b9bc466376c637e76342d4f859d4ff73b201e867e3fb097eee7c9753df220445c8a48e4ab2ec026d0c8623ae3df71643f6c21bfb726a988a1827837e8321aa888e9b53b94704bb0cd4afac9639988a6214082fc0987c4ac947df9ad749677962fd9879f37b8695628a074eb5cbc2273cb5197e30a77361c01ac6f48d2163c5e478354c12bf66090c706f4367b439196ca528f1699337d2f4170567d2c4dfddc64ef49dd1bc1c867b35f55c5fb7bf1489b1071cf08cb8940d7724213f321bbe725a0e4a568a77867ed2ff69ec5e187fcd4029f587868460bbbe79af6fe6671883fa8d09950dfc3121e29c63379ed49d13b77f9583f304e2063522324913c7ba99c0bc77165294ecb5665fcd909c8b86c65e61943b6bd8d1b721cf79dfd4326b4a2a8d7d0b6afe94201d35b8c229b5386385b5b2e651f189e82393530f7822dc80e88a9d0e497f859fe0974818d1def6b27e1fed151af9b5aa4f7bf423a9c7ddae890eb98d56b1f25eb1d08eefaff39f13cc7a678e70e568f02ca329efdd5003e13a08ec25d6256da177ec5f48be51fcb623272124958a521cf7d0e4fe9799b805a2b7175902ab61110b5ea5a20a5a8112df4c9ccc7518dca4bc18aa37337695012a0fa7511003ad512faa249d86269ff8411373fa816930cbceb8744f61e364c043f5d8a8c6c028ad56155589bc8546971b6d41f03e5247994106685245ec22409b2ac0786186b4e18510bd6e68039aae1d25393bb075347dcc2b712b43615b3420e820ccc26514d8338b5d8f2cdd4bcfc22280d63b659957d49faff5f57afe2fea29a59c895381a86116ebd5a3061a8b15e1ad051b286407485355fd966372b06eb48363db42e118ed24744df8993b8fa061669d786030d0db49246e01b44957c85ac52a6a83527576405167d6f3a3faa356045e807eaf85d8fb5ad27a58ea8b4176e07829508736cc94671e9721fbcc1dd277afc55d74b8f09625ff0983cd7eab493008530a8b66ac0ace76096aa35a2a98305ec471c3b818142755f14c0b083d8d2633509a75b12b022038788b4019e9356f6bd0a9c44fb2cde81a599a4b858ba94efe0cc4cd7d8e9d6620115a75e347b82b5d2105842c15a64fff8a2675e4bc578bc3b346f4077d3617df43c33eab6e267fb7513310c351e2fb43e63561365ccbc79ed27c877be437c73eda928ea59f8fada8a17b69b6caa3600fad5dafdb378d07ffaa07edda6705e3f2891d29c12202ffef3cad0a12e86704588053e3561d1d7cc18c1c804e16941b5e133a17df0d7b31171be46b7608d95fd98ab3849c8530645dce160e801d11043cb1611b58ab2e8bfb61eefad6b2b0c810d664c084cac75fde61c7ac26898f75d5e2989789f912c7b0fdbc0aa819c5eaabc60d4bed6306be168422133b94776cd5b7fdf23e3f5eb1cbbdb2a76d821ff0b7c23080f2c1009e620741cacf9e586ff274daad2ad21875b416e979898628d4a996a66b9fe2ff093b50de66b3c63a43c6161a1ec70830521d2ce402b2bff17579b2a883829136cf467779d076e8a76cb7c93cdc7ca39ebc05f11a05d8825c9a1d1afcd319d06ff80f3f566ceec78801c803380bbd0070c8c874ee75ba05d8213763d4515ab952cfb24441753dae35e62125cc23a588adf3a837256464ddb68a10d9115a01f8b317ca7aad9cdc9cf4bef2dfa54e9a7e22457f86322d46e3630eaaa024118a1d2e82674e42f7e7fb270ec0aa01f460f63154d83e9298877fbded878a3bf05fe4ce3d3234503180f87b2dc1af7a07ff3367554e8523a7ec36ff49d73e927943b51fc6eb1c44e96401f92e97d9cdfc9ed548b053bf8bfacb65c4477976325958640220c8ce9250158454aeee144a008638235dcdad24868ec7fd90351221224c442e63b2a792a53db4d029fdf502c27cc7f0a2afe03bc98344d0b1c64214c25825e29cc8cabe879475e87cab7790d02ad1fbbd2914b382728517779bee892cb8148c347c0f68e5f2e01da764faa27fcf81390a10e56514d7209989dc6687027061404cc624cea1589ca4f564b367c6f981966bb945d454577ffcf45c507f8086278611ff77641c844cd76597c7d9f5338d0d0dcf144865d04f0f7f8f149d58118e62f2d0f4cee0bf1b9b0c00b1a20b0ddb15d55926afc63a6a4844b87524068d2f97c5236493b3c50d4b2bfb4849fb2472311b38ca171bac24ca09f50c9a42c7563517121b6ba2844aeb9a3a021dcc526b3bc32e84d94a79eb6f0064eb5027638ce639d1ffc0502af634c34833145f61ab05fa11655ef0274db597fc2e75f5937d5662b9f1bb0b67eba4c336a0ef3f94709ba6a3a244481dbd4a821351d320b319db371df77b6758bcd8dd8da60d4024e876996160121ba5f465876a1d7e251106507f719ac", 0x1000, 0x2}, {&(0x7f0000001100)="932f3a61f2d463de03a9723a526c200518681975989a59b1fa2c31bef81b4f7846c3c90f6f04e86ddfd2e125c7e0ec96", 0x30, 0x9}, {&(0x7f0000001140)="210998604163520a54b4832d0bf721b3a065923ce75a5bbd5221ba3f3b0e2e05ff6b38c533f194b146db3ce74bf75074b6581da97381bf5cc1f69c4084304a8598bc1ff16c3238ab3f6f10b38f8bb0d55a4b3e3223238632476027da110987e077eb66a32e51920afdef35f5adae234bf05a7bc972a300c01eabc68047171e116565eb2f2206c5d71ca2b14cadc2dba2235fc76712c331e4968fa47a3a6a15475460259cc726c28965d526958e66798d4328dfa3f564d0dffbed84984435c2940f4055fd0862e638c7cefeafd11a8f06fbd645920ce20538367cb9b2988bbe610fc67cf0d0c21d239a131b1539316a2ba5e9225482", 0xf5, 0x800}, {&(0x7f0000001240)="b7c5dffc3f00e2003e2f96bebe8b5d7906db4c72560a69da001873c5dc8a420fc483ff8a7b1c0736b0a6f4ce915359a2c9c26344b1b0c502365ab93ee39e60ac1748eaf7206276e9da3cd9614ad411540c3bca1e1a24e1642a2af415f0289abfb9bf2149572febd3e4924c6710048c6f5f194b744f0c48b29c1a5c3d5807ef29015a942c96cb9e2463b544bd5d0da458caaab2d71fad7bc2a615a0c1ce26affe34fd58de870c15cc66d2057355cb2ef79cfd94e807c452b72c113f674b5f64f104988a492a8e064199541040e39f48a4d7d9e9", 0xd3, 0x7ff}, {&(0x7f0000001340)="27368437462f21ac8cc34d59156f472a7601bb53f5f985534858c579e45241cd1e4cb2eca249", 0x26, 0x6}, {&(0x7f0000001380)="4c3a0c0c60cc7b69cdc601b79e47", 0xe}, {&(0x7f00000013c0)="f065702087aa312df33eef31aca3ff3d7c1672a286a8fcb66e7357b5be5ce807ebf3fc7bbd8f756fa8e152afa07d08f30d64958427bcd9462a57d571fe6cab3239dd4a2e44627f5c88336e7fde7843fc20bb725925b4853e89469136b407a74c13ba745e84833982fddd64e3f59825a3ff3f9db8b3b2d6094c5d8125abe0fee13eefde6366d2c98ce0b46ee684b1755eb260d38f499710aa2f9cfead322d4d66d5b5d714e9fa8c3515e5c12a00745df80e883cf4f205129c320701b700d6c12bb667b53d3ed52f65d19e39fe4bd173", 0xcf, 0x4}], 0x2000000, &(0x7f0000001600)={[{@discard='discard'}, {@gid={'gid', 0x3d, r1}}, {@discard_size={'discard', 0x3d, 0x3}}]}) [ 771.188055] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:55 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0xad9, 0x4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00002cbd7000fcdbdf25050000000800040008000000600001000c00070000001000000014000300ffffffff00000000000000000000000014000300b914141c0000000000000000000000000c000700030000001000000008000b007369700008000500010000000000000000000000000000000000"], 0x7c}}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 771.303672] JFS: discard option not supported on device [ 771.309111] JFS: discard option not supported on device 15:12:55 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x80000000008, 0x12000) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xd, 0x5, 0x20, 0x5, 0x11, r0, 0x7}, 0x2c) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r0}) r2 = getpgid(0xffffffffffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000540)=0x1) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000380)={r3, &(0x7f0000000280)=""/220}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x81, 0x5, 0x3, 0xffffffffffff0001, 0x0, r2}) ioctl$sock_netdev_private(r0, 0x89fa, &(0x7f0000000180)="f809ac3fb896a09a6de836884ce244ba03850be53e71e3a0d08c743aed8605455b00eedd7dd7a23633ff8533371e22d9378550168888b0d4154df327995a86f5b50f364b2aa88281f6aaf00bde63fb75da0f1d6b20f5d8a0c7fc7e142f4b154332dad534ce23883807d4e7b1ff1d68587c4c2210e3d12189d0b1c196bc46745de46684811167145e82aa2877b4dac01af822d22c5e324815f42a6bed51431f54b7d3a807ce2e32606f42c6ab9942b173c7c79eb7c4042f9c120596ab47") getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1d}, 0xf11}}, 0x5, 0x0, 0x0, 0x6, 0x4}, &(0x7f0000000480)=0x98) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000004c0)=@assoc_id=r4, &(0x7f0000000500)=0x4) 15:12:55 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000000c0)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) r2 = add_key(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000002c0)="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", 0xfe, 0xfffffffffffffffa) r3 = request_key(&(0x7f00000003c0)='syzkaller\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000440)='cgroup\'}system:mime_type[+eth0cpusetself\'\x00', 0xffffffffffffffff) r4 = request_key(&(0x7f0000000800)='.dead\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000007c0)='&\x00', 0xfffffffffffffffc) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000840)={0xb, 0x8, {0x0, 0xe995, 0x9, {0xffff, 0x5}, {0x29, 0x6}, @rumble={0x3f, 0x100}}, {0x57, 0xffffffffffffff80, 0xfffffffffffffffe, {0x5, 0x8001}, {0xff9, 0x4}, @cond=[{0x8, 0x1, 0x6f, 0x6, 0x4, 0x400}, {0x80000000, 0x1adf, 0xb025, 0x1, 0xe9, 0xb9}]}}) keyctl$dh_compute(0x17, &(0x7f0000000540)={r2, r3, r4}, &(0x7f0000000580)=""/193, 0xc1, &(0x7f0000000780)={&(0x7f0000000680)={'sha384-avx\x00'}, &(0x7f00000006c0)="f660af632c9f9e7668e7df88bd052d4912e8e24c31814afbebc60027d76614704e88ca41bb9862bffbed748289a6eab7fc66039bc3808d4279fc32eb4ed170117940cd4465bb15b557730808bfa9a56602bb20d53f2bbe0dabe7f0fda60d8a8623c469c1557b2a0721955bb1d41fadac4417ba885d5720e8c38a1918092054fcc80cd295f96c52938b51d66fda81b44f5501a9eb675b27f6ed221dc8468457e472c149ec55e8dad7da5862b9dc096cc07b", 0xb1}) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x2) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 15:12:55 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$KVM_NMI(r0, 0xae9a) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000000)) 15:12:55 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x2302, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:55 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) process_vm_writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/125, 0x7d}], 0x1, &(0x7f0000000580)=[{&(0x7f0000000280)=""/221, 0xdd}, {&(0x7f0000000380)=""/116, 0x74}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/198, 0xc6}], 0x4, 0x0) syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x101000) 15:12:55 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200000, 0x0) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, {0x986, 0x171c, 0x3, 0x8000, 0x1, 0x8}}, 0x8) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) write$FUSE_BMAP(r0, &(0x7f0000000200)={0x18, 0xfffffffffffffff5, 0x8, {0x17e}}, 0x18) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:56 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:56 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000001c0)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40000, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000100)={{0x0, 0x989680}, {r2, r3+30000000}}, &(0x7f0000000140)) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x11000000]}}, 0x1c) 15:12:56 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000640)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000340)="c09234ae43a23b370390098c1d0a6add96cbe23ec9f892c8b72682792f1e08cf91e97e32ccf360352f8bf0d614bd67a4b61bb94ebfd70c756145dfd2", 0x3c}, {&(0x7f0000000380)="a03dbbea6aeff1f63f6b7b505df94875507500bfe524d677868933f33bfd2348294c19eb8e2f1cd9b8ad62e4e59c6921dcfc3b293546a743666c2b39600b048cfd022d7aaba38a04711f3640897c1df4dc13e65ec19ed70a48c9ca0a4ebc52532b74c5e3db1a7419def8812fa83b89f83f2bc0d8081b89537dfe9b5383f4d9e47e7ddd172433de32c41be3b5d630a079f6a785813c4e149b40c361c41f18b64eafd9006860da8361250895a3a2a1bb3d185312e462475d56998b501289f819b40291fc137452", 0xc6}, {&(0x7f0000000480)="6b6551003d6fb7d47bad1d3155362d6d6102f9befb2e9460c5c9b2b633d258e1c9809826d4ea56c524d17030bea12f3d0afbbaf3dc2be8f9816a4a3e1f63679dbb6de3962aa1aaa01e2e690d4b35d2b5703df2c042981ec410c3064c8499e4703be0dacb", 0x64}, {&(0x7f0000000500)="aabdd25be6071acf595ebde9a0078f47c2bcfd2ed9905639915cccafc400e91b929d6b1ffa1b32ff1e121803ea60572a0ebc704d2f0bdb4f5558b797ac4cebb3a617db1c99a161d3f2f89c620066588a46f4df7dd861cafa18b3c3e3d782af6215c63d31cfb89284273661fa18b5585cec4c6065afa130dbaa2b3bdeeab437802ba2b774ceef31581eebee7bb16fd9c66895aa594e081818da3285e7954c8ed306ff9d26d1521a6b7247ac9d8527a08beb804721b01846a48c8795b354e5b41a71ab5e5db0c074672c3c7fcd6b8915630f47cd3bc41a97b1", 0xd8}], 0x4, 0x0, 0x0, 0x800}, 0x40000) r1 = getpid() r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000180)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:56 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x7c00, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:56 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0xb05}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={r1, 0x9a71, 0x3, [0x2, 0x6, 0x0]}, 0xe) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) [ 772.292870] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:56 executing program 5: syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x1000000000}) 15:12:56 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000380)='ppp0trusted&]\x00', &(0x7f00000003c0)='nodev2wlan1eth0(.md5sum)\x00'], &(0x7f0000000540)=[&(0x7f0000000500)='/selinux/user\x00'], 0x800) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x1d, r2}, 0x10, &(0x7f0000000680)={&(0x7f0000000600)=@canfd={{0x3, 0x6, 0x9, 0x7}, 0x1e, 0x1, 0x0, 0x0, "d023368660b5e98bdb2364689606288aa0645f4659ae6727786dee299271803cbda680376729c1ff934fb88fce57bee043007dc157cad5db0880722fa382b7bc"}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000740)={0x0, @speck128, 0x1, "13e8f88785413b69"}) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x20000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f0000000400)={0x7c, 0x3, 'client1\x00', 0x5, "a8830f43617d4c5b", "0a98a3b6c4a541535c5ba86cf26c45b0c2fbfa69d5232dea98239d7e0c309c68", 0x8001, 0x1131}) setsockopt$packet_int(r4, 0x107, 0x1f, &(0x7f0000000700)=0x1, 0x4) pipe2(&(0x7f00000000c0), 0x0) 15:12:56 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) r1 = semget$private(0x0, 0x3, 0x400) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000140)=""/241) semget$private(0x0, 0x1, 0x5a3) semget$private(0x0, 0x7, 0x480) semtimedop(r1, &(0x7f0000000040)=[{0x3, 0x977f, 0x800}, {0x3, 0x10000000, 0x1800}, {0x1, 0x5, 0x1800}], 0x3, &(0x7f0000000100)={0x77359400}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x7}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x20000) 15:12:56 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x2, 0xfffffffffffffff8, 0x9, 0x22, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_sa={0x2, 0x1, 0x4d5, 0x0, 0xb9, 0x7, 0x4, 0x60000000}, @sadb_x_filter={0x5, 0x1a, @in6, @in6=@dev={0xfe, 0x80, [], 0x11}, 0x4, 0x10, 0x10}, @sadb_x_filter={0x5, 0x1a, @in6, @in6=@mcast2, 0x0, 0x10, 0x4}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e20, 0x4, @mcast2, 0x101}}, @sadb_sa={0x2, 0x1, 0x4d4, 0x9, 0xb2c, 0xe8, 0x1, 0x80000000}, @sadb_x_filter={0x5, 0x1a, @in6=@mcast2, @in6=@ipv4={[], [], @broadcast}, 0xa, 0x10}, @sadb_x_filter={0x5, 0x1a, @in=@rand_addr, @in6=@mcast2, 0xb, 0x10}, @sadb_x_nat_t_type={0x1}]}, 0x110}}, 0x4000800) write(r0, &(0x7f0000000000)="16859f22f2f24e1ae907ff62cad0", 0xe) openat$cgroup_ro(r0, &(0x7f0000000280)='cgroup.events\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:56 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000000)=0x3) 15:12:56 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0xfffffffffffffffd, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) 15:12:56 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40049409, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:56 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)=0x30) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x40, 0x20000) write$binfmt_misc(r1, &(0x7f0000000280)={'syz1', "81ff6a883587821e14c47fa5306744ed24eedb0fad644241e8d55abc04a35e77eb7736aa346fd2aa220387ac78a475358a9a3c0762f4f086928e42081051a01a96b73a6718f2286db374d85b9517758609db6f310c50e317c259b084de8755fd82cd25a097337101846fc5b38767ed4bb4cc0b3464f47113bf3734219970c2e0216e27c72db6222b2f822270303ce540b815f96c557ccd3c62f987e3c52e6b287dc44ea3bd5918508433e2ddf3cfd83e38c53f5f0e3b7e42a935a39cf82b1c30e42ef43fa36c3b036cc3c909a559faa04370294668b56828b56b51173b"}, 0xe1) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f00000000c0)={&(0x7f0000fec000/0x13000)=nil, 0x9, 0x2, 0xd0, &(0x7f0000ffc000/0x2000)=nil, 0x3}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() write$FUSE_CREATE_OPEN(r1, &(0x7f0000000480)={0xa0, 0x0, 0x8, {{0x5, 0x1, 0x800, 0x9, 0x8, 0x0, {0x5, 0x7, 0x20, 0x401, 0x6, 0xc109, 0x1, 0x200, 0x0, 0x5eb, 0x59b, r2, r3, 0x6, 0x2}}}}, 0xa0) r4 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x80000) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f0000000380)={0xc, 0x6, 0x80}, 0xc) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x3, 0x4, 0x10000005, 0x8000, 0xffffffffffffffff}, &(0x7f0000000140)=0xffffffffffffff96) 15:12:56 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x2, r1}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x4208]}}, 0x1c) 15:12:56 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1004, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:57 executing program 3: socket$alg(0x26, 0x5, 0x0) socket$can_raw(0x1d, 0x3, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x2, r0, 0xfffffffffffffffd, 0x21000000, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{}, {r2, r3/1000+30000}}, 0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 773.077638] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:57 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) sysfs$1(0x1, &(0x7f0000000000)='posix_acl_accessproc/\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:57 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x321042, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)=0x3) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:12:57 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) flistxattr(r0, &(0x7f0000000000)=""/43, 0x2b) 15:12:57 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x2000) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$TIOCGPTPEER(r0, 0x5441, 0x9) 15:12:57 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000400)) socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000440)) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x1) mq_notify(r2, &(0x7f00000000c0)={0x0, 0x3, 0x1, @tid=r1}) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="00001900", @ANYRES16=r4, @ANYBLOB="09022dbd7000fddbdf25070000003c0003001400020069726c616e3000000000000000000000080007004e210000080003000300000014000600000000000000000000000000000000011400020008000b000a00000008000800ffffff7f54000200080009000000000008000600ff000000080002004e2200000800080001000000080004000080000008000b000200000008000400ffffff7f08000600018000000800060002000000080002004e220000"], 0xb8}, 0x1, 0x0, 0x0, 0x44800}, 0x40000) ioctl$TIOCCONS(r3, 0x541d) 15:12:57 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000040)={0x8, 0x20, 0x5, 0x4, 0x2}) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000100)=0x1, 0x2) 15:12:57 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045519, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:57 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) 15:12:57 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000100)={0x4, 0x9, 0x8, 0x0, 0x0, [], [], [], 0x7ff, 0x1e6}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x7) 15:12:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x25c]}}, 0x1c) [ 773.900631] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:57 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x106c, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000180)={'ip6tnl0\x00', 0x8000}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'teql0\x00', &(0x7f0000000080)=@ethtool_ringparam={0x10, 0x100000001, 0x401, 0x7fff, 0x4, 0x80000000, 0x9, 0x1, 0x8}}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:57 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x80000001, 0xfffffffffffffffa, 0x8000000000000}) socket$nl_crypto(0x10, 0x3, 0x15) 15:12:57 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x111403, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f0000000040), 0x4000) 15:12:57 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4b49, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000140)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), r2, 0x1}}, 0x18) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) [ 774.099401] audit: type=1400 audit(1537542778.020:186): avc: denied { create } for pid=10042 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 15:12:58 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000008, 0x400000001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:58 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pread64(r0, &(0x7f0000000100)=""/134, 0xa9, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:58 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40002, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000280)={0xa, 0x0, [{0x8000000f, 0x2, 0x7, 0xb731, 0x6425, 0x1, 0x2}, {0x4000000f, 0x200, 0x1, 0x3, 0x8001, 0x1000}, {0xc0000001, 0x6, 0x3, 0x4, 0x101, 0x80, 0x6}, {0x0, 0x582, 0x3, 0xffffffff, 0x7f, 0x5, 0x4}, {0x80000019, 0xff, 0x3, 0x677b, 0x80, 0x862, 0x8}, {0x80000007, 0x0, 0x1, 0x8000, 0x9, 0x10001, 0x7}, {0x7, 0x20d9, 0x4, 0x7, 0x0, 0x6, 0x6}, {0x8000001f, 0x1, 0x2, 0x100000000, 0x16ef, 0x2, 0xfffffffffffffffa}, {0x0, 0x3, 0x2, 0x3ff, 0xfffffffffffffffd, 0xe4b, 0x2}, {0x0, 0xaa9, 0x1, 0x0, 0x7, 0x623, 0x5}]}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:58 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff9, 0x40000) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x6]}}, 0x1c) [ 774.680025] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x100f, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:58 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, r0, 0xfffffffffffffffd, 0x81000002, &(0x7f0000000280)) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x8, 0x2000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x50, r2, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x1}}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x4000) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:58 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4020940d, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:58 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x123100, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100)=0x884, 0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x5, 0x2, 0x60000000000}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={r1, 0x2, 0x2}, 0x8) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000080)={0xa0}) openat$cgroup_ro(r2, &(0x7f0000000340)="6370757365742e656666656374693e655f63707585001d2173ce0066566d4518cfb5128448455dbcd6467c5b4f2123585bb2de69e7e0bcf073d2f7dc9408930e91c07658a5ce47e61294933f12d9ddc487e0441f908c5ed9ad5bdbd66a0dbb3426ae95417ecbeeb843f8247a1a15b81ae35c053988426e5eb6dd610cde9bf409960918821eb90256536e8c3a0c1aa99632", 0x0, 0x0) 15:12:58 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x40000) 15:12:58 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:58 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x40, 0xffffffffffffffff, 0x7, 0x400000000000400}) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000100)={'nat\x00', 0xd8, "d135a5c7ee0f9d5a27aef64ecb5e0c5d7f0340f049f14727ab75a27e5681552d3165b1416ec98b6cb9c63f64659847c8129fef4b7b62874d8744cfd2f2158de3ea642713163ffd67bc3efc8117fb57db08fdf51711483857283807507a71b0e44f961c2e88a1e4f89702ca77092190ef9dfd432a3b4f2313d3a60a3eaf41d306cfe42e77268e218a1fcd5c867583c439b668ff37f463532934cdf2196ed3d60f3cb17ab17cb25a99d7ee5c29ee88b190085a59924ef7a89cd5ce6ffc2f59b93447c820fd43fdbe60d5c9c13b119469752ad487eb39459abd"}, &(0x7f0000000000)=0xfc) 15:12:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x400003, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x7fffffff}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000300)=r3, 0x4) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, r1, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000080)={0xffffffffffffffff}) openat$cgroup_type(r4, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:59 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0xa1, 0x0, 0xfffffffffffffff7, "697cc5245fcde3c4c03b36afbfdbbce9", "6550c9cef4b3a5b9ca9d1e8dceebe5d4d9292c18b1e849da6ef363503f11b4690344341bbbe799badc9fa40142c7641f3791ad97ea9a78e79850cdb49b828f2ebc11be4a63eda4f489e7a2a827112c30c2e4e95dbb58b6de6155dccadac0c3e8b9e58ae34014ec30cb16e23ae8088a1dde02411c34240b70df8fffea65afad295b1dd8962bfa7de0622f645e"}, 0xa1, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) [ 775.042099] vhci_hcd: invalid port number 64 [ 775.050172] vhci_hcd: invalid port number 64 15:12:59 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x1c000, 0x0) execveat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000180)='/dev/amidi#\x00', &(0x7f0000000280)='/dev/amidi#\x00', &(0x7f00000002c0)='-\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='eth0%trustedcpuset}wlan1$$-#$\x00', &(0x7f0000000380)='/dev/amidi#\x00'], &(0x7f0000000540)=[&(0x7f0000000400)='/dev/amidi#\x00', &(0x7f0000000440)='/dev/amidi#\x00', &(0x7f0000000480)='\\!vmnet1*eth1lo\x00', &(0x7f00000004c0)='/dev/amidi#\x00', &(0x7f0000000500)='/dev/amidi#\x00'], 0x1000) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:59 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0xffffffffffffffff) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000000c0)=0x6) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:12:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x42080000]}}, 0x1c) [ 775.422591] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1002, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:12:59 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5514, &(0x7f0000000080)={0xa0, 0x2000000}) 15:12:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = dup(r0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) move_pages(r1, 0xa, &(0x7f0000000080)=[&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil], 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:59 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x78, "f6697d33d2109d8c19a295053138c588d41185439e341e6a2a1b1dfd6900ebafed7998ffb5a36de9d16269c3965829000b38083b4559c683c51ba03f792a31e71db70af61323d80da99a61cfd812cb576be68312f738bb834ad89e30c9fffe5507d43a0d8aeb499380f947d1f7b0f487b8e207ac2c2db4e8"}, &(0x7f0000000100)=0x80) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={r1, 0x4, "d902d6d2"}, &(0x7f0000000180)=0xc) 15:12:59 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bind$inet(r1, &(0x7f0000000300)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e23, 0xfffffffffffff801, @empty, 0x4e6}}, 0x93c, 0x40}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000040)={r4, 0x816f}, &(0x7f0000000200)=0x8) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0xa2) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x8040ae9f, &(0x7f0000000240)) 15:12:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x62400, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="c40000009a650a9746757151bdeaba2a80ffe5cfbfbcb7864ec989610895baccc33718273a4700387d9a150580683e1f37d95aa316e0e15e6d83afd79c5c743f7111fed748fed0398d075d8f2b09c943433433f05b40fa6a650d3f40068b244180eeb0a354b6f8b4cdce14b9b900175c38d580bed2a53d5b6c6ff2ed4b1f1b6b313bf168c888d1c8ac7fcb04c542433d5018085c5f5d91626de6cff902f367e5bce7ba8f177a983f8d706ea2668ddd35b01a3b32c29bbbef8841bd8e8734fd7762c599855fbaccd9"], &(0x7f00000000c0)=0xcc) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYBLOB="05e401000010050f"], &(0x7f0000000380)=0xc) r3 = getpid() ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000800)=""/106) get_mempolicy(&(0x7f0000000780), &(0x7f0000000740), 0x7, &(0x7f0000ffa000/0x4000)=nil, 0x0) sched_setscheduler(r3, 0x5, &(0x7f0000000200)) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000200)) msgsnd(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="2a4b56b8e10000a2"], 0x8, 0x0) r5 = fcntl$getown(r0, 0x9) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000900), 0xffffffffffffffe3) ptrace$getsig(0x4202, r5, 0xfffffffffffffffe, &(0x7f00000007c0)) r6 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x10000000, 0x40000) ptrace$getregset(0x4204, r4, 0x1, &(0x7f0000000540)={&(0x7f0000000440)=""/230, 0xe6}) ioctl$KVM_PPC_ALLOCATE_HTAB(r6, 0xc004aea7, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:12:59 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0x9, 0x0, 0x8, 0x800000000000000}) 15:12:59 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x202) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x7f}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r1, 0x7}, &(0x7f0000000180)=0x8) r2 = msgget$private(0x0, 0x400) msgrcv(r2, &(0x7f0000000200)={0x0, ""/224}, 0xe8, 0x2, 0x800) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1, 0x6}, &(0x7f0000000140)=0x8) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) [ 775.840601] vhci_hcd: default hub control req: 0900 v0000 i0000 l0 15:12:59 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'dummy0\x00', {0x2, 0x4e20}}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x80, 0x1, 0x0, 0x8000}) io_setup(0xd24, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0xfffffffffffffff9}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={r1, 0x4}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x81}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r2}, 0x8) 15:12:59 executing program 3: socket$alg(0x26, 0x5, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)=0xfffffffffffffffc) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r2, &(0x7f00000003c0)="ad87ccfced0a905c87ffd9ec24c3e3da3c04dfcec752972ff552c9421cec315462ac568a25827227a230d85c39897a3e8c0356c2629fb29386e1f938b63e9abe09e7c901c95936e596578e6993e76c500668d8d290cc2d9d0dfbe7f689b32c3ae3d336d07a036d60c773d0c3bfce4ef27c3f7f431561499dc7d2ad3f3e97281ad844542816cb831eef5fbef8fbfc314e6cd49dc9de3faf10787c57250bf3befd753a25779a99fbd203"}, 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000004c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000002c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000180), &(0x7f0000000280)=0x4) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 775.987450] vhci_hcd: invalid port number 128 [ 775.996802] vhci_hcd: invalid port number 128 15:13:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa2}) sigaltstack(&(0x7f0000fff000/0x1000)=nil, 0x0) [ 776.161686] vhci_hcd: default hub control req: a200 v0000 i0000 l0 [ 776.175304] vhci_hcd: default hub control req: a200 v0000 i0000 l0 15:13:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x2e01]}}, 0x1c) [ 776.343580] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x6, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:00 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x8900, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:00 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:00 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) prctl$setfpexc(0xc, 0x100000) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000000)={0xb9b, 0x7, 0x2, 0x1ff}) 15:13:00 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x40200) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000100)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:00 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000040)=0x2e29a41dab74b85) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:13:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa0, 0xfffffffffffffffe, 0x0, 0x3}) 15:13:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) socket$rds(0x15, 0x5, 0x0) 15:13:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x118, 0x7, 0x80000001, 0x8601, 0x6, @random="9f69c152fc31"}, 0x10) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:00 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x4000000020120203, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000040)={0x3, 0x1ff}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) writev(r0, &(0x7f0000001440)=[{&(0x7f0000000100)="ef4870890d1214d3f4e68907fcd6d7a51db5b40528d5984b2fd48db3871b91ce34a9fcdf1089a045bfa1777564237c18485fbac0b3c0a06fc0ede1213e938915ce046c41bb6da1ac43a818914b7ae72964782424d4de783d02cf6613430f9b1b3cf179f53c49c59ab98b0761ce74609c11b79964509deb14ccbc5726439b67716f0aac8928b7879631b37ee97e664b3fe9ed851efec417e97a68ab7b8fa6457453", 0xa1}, {&(0x7f0000000000)="d5d1c7a3ce86be3bde70d722b81c1933e295f93a1cba27b03df2e986434b8592b57007fe8b2b768ae7243344531fe119d5ba0bab195b4ac2a42c0cf484257cf6d4db5277b0dc36d1539104e0bee725f703695229298fe1a54a4382aaad37c412d44baf1dd1c0cab3edd2bb174820", 0x6e}, {&(0x7f00000001c0)="3c48756b1af89c81773e4f85f8de0e63e8b3640aae40491a2b1072d669fc25f1dee179a38039c592871f6bb0c89028e65da095af8f7bb9bfb078c8107c0116517eb0fbe70ae1f0f048b1d8d83416e8e17bfdb5e65fef3d3ebc8ba449a20b9a184e365674a1d68748e18b87904997497f7cbfa5d783d0cf935a006bf201d8a092d5458d40da2d9668e4346c390eb62b8e00818d8a0be69f766b680cbc61d503287a772ed122aa9939aaa97cefc500d09be36a7ed6c0b3ea797f98f534766c68df3e18cf33e228e38e551770d5ea66c329110846a2acc3974314a7c19120f06232e9fab69db4528c3a39e9d22e253f", 0xee}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="7a9487c3509c2ca437e5c87c2675344bdf7d197885ba4f12aa77ab80da229bd455c58717c5f49516e52275c66f31d35e88713f9534fe5d75d80db0077c3fc3e1a5b62c174d4a29737b4249a15c591826e3be28dbc2d5fab3501a83c85c040bc4c0b30bde6fcd562f15118149c6ec2cc21531654b6cc993ed27429c7b4a701795ad3a297848128e78b92b525c5e1c89e6215bc104b2dcf94c42d0484ee7e4ddb55a82081ba7e97731c943aa22045606d0a2dc274843d5cb974254cf420f1e96ab305ee91de37f", 0xc6}, {&(0x7f00000013c0)="d72d9bea05d86afa943c6d5d13864c410b5811c5da1e3f", 0x17}, {&(0x7f0000001400)="dfa49c4760f71413107c49bdc88cdb750e0219cfcc6ee751482c2ab001ac5bf5b24a24eb1b4e97aad521d3b3d35a5920de30422363394587833d4211993b", 0x3e}], 0x7) 15:13:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x590fa]}}, 0x1c) [ 777.038447] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:01 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xb, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:01 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x7f, 0x7fff, 0xc5, 0x15c}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000180), r1, 0x0, 0x1, 0x4}}, 0x20) 15:13:01 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) socketpair(0x0, 0x2, 0xfffffffffffffffb, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0xc, &(0x7f0000000080)="2f6465cc4461576964692300", 0xffffffffffffffff}, 0x30) capget(&(0x7f0000000180)={0x39980732, r2}, &(0x7f0000000280)={0x2, 0x3, 0x1ff, 0x0, 0x0, 0x2}) socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:01 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8108551b, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:01 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x45}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r1, 0x2, 0x92}, &(0x7f0000000240)=0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:13:01 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0x40) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x40) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:01 executing program 5: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0xa0}) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x8, 0x8}, 0xc) fchdir(r0) 15:13:01 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7, 0x1b, 0x1}, 0x7) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:01 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa0, 0x0, 0xfa41}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'ip6tnl0\x00', 0x1}, 0x18) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) 15:13:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x64]}}, 0x1c) 15:13:01 executing program 5: syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x5, 0x1) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) [ 777.671789] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:01 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() r1 = memfd_create(&(0x7f0000000080)='uservmnet0ppp1\x00', 0x4) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x4e, 0x4) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:02 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x7eff68dc4b30, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:02 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) socket$nl_crypto(0x10, 0x3, 0x15) 15:13:02 executing program 5: r0 = syz_open_dev$midi(&(0x7f00000004c0)='/dev/midi#\x00', 0x1, 0x1) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000500), &(0x7f0000000540)=0x40) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000001c0)={0x6, 0x2, 0x401, 0x5, 0x7fff, 0xffffffffffffff00, 0x3}, 0xc) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) ptrace$getregs(0xe, r2, 0xe7, &(0x7f0000000240)=""/181) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000400)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000340)={{0x7ff, 0x6, 0x8, 0xffffffffffffffff, 0x200, 0x3}, 0x3}) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) splice(r1, &(0x7f0000000040), r1, &(0x7f0000000100), 0xff, 0x4) r3 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x7926, 0xdffffffffffffffe) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000300), &(0x7f0000000580)=0x4) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=0x4) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000200), 0x2) tee(r1, r1, 0x3, 0x2) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000180), 0x2) 15:13:02 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4008550d, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:02 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pread64(r1, &(0x7f00000004c0)=""/229, 0xe5, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x876c, @mcast1, 0x9}}, 0x1000, 0x6, 0x7fffffff, 0x0, 0x123c706b}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={r3, 0xc1}, &(0x7f0000000200)=0x8) pipe2(&(0x7f00000000c0), 0x0) 15:13:02 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x121080) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 15:13:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x842]}}, 0x1c) 15:13:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() fallocate(r0, 0x0, 0x200, 0x2) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000180)={0x0, 'veth0_to_bond\x00', 0x2}, 0x18) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f00000002c0)={0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x5c, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0563044001000000116348400000000000000000030000000000000000000000283898e09cb80111fc27fdbb209aca396b1000000000000000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB="852a62770b000000", @ANYRES64=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00 \x00\x00\x00'], @ANYBLOB="6d55000000000000e83941f6251b6304400300005f"], 0x21, 0x0, &(0x7f0000000400)="f7929d945ed2b3149335417e154c13cf4c5038a5a5aaf11cdbb3c7ce9bfb2dcbd6"}) flistxattr(r0, &(0x7f0000000500)=""/125, 0x7d) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000380)=0x9) setsockopt$inet_dccp_int(r2, 0x21, 0x11, &(0x7f0000000280)=0x81, 0x4) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) connect$unix(r4, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) [ 778.306948] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:02 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0x7}, 0xc) rt_sigtimedwait(&(0x7f0000000340)={0x8}, &(0x7f00000001c0), &(0x7f0000000200), 0x8) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x545002) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000080)={0xa0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) inotify_init() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x1, 0x6, 0x8, 0x4, 0x0, 0x7, 0x40000, 0xa, 0x1f81, 0x19, 0x10000, 0x2, 0xe53, 0x4, 0x40, 0xffff, 0x7ff, 0x101, 0x9, 0x8000, 0xfff, 0x8, 0x400, 0x9, 0x1000, 0xc1, 0x1, 0x10001, 0xb8b, 0x5, 0x4, 0x8, 0x9, 0x2, 0x5, 0x3, 0x0, 0x40, 0x1, @perf_config_ext={0x7fffffff, 0x8}, 0x210, 0x100000000, 0x8, 0x5, 0x0, 0x5, 0x100}, r3, 0xa, r0, 0x3) 15:13:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:02 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000100)={0xfffffffffffffff8, 0xff, 0x2, 0x2}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000180)={0x7, 0x3, 0x3ff, 0x1}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 15:13:02 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r1, 0x1}, &(0x7f00000002c0)=0x8) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) getpeername$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000400)={'vcan0\x00', r4}) [ 778.544086] vhci_hcd: default hub control req: 0700 v0000 i0003 l0 [ 778.563556] vhci_hcd: default hub control req: 0700 v0000 i0003 l0 15:13:02 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xe0ff, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:02 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000080)="027e4980992f55762fcd63bc4e5e8e95", 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) waitid(0x2, r0, &(0x7f00000000c0), 0x80000000, &(0x7f0000000280)) 15:13:02 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @reserved}, 0x10) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa0, 0x0, 0xfffffffffffffffa, 0x0, 0x9}) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x12, r0, 0x80000000) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x7f, {0x5, 0x5, 0x813, 0x6, 0x101, 0x80000001}, 0x1, 0x1}, 0xe) 15:13:02 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40086602, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:02 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000280)=0x30) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'b\x00', {0x2, 0x4, @remote}}) pipe2(&(0x7f00000000c0), 0x0) 15:13:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x8a030000]}}, 0x1c) 15:13:02 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x80000000004, 0x121000) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x4) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x40000, 0x0) [ 779.018868] audit: type=1400 audit(1537542782.940:187): avc: denied { map } for pid=10418 comm="syz-executor5" path="/dev/bus/usb/005/001" dev="devtmpfs" ino=15293 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file permissive=1 15:13:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) kcmp(r1, r1, 0x7, r2, r0) [ 779.079734] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:03 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x24000, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000080)={0x39a, 0x1b, 0x2}, 0x7) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) 15:13:03 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) getpid() syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:03 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x121080, 0x7b46a3252bd9efc3) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) write$P9_RRENAME(r0, &(0x7f0000000040)={0x7, 0x15, 0x2}, 0x7) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x81, 0x1c9) 15:13:03 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:13:03 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) syz_extract_tcp_res(&(0x7f0000000080), 0x7, 0x7ff) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000000c0)) 15:13:03 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) inotify_init1(0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x9, @remote, 0x81a}}, 0x4, 0xf4, 0x5, 0x1, 0x20}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r1, 0x3ff, 0x10}, 0xc) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000080)={0xa0}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000200), 0x4) 15:13:03 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1068, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:03 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105502, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:03 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0xffffffffffffffff) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f0000000280)) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100), 0x4) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000080)=0x14) 15:13:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xa0]}}, 0x1c) 15:13:03 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x3, 0x741, 0x9, 0x24000000000, 0x200000000}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r1, 0x80}, &(0x7f0000000240)=0x8) fsetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_default\x00', &(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x15, 0x2) 15:13:03 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x404000, 0x0) write$UHID_INPUT2(r1, &(0x7f00000002c0)={0xc, 0x8b, "31f1f488cc022bc365007b7afbae775db6b237b191e585c2da4bea56eba6a55f6995187160d9bd7550ea4bb2f1fc644de52c3bf057028805119140bca4dac3aefc3f3757f7acb8d57eb3ec9b581387ca96836c15faebc90dbf3a3e974e891367f1a47baf50d590395d57d0033d46ed9d71ada9e11dd307cdeecf28fd969dc1df2748567396d12421fbc12a"}, 0x91) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r2 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000080)={0x28, 0x0, 0x2711}, 0x10, 0x80800) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000000180)={r3, r4/1000+30000}, 0x10) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) sched_getattr(r0, &(0x7f0000000380), 0x30, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r2 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x7fff, 0x200000000ff) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000080)=[{r0, 0x200}, {r2, 0x120}, {r0, 0x8000}, {r2, 0x1130}, {r0, 0x4000}, {r2, 0x4}, {r2, 0x382}, {r2, 0x5000}], 0x8, &(0x7f0000000180)={r3, r4+30000000}, &(0x7f0000000280)={0x81c}, 0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 779.838357] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:03 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000300)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r1, 0x1}}, 0x18) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000340)={0x2be, 0x2, 0x8, 0x401, 0x400}) 15:13:03 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r3 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x4f, 0x400000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f0000000300)={r4, 0x4}) r5 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x0) ioctl$BLKTRACESTOP(r5, 0x1275, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000200)) r6 = fcntl$getown(r2, 0x9) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x1, r6}) pipe2(&(0x7f00000000c0), 0x0) 15:13:03 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f0000000340)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="05000000000000000a004e22ffffffffff020000000000000000000000000001010000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000001000000010000000a004e2007000000fe8000000000000000000000000000aa0900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x110) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1) 15:13:03 executing program 5: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) r0 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x2) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0xc100, 0x4) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x7, 0x4, 0x1, 0x5, 0x200, 0x80000000000003ff, 0x4, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x200000000000000, 0x3, 0x1000, 0x7a, 0x3}}, &(0x7f0000000040)=0x2a7) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x18000000, 0x6, 0x2, 0x0, 0xbd3f, 0x17f, 0x6, 0x4, r1}, &(0x7f0000000200)=0x20) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x9, 0x3, 0x2e8, 0x100, 0x0, 0x0, 0x100, 0x0, 0x250, 0x250, 0x250, 0x250, 0x250, 0x3, &(0x7f0000000280), {[{{@uncond, 0x0, 0x98, 0x100}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x20, 0x8, 0xfff, 'snmp\x00', 'syz0\x00', 0x1}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x20, 0x80}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x3}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x401, 0x3, [0x1c, 0x2d, 0xa, 0x11, 0x3a, 0x27, 0x4, 0x2c, 0x36, 0x5, 0x18, 0x19, 0x2a, 0x26, 0x40, 0x7], 0x2, 0xfb27, 0x80000000000}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) 15:13:04 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpgrp(0x0) move_pages(r0, 0x4, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil], &(0x7f0000000180)=[0x3, 0x8, 0xffffffff93a291c5, 0x8, 0x3], &(0x7f0000000280)=[0x0], 0x6) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x4) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x501000, 0x40) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000180)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), r3, 0x3}}, 0x18) io_setup(0x8, &(0x7f0000000500)=0x0) io_pgetevents(r4, 0x974, 0xa, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000680), &(0x7f0000000700)={&(0x7f00000006c0)={0x2}, 0x8}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:04 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x80, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={r1, 0x80000, r0}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x81}, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:04 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80086601, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:04 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000001c0)=0x5000000000000000, 0x4) ioctl(r0, 0x2, &(0x7f0000000140)="153f6207008dd25dcb766070eb19adcb7b761edc36f2a3c0cb9127005edf8af79b4bf7ae65e143cf2893ea6db5401cce44f0c016ef4ee91597b02180df605600000000000000") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xf401000000000000]}}, 0x1c) 15:13:04 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) r2 = accept4$bt_l2cap(r0, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000340)) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000400)={r3, @in6={{0xa, 0x4e23, 0x80000000, @local, 0x3348e12c}}, [0x7fff, 0x6, 0x3, 0x7, 0x100000000, 0x2, 0x8, 0x5, 0x2ad6, 0x100, 0x3, 0x3, 0x5, 0x1f, 0x2]}, &(0x7f0000000300)=0x100) pipe2(&(0x7f00000000c0), 0x0) [ 780.597563] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:04 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x6, 0x4) 15:13:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x9) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000180), &(0x7f0000000340)=0x4) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) r4 = shmget(0x1, 0x2000, 0x20, &(0x7f0000ffc000/0x2000)=nil) signalfd(r3, &(0x7f0000000380)={0x7}, 0x8) shmctl$IPC_INFO(r4, 0x3, &(0x7f0000000280)=""/142) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x8040ae9f, &(0x7f00000003c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:04 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) sendmsg$can_raw(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000100)={&(0x7f0000000040)=@can={{0x0, 0x29, 0x0, 0x4000400000000000}, 0x0, 0x3, 0x0, 0x0, "b9ea9de512d5b5fb"}, 0x10}}, 0x4) 15:13:04 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x5, &(0x7f0000000040)=[{0x1, 0x3, 0x7f, 0x6}, {0x10001, 0xa4, 0x8, 0xaf}, {0x7fe00000, 0x5, 0x9, 0x4}, {0x10001, 0x40, 0x0, 0x80}, {0x1, 0x6, 0xfa3, 0x5}]}) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) sched_getparam(r1, &(0x7f0000000300)) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='attr2,\b']) getpeername$unix(r0, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)) 15:13:04 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8010550e, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:04 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80, 0x170) ioctl$SG_IO(r1, 0x2285, &(0x7f00000015c0)={0x0, 0xffffffffffffffff, 0x52, 0x0, @scatter={0x4, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/213, 0xd5}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000001480)=""/121, 0x79}]}, &(0x7f0000001500)="e3883d359ef029cf5ca299aaa89d23baf43c090038ec93ddfcbca07289656bd93d7681e19447e49c60276c4bf8f5556d52fad8dcc1ae863c202f06323016f04055916ea0eb1e30f98e5f94b2556618869e3a", &(0x7f0000000180)=""/60, 0x81, 0x10000, 0x3, &(0x7f0000001580)}) tgkill(r0, r0, 0x34) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 780.908152] XFS (loop5): unknown mount option []. 15:13:04 executing program 5: pipe(&(0x7f0000000040)) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:04 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) exit(0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0x9e, "ecf3cbfb5fec210ce083a54bc25762e2e15c4637e4155435897255a97b2244ee23e7d78705bd66929eb08970846d199beaf1993df8862f1e8cee9291dd9612f6c779b32e871017010cee16af1531c54025285e24046f2bdff6c0d4cd90eded6fe7dae58aa66df84c0480bf78b0329ee19926769df186b4de305b2ff7942cb5a2054a10072164e70c9fcf890b225170c31914cb3757febcb5f4715a68aa68"}, &(0x7f00000000c0)=0xa6) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)={0x0, 0xc882}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x0, 0xfffdfffffffffffe, 0x5}, &(0x7f0000000380)=0x2d1) 15:13:05 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x5) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) socket$unix(0x1, 0x3, 0x0) 15:13:05 executing program 4: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000340)={0x0, @empty, 0x4e21, 0x2, 'lblc\x00', 0x1, 0x180e, 0x63}, 0x2c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x210280, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x4d9, @loopback, 0x64}, @in6={0xa, 0x4e21, 0x7c, @dev={0xfe, 0x80, [], 0x17}, 0xd560}, @in={0x2, 0x4e24, @rand_addr=0x4}], 0x48) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x403d, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:05 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) [ 781.384546] vhci_hcd: invalid port number 0 [ 781.394151] vhci_hcd: invalid port number 0 15:13:05 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x20}}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000400)={0xfff, {{0xa, 0x4e23, 0xfffffffffffffff9, @empty, 0x8}}}, 0x88) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x141081, 0x0) 15:13:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xa00000]}}, 0x1c) 15:13:05 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004551a, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:05 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x1ff}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x6c, "754eeabdb6376cca1dcb6e5b596ebad58b967055527e8bd351b803fef3c52a40374b50d6984c7130f2fb927eb602936b47f149be5871d5d3734a5b20e0e723ecc809f3ff0072c825517160a1cece16d391d43fc78d9f5e2441d0a829bc3aeb545ced9c2e5825aa6d90636773"}, &(0x7f0000000100)=0x74) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0x4}, &(0x7f0000000180)=0x8) [ 781.517998] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:05 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x80000000000, 0x680) open_by_handle_at(r0, &(0x7f00000000c0)={0x50, 0x1000, "56ced99382807a1abbe0001c53df65972f6519ce5d4df9930a8e45d81bd9dcb43f6be946846fdae491b0247dae8838d6ef948bc502006f987866269d4a0e340ebd4421bb77a1d452"}, 0xa0000) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xffbf, 0x400000) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000001c0)="6b965441cd915bb14be07f85e0b946f2b7e147a39e3f7179e1329dd941ee06bb142024f0ece3d841b56ef28904e0d37d3e39f887464ab45371d9deaca731b57761625bf0571de649b707bbf39949099e131027f5847e72cd1bd71a19890ca32dd5d454eeb8ccda5eb5b97522f95f3d3f349ef43c2c6e7045598f4b569245d62e4f99a55ba150fb92aaeccf5db9572c1f209c1ca41acae76effe61d10827c2e91ad83e00e508c2fb756e52a69de72bde5674625cf23a1be45fff6c65e338c01ea55d91bd3ee976733b6f43ab4a2da6c6a773d8272532e6a2753030f95", 0xdc, 0xfffffffffffffffe) 15:13:05 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0x1e}, 0x6}, {0xa, 0x4e21, 0xc6, @empty, 0x10000}, 0x0, [0x2, 0x5, 0x3, 0x0, 0x5, 0xfffffffffffffff9, 0x5, 0xe597]}, 0x5c) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 15:13:05 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x8000, 0x1001, 0xffffffffe, 0xffffffffffffffff}) flistxattr(r0, &(0x7f0000000000)=""/58, 0x3a) 15:13:05 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() syncfs(r0) sched_setscheduler(r1, 0x8004, &(0x7f0000000200)=0x2) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r2 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0xffffffff, 0x10000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) recvfrom(r2, &(0x7f0000000080)=""/6, 0x6, 0x2000, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x400, @remote}}, 0x80) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)=0x7, 0x4) 15:13:05 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) getsockname$unix(r0, &(0x7f0000000000), &(0x7f0000000100)=0x6e) 15:13:06 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$KVM_NMI(r0, 0xae9a) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xe000000]}}, 0x1c) [ 782.177294] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:06 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x10000, 0x8, 0x100000000, 0x2, 0xc3}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={r1, 0x80000001, 0x3, [0x1800000000, 0x95, 0xff]}, 0xe) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:13:06 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), &(0x7f0000000140)=0x40) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:06 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:06 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0189436, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:06 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x11) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getresuid(&(0x7f0000000180), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) r5 = geteuid() fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) r8 = getuid() r9 = getuid() fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() r13 = getegid() r14 = getegid() r15 = getgid() stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000007c0)=0x0, &(0x7f0000000800), &(0x7f0000000840)) r19 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="02000500", @ANYRES32=r5, @ANYBLOB="02007c0e", @ANYRES32=r6, @ANYBLOB="02000500", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000300", @ANYRES32=r9, @ANYBLOB="040007000000000008000100", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="08000600", @ANYRES32=r12, @ANYBLOB="08000500", @ANYRES32=r13, @ANYBLOB="08000400", @ANYRES32=r14, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r15, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r16, @ANYBLOB="08000400", @ANYRES32=r17, @ANYBLOB="08000200", @ANYRES32=r18, @ANYBLOB="08000200", @ANYRES32=r19, @ANYBLOB="10000400000000002000070000000000"], 0xac, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x100, 0xff1f) sendto$inet6(r0, &(0x7f0000000180)="0404000000c000ddb8460900fff55b4202938207d9fb3780398d5375000000007929301ee616d5c01843f56590080053c0e385472da7222a2bb42f2dbd94c3b50035060f118d0000f55d462600001b0000000000000000000000aeb462644a4bae135664", 0x64, 0x0, &(0x7f0000000000)={0xa, 0x200800800, 0x20000000005, @ipv4={[], [], @multicast2}}, 0x1c) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000000)=0x7) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$KDSETMODE(r1, 0x4b3a, 0xff) 15:13:06 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0xfc6cc684ab92168d, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x3f}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000300)={0x101, 0x1532, 0x8, 0x40000000000009, 0x3, 0x7, 0x2a6b4d0, 0x403, r2}, &(0x7f00000002c0)=0x20) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:06 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) fcntl$setstatus(r0, 0x4, 0x2000) socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:06 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x10000200, 0x6, 0x2, 0xfffffffffffffff8, 0xf1}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={r1, 0xffffffffffffffe1}, 0x8) setitimer(0x1, &(0x7f0000000140)={{0x0, 0x7530}, {0x77359400}}, &(0x7f0000000180)) 15:13:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x7) r2 = semget$private(0x0, 0x0, 0x56) semop(r2, &(0x7f0000000080)=[{0x3, 0xffff, 0x1000}, {0x3, 0xa1}, {0x7, 0x483, 0x1800}, {0x1, 0x2}, {0x3, 0x54, 0x1000}, {0x3, 0xfffffffffffffff7}, {0x1, 0x0, 0x1800}, {0x0, 0x3, 0x800}, {0x3, 0xe011, 0x1000}], 0x9) fanotify_init(0x0, 0x1000) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:06 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000600)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x2f09, 0x2, &(0x7f0000000180)=[{&(0x7f0000000280)="3ef4bf91134b8d940c77e370decf6e07b75e2e9993ce0ab6526d8270d1342a2557d9e1e9995e99555acdc52392b201a7c0f2a9f63767fafead4b2bfd5b209a0ce8dd733f3c44f9e0bb78ea1c11f85326f55545ffa8fc6fe5eed6fdd15a13d01b52d97e19f58619202e7066bd97ec3c20111bafa94a7682128bf4d918ecdff274ae997c9caf27cea1ad97a8479a2f4cee2fc38c34c7b1e1cf", 0x98, 0x81}, {&(0x7f0000000340)="f9f9e031863db8ad76d42d3ff0cc752ca9d2dc941ea3d2fc7172cfff91c09744512012b5862a1c0cfacd7c69eee0459efd5d0c9a30d67b49dca8d7ddde6327209112723faa64581f64099903", 0x4c, 0xffffffffffff710d}], 0x0, &(0x7f0000000480)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@resgid={'resgid', 0x3d, r1}}, {@adaptive_mode='mode=adaptive'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@nobarrier='nobarrier'}, {@alloc_mode_def='alloc_mode=default'}, {@whint_mode_fs='whint_mode=fs-based'}, {@user_xattr='user_xattr'}, {@two_active_logs='active_logs=2'}]}) waitid(0x4000000, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f0000000640)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x248201, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000200)={{0xa, 0x4e21, 0x8, @mcast2, 0xbca}, {0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xa}}, 0x2}, 0x10001, [0x7fff, 0x7, 0xff, 0x3ff, 0xf6e, 0x5, 0x60000000, 0xffff]}, 0x5c) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f0000000580)={0xc, 0x7, {0x57, 0x5e1, 0x1, {0x9, 0x200}, {0x3, 0x1}, @ramp={0xffff, 0x2, {0x7, 0x5, 0x0, 0x6}}}, {0x54, 0x6, 0x100, {0x1ff, 0x40}, {0xfff, 0x8}, @period={0x5b, 0x1000, 0x6, 0x54a, 0x1, {0x8, 0x81, 0x90c3, 0x20}, 0x9, &(0x7f0000000540)=[0x8000, 0xffffffffffffff7f, 0x3, 0x7, 0x1000, 0x5, 0xf51, 0x3ff, 0x100000001]}}}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x18) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xa3f0, 0x80000) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000240)={{0x4, 0x7}, 0x4}, 0x10) getsockopt$inet6_int(r1, 0x29, 0x7e, &(0x7f0000000040), &(0x7f0000000200)=0x4) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000280)=0xfffffffffffffcc5) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00\x00 \x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x80000) 15:13:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xf401]}}, 0x1c) 15:13:07 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:07 executing program 5: r0 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0x74, "ea5b61e6c3ef593ed0ae0d2723a61ebc6fd425d493f88166aac95e5c4d2ccf8bf001991757774a467c411ff02f4934d354ac65b3ca88e8ad5bee2387a1349d9fbefa20c571d32f2d83774fbeddb8771982c81e3ddfb3cad6ed11337db28815ba91b31897d831338c923ddb323117abd29c61f835"}, &(0x7f00000002c0)=0x7c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={r1, 0x1}, &(0x7f0000000340)=0x8) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x4, 0x10001, 0x7f, 0x9, 0x0, 0x6, 0x2c42, 0xd, 0x7, 0x4a, 0x7, 0x7, 0x8001, 0x4, 0xb7, 0x20, 0x88a, 0x10000, 0x15, 0xffffffff, 0x10001, 0x3, 0x0, 0x4, 0x9, 0x764, 0xfffffffffffffff8, 0x4, 0x2, 0x3f06e68b, 0x0, 0x5, 0x0, 0x7ff, 0x5, 0x80e, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000140), 0xf}, 0x10a, 0x100000001, 0x3, 0x7, 0x20, 0x0, 0x3}, r4, 0xb, r2, 0x1) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000100)={r3, 0x8}) write$P9_RFSYNC(r2, &(0x7f0000000000)={0x7, 0x33, 0x1}, 0x7) 15:13:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x3, r1}) 15:13:07 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f00000000c0)={0x7, 0x9, 0x8}) ioctl(r0, 0x3, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='veth1\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:07 executing program 5: r0 = fanotify_init(0x67, 0x101806) finit_module(r0, &(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x3) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x900) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x9cc8863737672848, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xf, 0x3, 0x22, 0x7, 0x21, r2, 0x9}, 0x2c) [ 783.125466] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:07 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000080)=0xfff) 15:13:07 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa2, 0xfffffffffffffffc, 0x0, 0x200000}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x3, 0x1, 0x1, 0x100}, 0x8) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) 15:13:07 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550c, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:07 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000100)={0x0, @rand_addr, @rand_addr}, &(0x7f0000000140)=0xc) accept$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) accept$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000280)={0x0, @local, @multicast2}, &(0x7f00000002c0)=0xc) getsockname$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000440)={0x0, @multicast1, @multicast1}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000780)=0xe8) accept4$packet(r0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000800)=0x14, 0x80000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000940)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000a40)={@broadcast, @empty, 0x0}, &(0x7f0000000a80)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000b80)={'bond_slave_1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000bc0)={'veth0\x00', 0x0}) accept$packet(r0, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c40)=0x14) recvmmsg(r0, &(0x7f0000006b00)=[{{&(0x7f0000000c80)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000d00)=""/69, 0x45}, {&(0x7f0000000d80)=""/103, 0x67}], 0x2, &(0x7f0000000e40)=""/116, 0x74, 0xffffffffffffffff}, 0xee70}, {{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f40)=""/50, 0x32}, {&(0x7f0000000f80)=""/180, 0xb4}], 0x2, 0x0, 0x0, 0xb60}, 0x3}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000001080)=""/68, 0x44}, {&(0x7f0000001100)=""/209, 0xd1}, {&(0x7f0000001200)=""/87, 0x57}], 0x3, &(0x7f00000012c0)=""/193, 0xc1, 0x10000}}, {{&(0x7f00000013c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001640)=[{&(0x7f0000001440)}, {&(0x7f0000001480)=""/247, 0xf7}, {&(0x7f0000001580)=""/185, 0xb9}], 0x3, 0x0, 0x0, 0x6}, 0x4}, {{0x0, 0x0, &(0x7f0000006a00)=[{&(0x7f0000001680)=""/250, 0xfa}, {&(0x7f0000001780)=""/133, 0x85}, {&(0x7f0000001840)=""/102, 0x66}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000038c0)=""/71, 0x47}, {&(0x7f0000003940)=""/4096, 0x1000}, {&(0x7f0000004940)=""/4096, 0x1000}, {&(0x7f0000005940)=""/182, 0xb6}, {&(0x7f0000005a00)=""/4096, 0x1000}], 0xa, &(0x7f0000006ac0)=""/32, 0x20}, 0x9}], 0x5, 0x40000021, &(0x7f0000006c40)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000006e80)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000006f80)=0xe8) getpeername$packet(r0, &(0x7f0000008980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000089c0)=0x14) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000008fc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000008f80)={&(0x7f0000008a00)={0x554, r1, 0x4, 0x70bd29, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x168, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x24c, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x529f3674}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffeffff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r13}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0xe8, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2b}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}]}}]}, 0x554}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:07 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x151, 0x8000) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x40, 0x0) r3 = geteuid() ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f00000000c0)={0x5, 0xf8000000, r1, 0x6, r3, 0x7}) waitid(0x3, r0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000280)=ANY=[@ANYBLOB="91020000000000000a00000000000000ffffffff000000000000400000000000114f000000000000070759ff0000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ff07000000000000020000000000000008008e0200000000000000000000000000000000000000000000000000000000000000000000000005000000000000000700000000000000000000800000000010070100000000000000000000000000000000000000000000000000000000000000000000000000b4be0000000000009a00000000000000000400000000000009ff01c30000000000000000000000000000000000000000000000000000000000000000000000000100000000000000010000000000000008000000000000000001003f000000000000000000000000000000000000000000000000000000000000000000000000030000000000000002000000000000000400000000000000083f0300000000000000000000000000000000000000000000000000000000000000000000000000050000000000000009000000000000000000000000000000fe5d01030000000000000000000000000000000000000000000000000000000000000000000000001a00000000000000040000000000000000800000000000000009089d000000000000000000000000000000000000000000000000000000000000000000000000060000000000000033a90000000000006f00000000000000209c080000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000200000000000000ceb900000000000020a30007000000000000000000000000000000000000000000000000000000000000000000000000"]) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) syz_mount_image$f2fs(&(0x7f0000000540)='f2fs\x00', &(0x7f0000000580)='./file0\x00', 0x3, 0x6, &(0x7f0000000940)=[{&(0x7f00000005c0)="b9596a42e89121ebf77002e2c5459ca005e39aa6083a304462fe9ac7347199accad28f17a89c00177b3655952d4bc8f48ef98b24096b0aeee478a2ae7c7edb18f6e5e9732ad97426d7bfdb549d9713d1f636eb6a9bf44b783e6e148d9eb04dbb0b234a3b1cf544fb8ac7e4fe63159a8b637949a3722aabe54491e95d1fe1d736a6827c8479b80dcd290afd6dfcd8b3dee2b5fc7f647a6cde21af873611f77e4353fc14236e67bb3f012e63489bacf5504d673c", 0xb3, 0x80000000}, {&(0x7f0000000680)="938bd890ce7b3ebb3eb88391d7c06d99fb267b88d570cb8e78816b4b869f455770a83a8ac03cc7f9683cffe3b7c24720b0313d656519bf106e07af6b76d073a14aca9aba6b6761e0021f87deb3a9789906d826d09bc62c4ea45f133767755329323910af57cad0485c229b14ad4d2a2b4b805fadd2a97c4f822876e0bc5876efd06be612528693bf2d61a13932c4457fa1c025ef2e6e1e87875b90921b94e5e6c0073579441c3f293eced0b339731d8f689db49911db98df080caf76cd0d7d14d8111090ff35606c4693d8d7b076efa76e1b0a99672a576bef7cb44ff987fb747b6f318c62dfd955fa4d19418aa4", 0xee, 0x5}, {&(0x7f0000000780)="a377921f24fb2defe6b9a93231a56e9ea36a40f59798ed238f018c0e64bde795447c586adf517a988e0fe18b234837da7ababa8a4a77edca3425ce7457517e28e34098bafaed3e14184592706e8543506dee7e425b2c47fefd86cf114ea0cbe392e1ef6cce707c1e11386ed57df686f3017a8559de91e3e8ba7d5300b8f74f156bbc9a85feb68d1a026df62a13ffc88545d674bc67cc025477ae8cf68f3dc5dc5b94c5b5ade1712625b68c60b973df4999b00719a94687031d77aa2b5da83b5ddfc248646f1232b1d43a5100024a7e6ba0f2417c09242aac22a2aa60a1059e8a8b596ad850", 0xe5, 0x100000001}, {&(0x7f0000000880)="017f509d824464a28c0ed5db990b8e4127c24e4a744946c557af9f32c3ac3b1272b330df9387632085f5d4e41cbfcdbc09e8e846", 0x34, 0x8}, {&(0x7f00000008c0)="ed216ee69b636912c9f61178", 0xc, 0x7ff}, {&(0x7f0000000900)="2bed", 0x2, 0x2}], 0x4, &(0x7f0000000a00)={[{@usrjquota={'usrjquota'}}, {@norecovery='norecovery'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@noheap='noheap'}, {@data_flush='data_flush'}, {@noinline_dentry='noinline_dentry'}, {@adaptive_mode='mode=adaptive'}, {@flush_merge='flush_merge'}, {@inline_dentry='inline_dentry'}, {@lazytime='lazytime'}]}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:07 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:13:07 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0xa0}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x2aa, 0x1, 0x8, 0x2b, 0x224, 0x6, 0x1ff, 0x0, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={r1, @in={{0x2, 0x4e22, @broadcast}}, [0x0, 0x6, 0x2, 0x800, 0xffff, 0x5, 0x101, 0xffffffffffffffff, 0x3, 0x1, 0xfd, 0xf35, 0xbaf, 0x0, 0x8]}, &(0x7f0000000200)=0x100) 15:13:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x500, 0x0) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f00000000c0)=0x2, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xf0ffffff00000000]}}, 0x1c) 15:13:07 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040)={0x1f}, 0x2) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000080)={0xa0}) [ 783.835325] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:07 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") dup(r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffd, 0x1c8, &(0x7f0000000380), 0x100000, &(0x7f0000000180)=ANY=[@ANYBLOB="ef69d79443cba4319e36523672c994ff7ea9dd3e143be4cdd45c3271e3ef9a39ef85b147b718b0b510fb7a2c5087770ab2f9ffcf1757252f6fdeff9c4adb1e799d5cc2f16f5940f5937b6dd295ab4ea79f14c6ac89e744e5bfd79e4927113be3f35e4ec0f7a91976689f1cb9a772f5b63104ecd35a057401ed30bd469b16da4aed942b6acf2f69f466ba55bea455e04b3d642ac720965abc01e7d80761201db81822475b2080d7749d06e5ebfbc00f93cdf6d8edc32748a810fc55b6c6b78ba45775786b65ab53de6498334ba6ab0063b914c33efd64f029a1eb08537669949db8921ba26db694"]) 15:13:07 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xc000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x81, 0x1, 0xffffffff, 0x6f8f, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0x3bb}, &(0x7f0000000180)=0x8) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:07 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x5004, &(0x7f0000000080), 0x4, r1, 0x4}) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=0x0, &(0x7f0000000280)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e24, 0x0, @ipv4={[], [], @local}, 0x6}}, 0x82, 0x2}, 0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:07 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000080), 0x10) 15:13:08 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) ioctl$TIOCSBRK(r1, 0x5427) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:08 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551c, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x600000000000000]}}, 0x1c) 15:13:08 executing program 4: r0 = socket$inet6(0xa, 0x1000000000004, 0x98) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl(r0, 0x7fffffff, &(0x7f0000000480)="466afe5e1dda7442a2e38c624323bca02b078274353cb91fb11d72ad9708161c0206ddbe0cc0c2df2c451674e28e9e99071773029513bb86dcf3c84ca53e5a1d92c9750690cf5e363b30a1e7eff51e9b3660c482e29c00e9eda95363a856c359c61523eab3eb7c07de4c12e61cd352af46a480a5bf18a1291015e612fb58310e28fb8136ab9417f8c4918e1b0421ea9a27e6caf1b67e8b4b1d57572cc6b2d5ff471a64c63445a75af7e087d5ef5e62bde871d261376fcf2b6afbc7d2157dad36c9514c70a3ee1f919cd15ec9f981e2d708bce09d9d1a904342373066407139c6579dbf057188990ea0e34feb38755cbdbd9b23d482975b1fd4d53be5e925c28535fdb29b3bd47325093c380b0096e3ce83e6421027efe026616f622e5cf878950de487e42db44657c0ef67cd694489e7fabd1708c678c12e3c3c6b4410024c8589c7a06de9857c931b20be6d7e4374ac5404930a050f783c75506c85b5c452500d1a505fbbd221b130a4c20419b9523e85179d9af465e47bd7f6a338158bb2514b907f9e1e5c75631a806e27078fd39fe1bea7cfde4aa8dda44e78d200c4f889e34ef705d4a9ddd90b140071a32e52f1b9ef8c5a7d6649942d52e6fcd7dd8f20038488adac2504fb953a2a31c67c3702f46da72dbbe1524959bc67b986fa69bbde6adcfe55b53cd79f62b707dadd781eb1525ecf993e7f71fb630a98934871b2738452ae78da0dd48a3a808ec34dbdf6d0dba9b2fff5e8366306a02835a181ec22fa50d6aee081fbc9ce25f76807cf4e4cdaf32ddcd67d1c0bcf9356f24d726022eab4cb127946caa03a5c43cbf9f67f7a9072f4083e4694f7ccc2488f7127bb165363b0e579511a2001b3afa872647d57908e859b74f1d2cfa252590c2fd5554462d5aa5bb64510c0ed6b85c7b425b969bf9314b2dae35156e3cd146561ac666856c5389f3d81e40e463568c81e602feaa7d0daa1d593ca835e78a8c866871807dcd93f45f96e28e0403802cf298cd5c4832947c64d4e14107c4c2689f88a60fe75a452c1d2d917dae7d76cda719590a1a85c937ce100592ff78f7dbaafddbf3816199314409876518339faf6f6055a2346e58a1e480577cf520c960b708486481d4b4da01f868408c2d099aa17798aa80397edf13e24c332f9346568a1cd27ec0ce064b575e41eff5bbacbcc4e0a30fb46bf36636e991ba0db1f45688e7e2b7d2c2cadc87b644fd030d8c3de733faba259638b9fc5a0b389832f10a821077262df74bc3ae1ccb1c23670bc9e9617cf125b6b9b221ce4814d2c327b881339ae800a2d7c992f6dfe7115504b57da0e006afc60cb471879f7347acbeb2d1a6f6d493a078cacc387c36f456391611aa40d30a577cda52974451f83784e8e817ad866432247a43bb169947fa354b55c976b1ea545839d69b07e6553bad830d3fa78df99ae303c59bb0c6e2f6832ac0ca196afc57096fa5dd4c6c8387f11d7861609deacf392b022439bb2fa83d312427378f4ef4a072ef268e0416f7c569414d357f58501eda22e16c325ea010f42e1bf7f794adb79a334e7e0810af34e143e017db44df5371070422355206ae39326844e0726de2ba2b1b2c75671590d64605f62a5f22f126c21c06a81af7a98177770544d550c5092b7fed880558d620910f63abac6267e1569e785bcaa6ffe757f92b43ef2fe35bbe0c365ca345ee0bc7f952453ceac454599339af8e82a745d9198c6fed8bfa2019e965666c19f6fc1376fe970064fd284ea3a35338a093f02b33ae497f958d522878c084d619309b561c200c2e3dde5c01e4ebfc49bbb83f69003e420b0744f06d0243e6be6d830993425a9738804b6906886b506013a4e3a645bda8d08f4badffe375417ff200dcb9da371ed98420bda070a43c818db57c729a4750051187ecea38745bab567bbbf20a1f79693deefb93cab3863bb05e944199825c49ad8137f16e8127561b6755417adcc6c53737f4a2935ba8a260a0425deeb07663cdf215090e4f363b614e339e59f5c602dbac2c676d5fe333b215ab11341f28079fd89ecae848760dcefd88cf3ab10e16ba0c7b01f309496a3f73d53fc2b377db75a4c0ae64cbc1d28f8d3956404faa67394fa84ce4f598dd77d3d05d8078244dba272ef696c8861650692533c62bbeec576f2048f85fe1e9dadebe4c3622dfc23ae25fd3915833a9086e89e65fe4d1e273c21138d949484ce783a4b3e41554feb56aae004aea5397f4fc8d0b53cc21eaf5098f59168cbd3bb53d6696309c117331cdf758b866f9783f00c2ac1a2840eae8255d889aff67523e814c860b750bc072ad84d8e027471e3ccdc705a2377d1b72c8836c3b19a0cf934c9b8c78fa2bcb65aa171b30a772a067c9f18f835e18c6729824f67530add64c557c4f96518a73ca65ef7ad56570926893598b291f54075b10dfa2ed2daa8cabf83ff1142b237c096437863e78605efb05c9db25fd02aadc9c66dcb50ce6c97c0104b06b85150b3c426b282a6d0af1b3a864efc12c2486b59b8dbd6ee2832d1637b11e6f1a1aeedfb31d3c8f550327c7d6a6b7ae8b6fca968f3be30d30e6b6404e37a362cfc25deca3ebfa9e4fa56243e3972bb27b15b9ebedb941a3ae13043bf527c0a9ad4bb7785721f8299b62d67c509382c64cba4f418dcfec34a4a0a5306e79d2ea6c33483fe8825fdc81bdd4e548148ed0a2ad8c1bdba41d3440876ab320740cb35b07fc5720c876d17c9992d0600675b387d3bfec235a97bf7d38f065e43c9bc6d3632a5e6f825d7ac0ebf4520847765f0fcac862b609aa3e6ba130e10cd4f30d8559018893124e240483c5f40139aaddeae05ab3fe16dae1d72ac10f3d63a89bac50d09ce1a5652bfb385807afaf6ea62197e0b768a9d8881d90bd075eb9a8fee933c45f54566605e4f0421aaf06fbcf6d20c4fb5ac51035c8bf32ab9d16796b2666e56f673da0bedf13764379a477e31d36fbad84e0c0e0272d2d4614312793d6c8cfe11ad4400a39c4737d5128edec68899326a8902a580b753db53a9cd9a5a60ef531a1516144684da903ca54d9b7bc5ea71a41116b9914dea55889fc0894359162e6c9dbfef797e87c67402bd7d8e5360cf5d679def39eb85ed037063701d4fb157de38c02feb8f56801289056b417ce5b5fabf82d5cd2231a759e9e52eb5ad04d65e79ef9c18579ee0eb802872a7a90dbda0bff4d57d4d427128f9da2a4f9a64604db1957825477928b00bcf706a472d378c1d82aa5c9d184bd83ff35b020a5524696e38f4e08a0094060d9e2b852e09ed53ef74393b061ac4a4a901b16f2d92a3922d0f3889627aa4865783c666dc13381d633f2ada5988f87482a000cf828733e18bd1b3dfb28d0c5baf40243c85d7e6b6ed843329d56eabb2e7f87f7f747694633d51f7f6b333d145be24b651560a5747d946e923b2e9df74b6db7a97a1a3b5af63bbfab4e871288ffa5ae73b9ff8d40a00b8f9d1aac14618f00d575149cbe5427dea36a567524af73c9cc73cc244c933dcfc0a7af5e25d68afb7ab2e75ffe33e20bc4af0aa708629a2d6f0598e6fc1909f4d33a58f03d0e82c4c5d22276e7fc9272d0c9f177a4871905513a88a982796f62d8d4bb54ed76c79c83da69cec142fb1f42eb81be339d050a4e458af90808504121eaef3981062553e76801546921e77d2b58177655bd73f56df6075d8d28400dc2daa36736d7ac0e03e8b74e6e25274b5ffdd5fda03f26a6d03194e8efebe7e13538dea8203f8f53f2eb778cbcc2c1c4ee2822ef7189b22a4ee528bc32b40b440ad82e9ddeda2ac54d61cbfad00cb21e533da5a162079bc350d4d075c7c04bc72be6c86bcd26ca1749754c89d0a814e015b9518e19658a6ced4e0eb7c356e44226beef942a6f4c4d7f6282b155fdf49f1438f54861e02b64b337119e6a4f454d94e98da00f826e92b1a4a6fbddb5f4f8fc6b12c5577d3a5a9dab182f7cce7671766f724057eb8d501726359e1775f5626181ca236606071e509b98b52e7d3b186c251eac33c22b57f5a925c85effa74a02b764dd483918ac7e6208dd2e652134d4f02c3e98e55b269a67ac4d626831a790275235f23794a314a85b9ab7200d41e129df6aab242e6c66f0e6e73f86cf673f3dd8d7e88119720c45dc0661ebca05689e99df29cc29dd3131ce42e565950edca10fd8e63442673bbb230f7ca640b4bbf8c63528ba319bc0590d53a3d08d66f5170fa931782acc5b01d2bae53f706822a3104c3947e51264d48567fdf72bf3b181e22cb8864187a284d32835d38253314f57833fad5de30e2d515ce9608af4f8e3609038ff381d167b94343c7dc1849617173736d67e1fcfb247c673949d19ebccd4a6ffcba559d3d35a82315535b61a00eff009f10171d137fb96f900890fc776dc171eddef9a6d8e8011e158f47a846ba791dbcb0dee8ea0e8e0d9c0e7f1fec677d0c5b1faac6113013ec6c1cb0a8c4b8c3fbcb9d4187d7e772cdda23f403d72d802f7a03e6ca1f1f9eeff8fc7f1422e7769ee1dd500ea1daa45384968e55d8014ff8cadb197d3389f5b6b356367d9700836a09242465ff2f98124a3e1a0b291f676645f5101dd6531ed3f8bc1b29fd3cf2fe8b0dc2db7d28e8f8da7045e80558281c5fb6224078d90c81c094b36dbe02fc0f6e35b9ee97e7fa334f7f1d580e6f0c99adb70aec7eea3191d3537b6ebb15f2dc6f316719252f574dc516dd74df79520acc1436b5dce6a0b1d67d6c3c8cb610f064c0914cc5694b07025f459ef0f5951e02555b4b8e2d665e63e4e1de95526dba97d60a13f048a5dc7e651f0e5a7210f0f16159b8996d055bf40425e616116cfbc530201d296b128a4bc343c9c567ef235b3d824b40633959a18caab755c2f1bd523082415c7ba48ee96d9caa8b6fbbfa2f6ba5372e2fad8ba597e3de579ceade4d7c45bff7f85f1b3acdcf38f2bb5fa7e453556feab8da0b121e5d2ca820ca19a92bbc802b44c7163fef2f0e068abb7b10232d87383e8e07b57bc6cfd2a24ac5defd8a365c5d0762da10817d7ebb91605395a874a1c7dec5975bcbdde572c1973dc673107c53256f9aa9c3cddeb6a80a5f1bf6183651deaa45cb9808a5e33de6881d3b84fe3266802395b9855bae8198547d3bba99f8eda83f28925994692990f3e1853e20a3fcfc66133370159e55fdad18a872cd338c6db896ae807fcde67e58d35e54dd15d53ea5c5a3e2b3618168b61bcd5d52d28e28dda725e3d7c4678f33735b96cafad3c962318922241633de9c4bd65b295e99ba1e3116e265048d77aa0e549045bd3c4a9925b7d046d5a845fdf84357f00be4cc38eb7694f1b5b62b4525da2d565d86b52f0722345a2850451c90f6db9fca34bf12be0351f57c299c596031cf61dc91139d44d09ed0219b14a0f77abdbf5214bab9108e197e02269a8478faa7a43ada2803b166f5fc4cd8078d4de349649b261d2bb5d2c009d0b5341721f674401f4ab81b8ab49d61ceff9d9dab5db35d0ab42615d603778857beefcd0e6bd2a1942b3d285d81a1c8a002d647fecd03285135cf50e281ef85087ac42e1531cea124815283960b8df9d2d8b3928f883b3a7ec6abbb12022f98c351e528486793c79dd99187234616d96ce26ae48fbee9c3305936ae430f1e7492d1cbb5a75ec7a3cf3b181f3d3f705575f57ed903c6edfd4a18304fbe0bcde2b2d06e761d156cc2039530907bb43bfbe1d91268c7701b9190b72742d9bf77f74be6a2759fd1525744581e2daf698fc1b1775908fe975ffe0f67") ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:08 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'team_slave_1\x00', @dev={[], 0x13}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) 15:13:08 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x48, 0x548d, "355d5aae2240dca51a7a89a26e746e1ef73d15e835989200b05aa7dd198ef05c6a79973422ab53eb6870105a584e250c49909875b0c8d9d54eeae01500e506ff"}, &(0x7f0000000040), 0x400) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:08 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000580)='/dev/usbmon#\x00', 0x2c, 0x100) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000680)={0x3, 'veth0_to_team\x00', 0x2}, 0x18) r1 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000600)={'broute\x00'}, &(0x7f0000000140)=0x78) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f00000000c0)={0x86}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000380)=0xe8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, "33aaa27c749559b2306ee67534f94c8155560fabc0f847d7afaf2c72f3132666a24f892ed498c59cf8365287a1e43f27023ca11302075d0f94f77a68a582a692", "e69e32ff8ddc01e40cfa9212350a7ab943d818ae79c606702a06994dfd3aceee", [0xf9, 0x80000000]}) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r6, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r8 = accept$alg(r7, 0x0, 0x0) sendmmsg$alg(r8, &(0x7f0000001b80)=[{0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000001580)}], 0x500, 0x0) getpeername$unix(r0, &(0x7f0000000780)=@abs, &(0x7f0000000800)=0x6e) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480)={r2, r4, r5}, 0xc) r9 = getpid() sched_setscheduler(r9, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r10 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r10, 0x84, 0x7c, &(0x7f0000000500)={0x0, 0x80000000, 0x100000000}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r10, 0x84, 0x1, &(0x7f00000005c0)={r11, 0x40, 0xffc, 0xd, 0x400000000000, 0x1}, &(0x7f00000004c0)=0x2b4) setsockopt$inet_sctp6_SCTP_RTOINFO(r10, 0x84, 0x0, &(0x7f0000000000)={r12, 0x80000000, 0x3a0, 0x5}, 0x10) [ 784.689793] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:08 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) r1 = getpgid(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000100)={{0x9, 0x1, 0xf42, 0x3a2ba442, 'syz0\x00', 0x2}, 0x1, 0x10, 0x7, r1, 0x2, 0xe8, 'syz1\x00', &(0x7f0000000000)=[':[\x00', '/dev/bus/usb/00#/00#\x00'], 0x18, [], [0x1, 0x80000001, 0x9, 0x8]}) 15:13:08 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f00000000c0)={{0x1000, 0x3f}, 'port0\x00', 0x15, 0x800, 0x7, 0x0, 0x80000000, 0x2a3c3575, 0x20, 0x0, 0x1, 0x8000}) fcntl$setflags(r0, 0x2, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa0, 0x0, 0x2000000000000000}) 15:13:08 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r0 = getpid() r1 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0xa, 0x804) ioctl$VT_ACTIVATE(r1, 0x5606, 0x6) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400600, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000180)={0x4, 0x20000000, 0x4, 0x80000000}) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x8000, 0x40001) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000000)=0x9, 0x4) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000003c0)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x50, r4, 0x21, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xf7}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x40000) write$P9_RXATTRWALK(r2, &(0x7f0000000500)={0xf, 0x1f, 0x1, 0xffffffffffff54c1}, 0xf) ppoll(&(0x7f0000000040)=[{r3, 0x1}, {r3, 0x182}, {r2, 0x4}, {r1, 0x200}, {r3}], 0x5, &(0x7f0000000280), &(0x7f0000000300)={0xfea}, 0x8) 15:13:08 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) r1 = msgget(0x1, 0x200) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000100)=""/155) 15:13:09 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:09 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102002000, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x3ff, 0x488400) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f00000002c0)={0x4, 0xf000}) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000280)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, r1, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x121000, 0x0) 15:13:09 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0045878, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xd000000]}}, 0x1c) 15:13:09 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x2, 0xe5ef, 0xfffffffffffff139, 0x1, 0xf0, 0x1ff, 0x4, {0x0, @in={{0x2, 0x4e23, @rand_addr=0xce3a}}, 0x6f, 0x4, 0x80, 0x1}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0xffffffff, 0x3, 0x6, 0x7, 0x3, 0x1ff, 0x9, 0x2, r1}, &(0x7f0000000200)=0x20) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)=0xe9) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:09 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, &(0x7f0000000040)={0x2, 0x4e24, @rand_addr=0xcdf}, 0x10) 15:13:09 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) [ 785.506148] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:09 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x0) pwritev(r0, &(0x7f0000001700)=[{&(0x7f0000000000)="fcbf2d19890ffdc996f9f30addc37a9a0c655bbf90320241db29c8484628d48d2fac4d320b4a", 0x26}, {&(0x7f0000000040)="c52bf5016587d8ad81bd9c8a3113af52cf71d029c1bf1fcb", 0x18}, {&(0x7f0000000140)="9a203f4e80d42b156d1ba2402b310a8447cfb45c31177a570848c40c0805f2923dbdc3ed02beba86a810e3a692e9ab6ab1d7c22a32f1589993c7289bdd63d301851ff9632ccccebb38a33750a29247ad10ca080ebf1dc7eb817d864ad0b6aa8690f4450352ffdd2f97515a1595cbbd79061669f7cd0310943fc2844fed6afe92ac4cadf651d3664e5cedb695b8e22a9d8ae0b42aa8c59c697938a824ea0f8d5909b8", 0xa2}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="866021d2bd9a1a05986e828401532bfdbfebdd525b2d67e9453b35da79be8543538198936fcaa78c10f7c297fbb7d77a047a0347f31f3db69e5deae247ac79e2b5d5c9a312a6b7dc81b7a0c00ea1003ba9615318fc6107f978bbce08486b2cf49795982ddcbc2a100918ada76a78a20be84f68a3c94d2fc696a264e159bcae0113199e2388fcb77bb3ae015353a685aab6d09ef10dedd870ae38dcf662e4b36b96e82854bd90a62fe4dac2f88000ff975ad4ac70d30d270408883dbd7407f17c6d93871ab8301285efa275e48f09b85a49bab0f80e0982c3ff1380", 0xdb}, {&(0x7f0000001300)="74f7597f31e8789391f20d407dfd620bc693e02ecc8dfcb302858996a5f62b0ca443b9b4ae8e503771f15a4fe20435ba92b82ad61507c58a66649101994e20fb89638a69a9f9f3919bf2135fabca9f099adbd5a4ece583cad6124d60a45f4da47d75d3ff8b2c6710e00e0aa23df0f0b00f4d2f11b2a5a1f170164faf0dec84f8656551ad93606228a036d08ad26beb6e14e9315f83b9b92ac668e702503e90edd3ef0220b1b18fdc6e43a2ebb9", 0xad}, {&(0x7f00000013c0)="c85c5003c1b3062576bb4bc008ca27e005fac0cba836f424ea970e21e37aae837684f2139c0848af0bcc1d81e877943af08634b3114db81867ca062de3f65e5cc7b66d1d0974609cc8da9347aaabcaf8bfc7341a6343852cfb187aab8e31b07f1e698083638c87ad895dd5a298765065dcca620809adf40fb31ded670d5b77a73a40dee404bae9e953db4bc5d41e6f4a19ab4c4826249596aad80ad15e953f8d0c4a402e6bb995fe239c4e2638c19314088c5a92e01cf080643a", 0xba}, {&(0x7f0000001480)="52ef83409a44461b91414432f69d11426c0db28b96ae51e4703fbbf60984d1330f3faff624502e00ee8ec912e57106654b2970b2686bc9f3f28361b7d75faa9a4cf66768d7690667a5d0cc930da18ccd0011c99d7d321aa6d359bd01f872ec81176c281bae5c13e3a598fc1d6353dd2a2ce6db780e198b4179c573c015e5ca2952f03645d9d69d56da9ae7dffe6c6a0f3cb30c5edbcf0b40927018187b89959bfd514fa27598d20b7030", 0xaa}, {&(0x7f0000001540)="5056a1f11663ebb552a8d7211d2ddc6e38989a197650fc379f0e78dcba1c14bba62a2482636923a7d465ffbcebfc6f437dc1a9642727a46266fc41352d1759a9eb8a66f142b38566c97217e44c26f130dccc249bcd59a8e8ba2620dccff206edd122b2d55e93c7fa4ff2d56cc9b3358d46801577279f6bb56dc359a9faa61f870a1e20540bc912818dfa27f4802abc25451dd00454c44c870c58ae76bd597304380309e8f073dd3bd7", 0xa9}, {&(0x7f0000001600)="b6b0da9dafdf7cbeb12116cc8ee5bf47c5cad351a780d80510d18d6c5cef7445ce3832eeed2548159afac5a96d9d44fba48cdba8173609b93fc32548fa884ee6b6092b81e926ce5ff77b69aede90be46b7e7d3643c925fc3de574a6341410900951bf6accb34d150758ce7dec9efb120d028fafaf020102e5366d731eab05c30f522e71ae9892082df2a1f91c4ddd95f59b3d7038b276d745de6efd97cc93fc661282fd3547abc1671611d05e92dff9e91d684c7d274427501a9240bf0c3d414ec8210f355de7e2a7d99d4a5de53ad", 0xcf}], 0xa, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:09 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x10b000) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000280), &(0x7f00000002c0)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000540)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000000c0)=0x100) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000240)={r3, 0x1ff, 0x3}, 0x8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="b80000000000000006000000000000000100000000bfc4005ce18888000000020000000000000001000000040000000000000009000000000000000002000005000000000000000000000020000000000000000000fdffffffffffffff0100000000000000ff7f000000000000060000000100000004000000000022000900000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="a70a000004000000000000000300000000000000ff0f0000000000000f00000005000000776c616e317365637572697479252900"], 0xb8) 15:13:09 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x40204) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x80, 0x4, 0x8, 0x80000000, 0x1, 0xf, 0x69a, 0x3, 0x8, 0x9, 0x3ae4, 0x9}) setsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000040)=0x40, 0x4) accept4$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000001c0)=0x21d, 0xfffffffffbfffffd) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) 15:13:09 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) 15:13:09 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xcb98, 0x200000000100ffd) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:09 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) socket$kcm(0x29, 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x0) 15:13:09 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)=0x1) socket$alg(0x26, 0x5, 0x0) clone(0x802102002000, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = getpid() prlimit64(r1, 0x5, &(0x7f0000000040)={0x1f}, &(0x7f0000000180)) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 786.060951] audit: type=1400 audit(1537542789.990:188): avc: denied { getrlimit } for pid=10987 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 15:13:10 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x541b, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:10 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000000)={0x1, r0}) 15:13:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x1f4]}}, 0x1c) 15:13:10 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f00000000c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) r2 = msgget$private(0x0, 0x30) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000180)=""/48) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 786.261974] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:10 executing program 4: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x88) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$update(0x2, r2, &(0x7f00000002c0)="f33a67138a373f9dba0e4a564dc0cf7813af5fa62e12d9e0252d68207fcfc61d1b9eb07037b960d0cd13866da0feea4075975dde1a5ca6626302018bb54619b91a7cda7f02fcd64b6acdde8dc02cbf4ae2b424bdca907ee35e192cfb303cf4afcebdbf3e3cf44e513758a403d288bef6f2a0be2f631a8789437b683e512b73d7b55f8cff62700d85c35d3b16645a1958ccfce38e2a2a82ee", 0x98) 15:13:10 executing program 5: r0 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.max.depth\x00', 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x5}) 15:13:10 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)=0x3) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:10 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185508, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:10 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)='sessionid\x00') setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000003c0)=ANY=[@ANYBLOB="fdffffff0000000002004e24ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044409100000000000000000000000000000000000000000000000000000000000000000053903cee284a0f829e930000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100000002004e20ac1414120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x110) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x4000000, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) openat$cgroup_ro(r2, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={r3, 0xe2f, 0x9, 0x4, 0x3, 0x7fffffff}, 0x14) 15:13:10 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000008, 0x5fffe) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:10 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0x3cf}, 0x1) pipe2(&(0x7f0000000300), 0x80000) 15:13:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) 15:13:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xb804000000000000]}}, 0x1c) 15:13:10 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x101080, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x4, 0x0, 'client1\x00', 0x3, "9d773b40f18debf1", "5e8c6e0093f5396202a777bdf0733cc1deed75c742bca2a65074c42502274044", 0x4, 0x101}) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f00000000c0)={@host}) 15:13:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r0, r1}) write$binfmt_aout(r0, &(0x7f0000002200)=ANY=[@ANYRESOCT], 0x39e) clock_gettime(0x0, &(0x7f0000000040)) recvmmsg(r2, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140), 0x0, &(0x7f0000002180)=""/88, 0x58}}], 0x1, 0x0, &(0x7f00000065c0)) [ 786.885286] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:10 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) r0 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000)=0x4, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) [ 786.948148] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:13:11 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5460, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:11 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000280)={0x6, 0x7fff, [{0x9e, 0x0, 0x8}, {0x3ff, 0x0, 0x5}, {0x3, 0x0, 0x401}, {0x4}, {0x0, 0x0, 0x400}, {0x5, 0x0, 0x8}]}) socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) socket$inet_dccp(0x2, 0x6, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0xfffffffffffffffc, 0x0, 0x5, 0x2}, &(0x7f00000000c0)=0x14) 15:13:11 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) setresuid(r1, r2, r3) open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:11 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000280)=0xfffffffffffffe5f) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x8, 0x4) 15:13:11 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)={0x2, [0x0, 0x0]}, &(0x7f0000000180)=0xc) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000280)=0x100) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 787.618382] Unknown ioctl -1073457888 15:13:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x5000000]}}, 0x1c) [ 787.725206] Unknown ioctl 21376 15:13:11 executing program 5: memfd_create(&(0x7f00000000c0)='GPLlo\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000340)=""/223, 0xdf, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 787.763219] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:11 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) pipe2$9p(&(0x7f00000000c0), 0x84800) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) ioctl$int_out(r1, 0x5460, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) getsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000180), &(0x7f0000000280)=0x4) 15:13:11 executing program 5: memfd_create(&(0x7f00000000c0)='GPLlo\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000340)=""/223, 0xdf, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 15:13:11 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x1c, 0x80800) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000280)={r3, 0x100}, &(0x7f00000002c0)=0x8) 15:13:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x4, 0x258, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, &(0x7f0000000000), &(0x7f0000000340)=[{0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x7, 0x2a, 0xfbfb, 'team_slave_0\x00', 'veth1_to_team\x00', '\x00', 'dummy0\x00', @dev={[], 0xc}, [0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [], 0x104, 0x104, 0x12c, [@stp={'stp\x00', 0x48, {{0x100, {0x101, 0x7ff, 0x401, @local, [0xff, 0x0, 0x0, 0x0, 0xff], 0x39, 0x9da, 0x5, 0x5, @random="5bac4d8be462", [0xff, 0xff, 0xff, 0xff, 0xff], 0x4e24, 0x4e23, 0x101, 0xf8c, 0x10001, 0xface, 0x8, 0x7, 0x7, 0x2a6b}, 0x800, 0x800}}}, @connlabel={'connlabel\x00', 0x4, {{0x1, 0x3}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0x7fff}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x17, 0x0, 0x0, 'ip6tnl0\x00', 'syzkaller1\x00', 'bond_slave_0\x00', 'vlan0\x00', @dev, [], @remote, [], 0x70, 0x70, 0x9c}}, @common=@mark={'mark\x00', 0x8}}]}]}, 0x2f0) 15:13:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400000, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 788.038134] kernel msg: ebtables bug: please report to author: Wrong len argument 15:13:12 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5450, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:12 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x20000, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x640400, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000180)=0x4) write$P9_RMKNOD(r1, &(0x7f0000000140)={0x14, 0x13, 0x2, {0x80, 0x2, 0x7}}, 0x14) open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(aegis128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f00000012c0), 0x0) 15:13:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xb804000000000000]}}, 0x1c) 15:13:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xb00]}}, 0x1c) 15:13:12 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x550b, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:12 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='htcp\x00', 0x5) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:12 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000840)='systemposix_acl_access)\x00', 0x1) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000640)={0x0, 0xfffffffffffffffc, 0x8a, 0x8, @scatter={0x4, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/84, 0x54}, {&(0x7f0000000300)=""/212, 0xd4}, {&(0x7f0000000400)=""/72, 0x48}, {&(0x7f0000000480)=""/109, 0x6d}]}, &(0x7f0000000500)="d6311ec74c8d52a0596d67f4f2b844453949a4b79310356d7d59aba1c0985f7a49d4ce06dfb0bf1023556a5eef158eca2689d7d54eddb5532c169a0c74e567b918c02cd46a38605b8dc731212a23d3e977d9ae56ae08dfe0f6b3e1310b14313bd6122f71dc40ba0551f4790a1ae3c75c7f16dd2a833f446b0f9811f4ed609afa6989d62d166f79f95263", &(0x7f00000005c0)=""/109, 0x3, 0x20, 0x1, &(0x7f0000000180)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000006c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="73000000547065148652507f276b02f6dc1cae9c6d084b9772262126ffeb731e26d348f70f5ea51b325fea424720b0cedf693df75c6d1e676178bb274ad9ec25fa2ecf16b935a2b94ae17ba6b5ba56df7b74fc15ffd85b68bffac0b8498f2ac37216874b36408c47667d7ad4ee7b584f3afbc707e9bd49"], &(0x7f0000000740)=0x7b) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000780)={r1, 0x36}, &(0x7f00000007c0)=0x8) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000000) waitid(0x0, 0x0, 0xfffffffffffffffd, 0xa1000002, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 788.511232] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 788.552271] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:12 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x0) pwritev(r0, &(0x7f0000001700)=[{&(0x7f0000000000)="fcbf2d19890ffdc996f9f30addc37a9a0c655bbf90320241db29c8484628d48d2fac4d320b4a", 0x26}, {&(0x7f0000000040)="c52bf5016587d8ad81bd9c8a3113af52cf71d029c1bf1fcb", 0x18}, {&(0x7f0000000140)="9a203f4e80d42b156d1ba2402b310a8447cfb45c31177a570848c40c0805f2923dbdc3ed02beba86a810e3a692e9ab6ab1d7c22a32f1589993c7289bdd63d301851ff9632ccccebb38a33750a29247ad10ca080ebf1dc7eb817d864ad0b6aa8690f4450352ffdd2f97515a1595cbbd79061669f7cd0310943fc2844fed6afe92ac4cadf651d3664e5cedb695b8e22a9d8ae0b42aa8c59c697938a824ea0f8d5909b8", 0xa2}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="866021d2bd9a1a05986e828401532bfdbfebdd525b2d67e9453b35da79be8543538198936fcaa78c10f7c297fbb7d77a047a0347f31f3db69e5deae247ac79e2b5d5c9a312a6b7dc81b7a0c00ea1003ba9615318fc6107f978bbce08486b2cf49795982ddcbc2a100918ada76a78a20be84f68a3c94d2fc696a264e159bcae0113199e2388fcb77bb3ae015353a685aab6d09ef10dedd870ae38dcf662e4b36b96e82854bd90a62fe4dac2f88000ff975ad4ac70d30d270408883dbd7407f17c6d93871ab8301285efa275e48f09b85a49bab0f80e0982c3ff1380", 0xdb}, {&(0x7f0000001300)="74f7597f31e8789391f20d407dfd620bc693e02ecc8dfcb302858996a5f62b0ca443b9b4ae8e503771f15a4fe20435ba92b82ad61507c58a66649101994e20fb89638a69a9f9f3919bf2135fabca9f099adbd5a4ece583cad6124d60a45f4da47d75d3ff8b2c6710e00e0aa23df0f0b00f4d2f11b2a5a1f170164faf0dec84f8656551ad93606228a036d08ad26beb6e14e9315f83b9b92ac668e702503e90edd3ef0220b1b18fdc6e43a2ebb9", 0xad}, {&(0x7f00000013c0)="c85c5003c1b3062576bb4bc008ca27e005fac0cba836f424ea970e21e37aae837684f2139c0848af0bcc1d81e877943af08634b3114db81867ca062de3f65e5cc7b66d1d0974609cc8da9347aaabcaf8bfc7341a6343852cfb187aab8e31b07f1e698083638c87ad895dd5a298765065dcca620809adf40fb31ded670d5b77a73a40dee404bae9e953db4bc5d41e6f4a19ab4c4826249596aad80ad15e953f8d0c4a402e6bb995fe239c4e2638c19314088c5a92e01cf080643a", 0xba}, {&(0x7f0000001480)="52ef83409a44461b91414432f69d11426c0db28b96ae51e4703fbbf60984d1330f3faff624502e00ee8ec912e57106654b2970b2686bc9f3f28361b7d75faa9a4cf66768d7690667a5d0cc930da18ccd0011c99d7d321aa6d359bd01f872ec81176c281bae5c13e3a598fc1d6353dd2a2ce6db780e198b4179c573c015e5ca2952f03645d9d69d56da9ae7dffe6c6a0f3cb30c5edbcf0b40927018187b89959bfd514fa27598d20b7030", 0xaa}, {&(0x7f0000001540)="5056a1f11663ebb552a8d7211d2ddc6e38989a197650fc379f0e78dcba1c14bba62a2482636923a7d465ffbcebfc6f437dc1a9642727a46266fc41352d1759a9eb8a66f142b38566c97217e44c26f130dccc249bcd59a8e8ba2620dccff206edd122b2d55e93c7fa4ff2d56cc9b3358d46801577279f6bb56dc359a9faa61f870a1e20540bc912818dfa27f4802abc25451dd00454c44c870c58ae76bd597304380309e8f073dd3bd7", 0xa9}, {&(0x7f0000001600)="b6b0da9dafdf7cbeb12116cc8ee5bf47c5cad351a780d80510d18d6c5cef7445ce3832eeed2548159afac5a96d9d44fba48cdba8173609b93fc32548fa884ee6b6092b81e926ce5ff77b69aede90be46b7e7d3643c925fc3de574a6341410900951bf6accb34d150758ce7dec9efb120d028fafaf020102e5366d731eab05c30f522e71ae9892082df2a1f91c4ddd95f59b3d7038b276d745de6efd97cc93fc661282fd3547abc1671611d05e92dff9e91d684c7d274427501a9240bf0c3d414ec8210f355de7e2a7d99d4a5de53ad", 0xcf}], 0xa, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0}) 15:13:12 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) 15:13:12 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) [ 788.765558] vhci_hcd: invalid port number 0 [ 788.834655] vhci_hcd: invalid port number 0 15:13:12 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045510, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:12 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) [ 788.908570] vhci_hcd: invalid port number 0 15:13:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x14202, 0x0) ioctl$RTC_UIE_OFF(r1, 0x7004) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:12 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) [ 789.047047] vhci_hcd: invalid port number 0 15:13:13 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105502, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:13 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551d, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:13 executing program 5: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) 15:13:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x1100]}}, 0x1c) [ 789.247891] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:13 executing program 5: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) 15:13:13 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="0501000a0200000066000000c9030000ec000000010000000000000000000000002000000020000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@resuid={'resuid'}}]}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:13 executing program 0: getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000280)=0x30) accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)="88000000bb4a636ab4b44f780e6f02f50f1cca1bb05f1b14f0748049d3797e453f0f0792d63e84cbc088a188aa5474059004546aadfbefe18428451d748bf22d8b0a61ce5d8c46d1d99efa246f3c1423be50d26ef9b1a420d80000000000000000000000000000000000000000000000000000000000", 0x200002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x7}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'b\x00', {0x2, 0x4, @remote}}) pipe2(&(0x7f00000000c0), 0x0) 15:13:13 executing program 5: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) 15:13:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) 15:13:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) 15:13:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000006, 0xfffffffffffffffe) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000380)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0xddd, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000180)="773bbb457a81d844d4196df630c38f7da1ccd2392c388ebe93152cba507c82bf8aba5bb79116ef86ddda729322c97d44d0f8223882804843cff1d6430618e2b3961dcb38f9e2cc549c44ad216b6f9b095d68eb70765ff6e0294c149ecaec091eb48fb3e8458acd01252e498d2736", 0x6e, 0x470902fe}, {&(0x7f0000000200)="f74101ab13cb7b21ee3a191c0f9f71b6a1e499cff90e774eb3e2", 0x1a, 0x9}, {&(0x7f0000000480)="7c7db331e118748ea06e6bcdce69a3bee9131a747c8f46662dbbe5a8c3521a8d889bc07b73a8afe94686b02c64a31673647ea68d61f1be520dfefe1a6ec50e5c8f939e96e3784849241f7d7c21ba6fa3064d3daf6a6ccbab59f8ab124e6f7dece991d6fdb1feab15c41f3a6caf8fa037dbcf24f0798a61b2a2ced0b2c175fee363c443f1930890512c78683f116fe4c17e4d3a1f429fdb296bcbef4a77c054f161e03421b4beb967560053df27aaa7d2f362f84c319ccd13f84a3af6b818bf6a233be1982fe6eb118da83b06deda3e42790fce07e0b8ec714ef22539d81f397dd24c5fb0f4629b5f2760973555dbb9955f8052d686a331817a397c8d1c243514dcfbfd291266434a9771b7aea0f6ce1ddf2d6eb2a8315b065d34bc94ee35c5339b064e7475d9f299cf2a9ee5a6a52759350637ac21aca7cc257c13b91b946c1db2a665db01565b548b44640a9d80ee34ca6856895b0889f5047a94de21484384ad13922174ae714cd502d36c472485638ef6b6f62351c45ce84878eea93a0ebe5e2343ce4eee894ae956ba62764ef603564842afde1954640a5dd4ca690d467e2f06b8720993729329ea3bc4a083efd562f202fb347502a6870b9d5d08dc79dd778a18eabba8d8885973cc133a8d312d6053ff7115d1b2be4bb9e0c9c472ef6bfdc98b50c66a734829df0914bfb6f9ab11f416ddf4c45abd98aae1e07925cc90d86698358a1cc1fcb9731c49e2b969e336476a99326fce2fbb0dd0ae8fc943e3bba91978d05dc10fefa3be899514640fc0c33cba1d354223cdeaf9f05bc09c685ae0190328439be1e6428bb22bd23551b7819f7352500a3ee10f626d8cc0656ab17e9a38a2cf9729636f476347c5072d97c7880fb0ba159e07bbab97bf62b10dff4e71299fd23b0ae39975dd91bfae723c04b0a4bf0d419648e870282885ab8696f5df25272663788387d9f685d9b04dcb6db523dfd53ecb8cd5fd89331e70d86738efb3fae08bc7c5c1784deca91354ad9b7a92751d5a7a5629258d88397094f1a345937aa522de36b3f9f238a9336eb838e8cef0a294de14182980d414a75b8c4515cb9cae2bb0beeb89088b20f8c0f2d1b3cad25730ba47f469d561a1238c1e17df9a7f1e805bd7f713af88cd0cbcf28ab1f931bdcf0f0114dc97a9cf91365c1f73301cb995698365204fcc1556fce9acb79fa659c4151b63cfa8d761e6124cb4abb1da969ba1af99be02645bdd44982030436afdd6f45e200336990df8a333e63cfde8a353e5c9a6a0513ce6bbe61336fa93d6479f6086f6539071fedd6019a2dfb2fa1a61ccdbadf20ea916b975efed7f3a2db01b67f31866fb3fc95d5e605e8e29d1502214ce604144adb881fece1d2e1205bf3c730f3eb02187fa677178f069c880fe6744d1118c9cdc7f3cc7dd345223acce092c3c0b7e63ff7f27627471abf2616335bdc94fdcca03c3e9094d8e414a409e54b3bc5c4992e404fe6f4a0bbb6e73aadf892d1407a46293ce83e01e89f56b31dccb15b8c0d82178390a867eda7764a405f8ee0a289c4ea27ba32b73fd68f476762e136445997598a52e6282e241bc68567e8938acb16140441c59b74dde21a9c557af80474dcca83e99eeb19901a02b0cc5981daa994afd1cb8666fa059332ac621cfc297fb11d94f15c62c3922d6712985a212a97e62a74f94e2b8163203045942db3d1a7ece0e816af48a25210ac4da7ed73b7badc047f6f526e86d3fe4e7ee2acf79f701a75fc6804c3f47cee440c91f0c841b42e0366da476289528d5c195b02c423ab5218705d3bcbc597a490f468db41502033cb0ccf3cf29948ac8a02ec292c6d910e8739c51423c423b2acc661a7534a9353bf858ab0bc49d318cce2536b352a290ddd228c02725b1039a8d10137e0fabf98154e6f2426f4ccb1af8821a11188afdb0f6fe07e8413e99162027351a9c6cd0ba6d5998ff164cb498ec229e73f30d0e5284cc62343951ccfca1059d4ec32fcf1bd86531239fabcabe6f3a0dd974b55369dc3378d8daa0bd13c8944986f012631067d539c27ecce07c9b8744e971bb81df49b99b498e6af0c99ea608dc99407edaac53198b24cd901ee0b9389fdb7114bab9ea2adc62e655e238ccb8d06fca34e86245d9b747d21d1584a050165f158d40be96874655db9043378e705d1e50e3cbdafdf5c03bf7872b657639a61a1142cd9a0e2d515e5266daeab4fd22d40b87c96a716a6e704f48fa673f755826563130a26ad19c758d1e30f312f64740ee7e0f199905f479495dd1a4ba4c1efd72ab78a8b75a63ed61ae2e50b64c69eee28ec19aff4b96298b7e386bd4e391632e51d4b9dda3a3bb84bf5e78764fb27a976fa12008ad80bd2ebcfed86d1b560f9b504754e2ebaffe170f6fc4682918021003f6e47f5febd64295338af7a7adcc8a87fcb69638bba4bf8949d31a107d95231cc123661353966c8c998ff6558823e70c27184541cb24256ebb2ba551554975bc11d77251997cbc1a80a8599c7a686bdc0d37780c06f06aa98f3e094363c0de7834905279405c88de959c7a69ae779d1ff24d45f17fe65c014c05e34e7521c7d189c4903515be9d374dc91484761ad5b2e78febbdaab63f3488c4874cfa746936679e46e0fa329e63e0c5a33e3881f5100615ed56c24df4926d18326e622100af5b459c8683f877294e5d12481243fecb015eeb4188d865b64a9e854a183b99694a2d64e86841ed118d84af29a2550b7542c9e02fd331c0c94a0febec2a02091da52d47255bfcca3108f1de7a42a300c0f9f4eb68a02a7059b55bbf11441a9c45f4554e964e075858756b718d038aa475a18e869a4da463682e9e2c4418b7f302e58c4969e076eee4def6397fc60b9cde9945504a2b3a39cfe314f2e08c8dcc7c44e3713a8bd2d1e6451683f2b51e41bec1ee2c9b07ab4d517d3ca55603eef677cb4566d0164d767be2053e8229e736828b74ee6c98fc13806f1a81e5f4414fbe152c68a2057dd454b829149dac0f01aaf5fe258d36d5c2e19b6e35005d8965c0ea040aad91b9d51ff7e452d8897363ce496a72ede4d65e5213035a351d1ecbc73573c85ab2d7205f1e8a14de716e6dc90cb4fe015df6601d04a07bf76991d41b8fdbcfd5a91c8f926d045b0ae99dad82c65c87aa12bcaaf881be3d48682431c25af93f81912ca8a9c48a3f5174736c70fed1f9f152d3c7b7d1ebbb24079bf94596aa3b07577c6062409bba8354b4083a57c878f968f7865da947205181d60e92c219a43c216ecf6d59dabca0ac1614c832db1b2cde4a5c1ab95f270088d83b03e227027f327337e6e073922e7aebfb1d90118631f53bbb32a6875794cc9ea3485afdc588e954179429c8b6fc4d601e5cf68d396f936f266393c26c775e8b87363a477865eabeb4587e15d8e478fba8580d30f58a93eebb2125db32c7fa5145ed92daa088ab820dac1c2888d150f2d1b25721317310f10ba923a5d70e52daa5d4685394f833fb5940e2a8dfb4795ea1da307c3191239daffcaaa073be2cea4c09c762e20ba28ae6f9569307508c67ef3320453bc75af7e2f34749d5588c0dddb69e62ba62333fe4553b81155e7a13103c0f77d90e391845aa712c88e4855dd1ad689eedd3f632298e4f87c162f482960786ad81446691c785c919eb01bb485b081e8071693436a3d1862bec2a8a2c4edc9268c2502395dc65850db8abe56dede0a9da7b67a8e4209a29df071d9f687c3d8daa48f1c22324faa91ba9438919dc624067c8c44264556c7a16b421969f49492566e38010370f3194246cdcd26f73749d74010bd70a699e27635e5bae30d4d16181463884bf027cc79e0d7c129fb1e6dfbfc336f0e446c3d23842831e54849ad38de0cacdf5ddf5af18a93d3ddf1f8cde3b29c34bf8bda7e0fc78fd3290b89574394fc7e101dcfafcb0c9246f572f25a7e9a0ee9f7b56007e5c2846c6f9d7e96a9c641758935ce8f6b6787eef4e2e9f18df4c822bc8aab3afcd37718133df9709f049008fa12baa4d8dd029872644f101c52e13700f3a8c10096a607428b95ada1772c43cfcee74bd4250f4c68472e586ce7019cc83f71d0040900c5feea745a921d4e35f2e42c9e14a3189f4adfa3e5632e6696092917ed466bc555a9ee20e3e5b93a60f9e7f0fcba1173dfad1a32b7128e615f4481eefa52652e6c7cd8c038624a6f647923d10267ff82afa52782ece2709308d9b542b457d9a5adc30fca774192f56a51748d9863eb0a10fa58bbfe24bf3ca89824e5c0a87fc2138e6372dbcd4c5bdb1071ae28213c3724e787d4b6f14c1fa4aefadf92284811916400a8646d85cb0e0aa247aa5556a7b216cce3f3cff959713b2d33f91d56af2dd91295f1b4a707020dac55553238b635ccd3da6f9ecfceb8a769a813e54de5d90775964373c8d890a530282d5e561f66e51de57bd9479a503205129f6d3a0ca07d6c1825c60dda932112e694989241669319b10e396f4ca1588bd9251a2ac250b8bb580ebd8764cfb28175b98bf67779eb5a7008fb0c4c8ddb270053bb7cca26a48ae3594337809abd0ada4fd5ed13853b5ae36de018b4edb682d67ef2d9c9793768f06d81619cc54b296fd47eec12474b9933c0e3cdd71bbfb83c2f03b60474058efb126c5cb040299b4e2807664cf90ac5ad5a1bee09dc81ba54146e16f72a32249dfccb64d46ba4d6c75972f0194b8c727e9460a0f4c95266ef6b3e8d988cfa607a1cd1dca638df0a783583a12a8d1fc1d079b450dbb68dd81a651cc20bef31563b1e049b4deed6770973207784db5c09c004dd72a2c04615481defe2c28f0453b49f421acd239600948e06e5190183676d961a9e30872ddc5de3681faa64a49c8a5012c97846c40320a1f22cc344b507cb7461aebe75b36b42764021fdc9f58108118027401c4cb272e478bac9227dc2e3403044d458da3edaee48d6a3126fbfa5758b2e4ea7d1d310eb120b690458db5e538be80795fe5316a6303441bc256c8d197a2e3ed0f3a0b4e6407785a18e48460da0cdac04c20895909d25c2b9c1dafe0f948b42830052bcbc03e0c69c41b501706d6e7dae20e79b1f2328adec5b56f9c027561b464dd00f4356489e82e5b65e9edc0e853e5db4cb10b555c4b8e0829dadc6102bfc382bf04b9153e6e367160d3c6a244fecd9b60931bb4208f8ebf46e3d9aa880bd728dcfad749794d95be85784889b8bf840da09a1d4a612f2141959223d11903e237321801c2e4577487f0c292fd1822fa06c2705efe7f5daba5b4b4f4d4a3f63b5eb98a0dc5f98e2e7eafcd1692a8782116f51d01e755b369e85f8a95e0ad8057bc0c373708a4d462c20bdeee4d7df9723aaf82b15d46c21bfb0ea1beaf0b7ca17740c929cb7be3d16a5757825c6ac0a07f40460630a9e2a3c619189453168590f9c486b7da0ab0e14b538de185968f905d6c1bf95dd69fdf5321282e20a33b8d780bc0a0b457fe9758f17dd8e0e61cb0e7a0f12f95abca411e0d8baeb9c5eaec99bdcc286f24edf7e8decb98bcfecbda68c406e52987e2917f502d8a13e9fe4c3910f8c21d48d957b5a98cede8f61d31461f8fe3b0d248f39c60529613ec45b02b90f9d530f2322b3f4930d7308d82e064de84e52280d86cd738d10c46db05896b9ef478d64c341d47a6028c1e01a7588fdf988839ede9d36ac7a4eec364e1d82b5ed58c53786ee9e0c1c03478e81f5d1c9a42b932afee1d2b670c0b85d1e93aa545cfa57e91921298b355bba99666b2559ea4cb49a81b3be1eb6f5af65d2e", 0x1000, 0x9}], 0x8, &(0x7f0000000240)={[{@quota_off='quota=off'}, {@rgrplvb='rgrplvb'}, {@localflocks='localflocks'}, {@discard='discard'}, {@rgrplvb='rgrplvb'}]}) 15:13:13 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x0, 0x0, 0x0, 0x0}) 15:13:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) 15:13:13 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008550e, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:13 executing program 3: socket$alg(0x26, 0x5, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x4003) r1 = request_key(&(0x7f0000000280)='.dead\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000300)='trusted.overlay.opaque\x00', 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000440)="b2cecd563fd050dc704cce00270862187aecb95e9605a47d5ad4049bfbf7fba832a31212d243cea8f537db788af46747bb7ef64903446d34affb0ca8f02e0d0bacba5c27272c8276c45938490be6e2ff7835cbee379ba7133122c891ed6db4524ccd8c8d027c44457b20ae1eb09cd2f47705f4fd020630a93e42811bd91d313687ca456e4b81d35f31d9ea44e4d3b192db835c50485688561839f9fad569fdf82c8b6ffa25f08506ce83102048d9729b40b5f3f17fff251beae7f9bed7ae0e82a80eb28073790cf00bad501a893e121b4ebd09317db640508104c8c7e1880720fb70e01a125f01f5df29f9602a265660c35d0bfd3f783b8e", 0xf8, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000540)={r1, r2, r3}, &(0x7f0000000580)=""/186, 0xba, &(0x7f0000000680)={&(0x7f0000000640)={'mcryptd(sha1-ssse3)\x00'}}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xc00]}}, 0x1c) 15:13:13 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) 15:13:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) 15:13:13 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) 15:13:13 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) [ 789.990417] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 790.028689] could not allocate digest TFM handle mcryptd(sha1-ssse3) 15:13:14 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045515, &(0x7f0000000000)) 15:13:14 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) [ 790.161562] could not allocate digest TFM handle mcryptd(sha1-ssse3) [ 790.336733] gfs2: not a GFS2 filesystem 15:13:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@ipv4}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) 15:13:14 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x7, 0x7) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000080)={0x7f}, 0x1) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:14 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8010550e, &(0x7f0000000000)) 15:13:14 executing program 5: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) 15:13:14 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0045878, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x1d4c]}}, 0x1c) 15:13:14 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x2, &(0x7f0000000000)) 15:13:14 executing program 5: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) 15:13:14 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000280)=""/252) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:14 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x41045508, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) migrate_pages(r1, 0x1f, &(0x7f0000000140)=0x2b5f, &(0x7f0000000180)=0x2) 15:13:14 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550c, &(0x7f0000000000)) 15:13:14 executing program 5: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) 15:13:14 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x4000) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000000)=0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 790.787144] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:14 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xffff, 0x208101) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000280)={0x0, 0x100000000}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000009c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000540)=0xec) socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000180)) read(r4, &(0x7f0000000300)=""/238, 0xee) setsockopt$inet_int(r3, 0x0, 0x1f, &(0x7f00000000c0)=0x9, 0x4) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:14 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0x0, 0x1000, 0x9}) 15:13:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)=0x400) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f00000000c0)={0x6, 0x40}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 790.978357] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 15:13:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xa]}}, 0x1c) 15:13:15 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0x0, 0x1000, 0x9}) 15:13:15 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:15 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x111300, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000280)={'nat\x00'}, &(0x7f00000000c0)=0x78) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xa) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000080)='./file0\x00', 0x4040, 0x0) shmget(0x0, 0x1000, 0x54000000, &(0x7f0000ffe000/0x1000)=nil) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=""/167, 0xa7, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r1, 0x4) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x1000, &(0x7f0000000180)=ANY=[@ANYRES32]) 15:13:15 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x4, &(0x7f00000000c0)=0x80000000) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0xd4c0, 0x0, 0x20a, 0xffffffffffffff7f, 0xee, 0x100, 0x78f4, 0x101, 0x0}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)={r2, 0xbb, "974c9837bd80e2d13d1291db15571c4bab6352842b753ec4efbece845d376cc9a675ece428ac998beadf2975ee19cc90d3c770f87de1db0c53094d22406088ffecca0f704ef972c42b9aa204c2adafac9d952d7747bc3cdc1c86f2684d016d5aa2d3955ca240778899433910ebb2bc4c7edcf86e96afe08be525aefb22f008332b449300d234ea5f7957fa6101ee3a5307566cb63892cc2c36172ea8035ebe54eb61625cd031700cd711ab12d78c43c0a5a9228dc08d15644243c5"}, &(0x7f0000000380)=0xc3) [ 791.319471] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 791.391986] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:15 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4b49, &(0x7f0000000000)) 15:13:15 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0x0, 0x1000, 0x9}) 15:13:15 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)=0x80000000) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:15 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80087601, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffff7fc) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000000, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000180)="91f9bdbfe34e5c441d7b82720a183c36f708f22b3b7961880d3b3fc8a083acb7ace5897c6e7597023d35a28b9489c8dd133aae0f0a0bd0fcaba1a9357c0c5e35ab5daadd758b3d202de21b91729f1f0ac578a8ac7c4518858cb7814b936680432a8ce86c4d439b236bea9f37da1fb2e43508d869536bdec9060a731f73691920b3e290a5cabac9a74ec1200622369bfa35125d4e91e2b0e3c1d7f172bc909cf01968a3315b1fefc46c67b44a7a1f09ab78231aec33147e729bac12", 0xbb, 0x401}, {&(0x7f00000002c0)="5c2f36151abd8576f5fbaedefa40e52931388ef18e7a1a58f985decad9c62b07f861a40468e558afab40618f9cc665e347aaa3567201e795500d7adf9108e6eabf0cfa786f1161a714995bc3c616caa7fa88932be99b0d1584a3cb92f2a19f59de9118065457e35a03826f1b11a342b80936221fd3eff8734a6685e5faf4d3513888b47910cdaddae059af0a7571cebe8a36f75b5dddd037bf07d979f27512aacd3a28884971869ba0f2910a63e65bddc309799f1c13da63e6a09e997cbe81ea74ca5fa5688ba5352a1a33f13300c7be76", 0xd1, 0xff}, {&(0x7f0000000240)="cdf2ffa7", 0x4, 0x80000000}, {&(0x7f0000000480)="ff0182e249f16805ff2c8e5a44b8d901b6eed3a557bef78aec0c30f219c0cd28935b02f31e41240571d7fd97ceaf3e4e3cc0c2a6ad524a868dca1c36489a27e0f44c5cb05e76edf003d82cea5be5696cdb57042271bd43494ed2c0711f7760838145cf7f5e71e084b1425041967d0d9a841d228755cdeabe9797f79e37f90d764a4d4bf073bc5141711e4a71c571192fb9f4ee30721d1311c1fc8a1bd18ffb56252c69c215e2c456c2b16e3e932bc9c41bcd971440033231b10de77b14d7df50db50fc3dd182e5a04e242fc335c3893a271f4c", 0xd3, 0xfffffffffffffffe}], 0x930081, &(0x7f0000000580)={[{@autodefrag='autodefrag'}, {@ssd_spread='ssd_spread'}]}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:15 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40a000, 0x100) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000013c0)={0x0, 0x9}, &(0x7f0000001400)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000001440)={0x0, @in6={{0xa, 0x4e20, 0x3, @loopback, 0xfe8}}, [0x7fffffff, 0xffff, 0x9155, 0xaa, 0x2, 0x3, 0x40, 0xfff, 0x200, 0x7fffffff, 0xffffffffffffff81, 0x2, 0x10001, 0x80000001, 0x7fffffff]}, &(0x7f0000001540)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000001580)={0x0, 0xc29e, 0x6, 0x2fc, 0x20, 0xfffffffffffffff7}, &(0x7f00000015c0)=0x14) sendmmsg$inet_sctp(r1, &(0x7f0000001700)=[{&(0x7f00000000c0)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, &(0x7f0000001380)=[{&(0x7f0000000280)="5e63187280166d4907c3ef99d0d8bd7f852a1d3ffdc0fe08a608f9b201d81dcd9b86bd76eddffe7c2c055966adbfb710d4e3fe5735a0e1a1dfe1401bbf95a47df82654a058968ed2190059526babd4d70fa8715767844e2377120372eb74596a340dfa6f1557145fd0c323026ed8f63a5894f7ba283084f506c4bddd6744f02c1947fe28dc2c9bd6acd54cd4e8543ed37473284abd11ddf4f83dd1143a510cf347fca10208289ef90f57e504784575ce002afbf283ea005bd59b38f43d1ab6e06e4156267b4646f9de9e0a2b", 0xcc}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000000180)="eedf4c37840807c3061a12d880c3d2132ad362de0493a228a23a5636fc9e7604dca3d3a79f8c71a9bde1fc4462aa086fc59d021855", 0x35}], 0x3, &(0x7f0000001600)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x0, 0x3, 0x1, r2}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @sndrcv={0x30, 0x84, 0x1, {0x1, 0xffffffffffff86eb, 0x8, 0x1, 0x40, 0x1, 0x20, 0xdc0, r3}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x1c}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4}, @dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x1c}}, @sndrcv={0x30, 0x84, 0x1, {0x4, 0x2, 0x200, 0x8, 0x3, 0x0, 0x7, 0x10000, r4}}], 0xf8, 0x40805}], 0x1, 0x4000000) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) [ 791.737753] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 15:13:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x640000]}}, 0x1c) 15:13:15 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80086601, &(0x7f0000000000)) 15:13:15 executing program 3: socket$alg(0x26, 0x5, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) pipe(&(0x7f0000000080)) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5}, &(0x7f0000000140)=0x14) 15:13:15 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3, 0x0, 0x9}) 15:13:15 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105500, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:15 executing program 3: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000000)={0xa3, 0x1000, 0x9}) [ 791.965410] vhci_hcd: invalid port number 0 15:13:15 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x40087602, &(0x7f0000000000)) 15:13:15 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3}) [ 791.990826] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:15 executing program 3: r0 = socket(0x800000000000a, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'gretap0\x00', 0x7b}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'gretap0\x00', 0x4340}) [ 792.069345] vhci_hcd: invalid port number 0 15:13:16 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3}) [ 792.201867] FAULT_INJECTION: forcing a failure. [ 792.201867] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 792.274260] CPU: 1 PID: 11494 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #27 [ 792.281594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.290983] Call Trace: [ 792.293598] dump_stack+0x1c4/0x2b4 [ 792.297259] ? dump_stack_print_info.cold.2+0x52/0x52 [ 792.302478] ? perf_trace_lock+0x14d/0x7a0 [ 792.306752] should_fail.cold.4+0xa/0x17 [ 792.310849] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 792.315984] ? graph_lock+0x170/0x170 [ 792.319814] ? graph_lock+0x170/0x170 [ 792.323645] ? lock_acquire+0x1ed/0x520 [ 792.327665] ? __lock_is_held+0xb5/0x140 [ 792.331760] ? ___might_sleep+0x1ed/0x300 [ 792.335921] ? lock_release+0x970/0x970 [ 792.339920] ? arch_local_save_flags+0x40/0x40 [ 792.344531] ? __mutex_lock+0x85e/0x1700 [ 792.348619] ? __might_sleep+0x95/0x190 [ 792.352627] __alloc_pages_nodemask+0x34b/0xde0 [ 792.357319] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 792.362351] ? find_held_lock+0x36/0x1c0 [ 792.366435] ? __might_fault+0x12b/0x1e0 [ 792.370531] ? lock_downgrade+0x900/0x900 [ 792.374700] ? lock_release+0x970/0x970 [ 792.378689] ? arch_local_save_flags+0x40/0x40 [ 792.383292] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 792.388322] ? usbfs_increase_memory_usage+0xf7/0x1d0 [ 792.393536] ? usbfs_decrease_memory_usage+0x30/0x30 [ 792.398658] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 792.404216] alloc_pages_current+0x10c/0x210 [ 792.408638] ? check_ctrlrecip+0xa9/0x320 [ 792.412808] __get_free_pages+0xc/0x40 [ 792.416710] proc_control+0x227/0xef0 [ 792.420536] ? mark_held_locks+0x130/0x130 [ 792.424791] ? proc_bulk+0xa70/0xa70 [ 792.428541] usbdev_do_ioctl+0x1eb8/0x3b50 [ 792.432794] ? processcompl_compat+0x680/0x680 [ 792.437398] ? zap_class+0x640/0x640 [ 792.441128] ? mark_held_locks+0x130/0x130 [ 792.445381] ? zap_class+0x640/0x640 [ 792.449104] ? __lock_acquire+0x7ec/0x4ec0 [ 792.453359] ? graph_lock+0x170/0x170 [ 792.457174] ? zap_class+0x640/0x640 [ 792.460905] ? dput.part.26+0x26d/0x790 [ 792.464899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.470452] ? check_preemption_disabled+0x48/0x200 [ 792.475484] ? check_preemption_disabled+0x48/0x200 [ 792.480543] ? find_held_lock+0x36/0x1c0 [ 792.484633] ? avc_has_extended_perms+0x8cb/0x15a0 [ 792.489582] ? lock_downgrade+0x900/0x900 [ 792.493748] ? check_preemption_disabled+0x48/0x200 [ 792.498785] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 792.504595] ? kasan_check_read+0x11/0x20 [ 792.508757] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 792.514051] ? rcu_bh_qs+0xc0/0xc0 [ 792.517620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.523177] ? avc_has_extended_perms+0xab2/0x15a0 [ 792.528143] ? avc_ss_reset+0x190/0x190 [ 792.532139] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 792.537955] ? kasan_check_read+0x11/0x20 [ 792.542128] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 792.547406] ? rcu_bh_qs+0xc0/0xc0 [ 792.550977] ? ___might_sleep+0x1ed/0x300 [ 792.555142] ? arch_local_save_flags+0x40/0x40 [ 792.559751] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 792.564693] usbdev_ioctl+0x25/0x30 [ 792.568332] ? usbdev_compat_ioctl+0x30/0x30 [ 792.572751] do_vfs_ioctl+0x1de/0x1720 [ 792.576653] ? ioctl_preallocate+0x300/0x300 [ 792.581076] ? selinux_file_mprotect+0x620/0x620 [ 792.585840] ? __sb_end_write+0xd9/0x110 [ 792.589909] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 792.595446] ? fput+0x130/0x1a0 [ 792.598716] ? do_syscall_64+0x9a/0x820 [ 792.602742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.608285] ? security_file_ioctl+0x94/0xc0 [ 792.612705] ksys_ioctl+0xa9/0xd0 [ 792.616189] __x64_sys_ioctl+0x73/0xb0 [ 792.620097] do_syscall_64+0x1b9/0x820 [ 792.624003] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 792.629377] ? syscall_return_slowpath+0x5e0/0x5e0 [ 792.634300] ? trace_hardirqs_on_caller+0x310/0x310 [ 792.639322] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 792.644351] ? recalc_sigpending_tsk+0x180/0x180 [ 792.649126] ? kasan_check_write+0x14/0x20 [ 792.653374] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 792.658242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 792.663429] RIP: 0033:0x457679 [ 792.666623] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 792.685530] RSP: 002b:00007f3d4e732c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 792.693244] RAX: ffffffffffffffda RBX: 00007f3d4e7336d4 RCX: 0000000000457679 [ 792.700529] RDX: 0000000020000000 RSI: 00000000c0185500 RDI: 0000000000000003 [ 792.700540] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 792.700550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 792.700560] R13: 00000000004cf508 R14: 00000000004bf7f2 R15: 0000000000000000 15:13:16 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045518, &(0x7f0000000000)) 15:13:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000100)={'syz_tun\x00', {0x2, 0x4e24, @loopback}}) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x20000) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000080)) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae88, &(0x7f0000000300)={0x2, 0x0, [0x491]}) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f00000001c0)={0x10a, 0x2, 0x81, 0x6, &(0x7f0000000140)=[{}, {}]}) sendmmsg$nfc_llcp(r2, &(0x7f0000008680)=[{&(0x7f0000000240)={0x27, 0x1, 0x2, 0x6, 0x40, 0x6, "34cd91bf76a5c61a35d402fa983491fafb31650326337747b057887ee7db2a6eb3c4ce4953e0113a222ff35f9ce26d76ed72954e1a3e7374e01b0a99e32289", 0x35}, 0x60, &(0x7f00000034c0)=[{&(0x7f0000002400)="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", 0x1000}, {&(0x7f0000003400)="42743dfb0a75c133d3d75c18e806823b8f559062a2770d2ddf34c5ce23fc0c09b54da0c45c1103fd0d8fdf5b56998210bbef88c8b7db718f16acec74e8c3c147bd045a9778237350d333d5c095012c03ae08f57697d8aa7a62ad6e24ddc0adab6f2cec5b1f4d16c65c612a972401644468be622dd68edf53c2f0c2e0f9d8d2c6f50eb357e7651ac57197ff06618827b3560e4253f826dbabe7d3a6fe6f6359475097a32ed024200196102405a557e6454287f88c09c3ec74", 0xb8}, {&(0x7f00000002c0)="bb8b01bdef58a2c668bb4aadce3f29bbb3c5ef856d37f324346ff5b33cbe367326", 0x21}], 0x3, &(0x7f0000003500)={0x100, 0x112, 0xd23, "0139b20ccf8850e60e0cc80a0325d3fd29bbb9a5e87ca26e4944eab8598ed54188ff3badea1f9139e22244803fc94e9a8367c934ccd40e196f17c1a89f887dcc7bd64a0747be4dac919ffa54aaf78bf8f671ac072a4b711ec69d186b6998680e669badfe08642de61733a137da2b79b95222f0a7049a4f86b89153e87c61b5bfa7e400d930d3707cb04b961cbcb8a2a30cca41e6799db5ec9c064ac66539159904dbb6e0593d3d5f15e034956fc9d5fb0acd0a7a6483cddf2abc743ae08ba2560f5fd4d454ae6033db022d0d398b571bcbd69c20cf19a6770fb9d85eee4aaa48118936d249febae23a415a"}, 0x100, 0x40040}, {&(0x7f0000003600)={0x27, 0x0, 0x2, 0x5, 0xfffffffffffffffb, 0x9, "4aab62c084b605261b8169e66ce99ad31ab7401ccc03940e57fd997003edcba8dc8b2425d1189cc8ed25cfaba6b6791a574e427d6a265474ddf6e85636c08c", 0x31}, 0x60, &(0x7f0000004a80)=[{&(0x7f0000003680)="9abea2f86e11cd041501ab2e81a6", 0xe}, {&(0x7f00000036c0)="cda047c912be94a563f8e2b64bd86be121a8626aae02d6d23a2973e393f0e0e85a0860155c957a8dcbe00de3e62010410d5d9919ca4781ff6363c3f7358c3eb453e2bb557ce6010ded9e7828174298f78d03a8e543fcabbba0cf367d128cc356c2951eb44338117bec208280c4da4d8efb4f44d496ec82b3efd7006538d709a4e647b8b1b03a6d280a6208993e0d6e3921a6755c41115aca364ca9ac7715890980b52410556efab05d1afb6cc5e10984e17a1859e1bc86c5290eec6b5d09627275ac8647c6a561d8570451fdafa05fd8be3879761cb5dfd9970722362419f3e015", 0xe1}, {&(0x7f00000037c0)="1684b5a3ededbe217856805a0c4d940b31158ed2f56993bef9016c1a63c9a61d410ff7bfcea794aa2414525acb85f9d69f544694e111e2024884bb8e26a1e72bb849863e9b6ff648f1ac5ff8a903a7e893281151d8d3", 0x56}, {&(0x7f0000003840)="92b2b03c620890a4c23ef3ab6a8e0e695453dcccbf4c54bd8b4c9dbaeba7dc55fd59cb98c4ded35ffd4ecdac47d3d1cc", 0x30}, {&(0x7f0000003880)="a9aa117f6a02e0f57bc65055f1418b9925170cfc7639f94df4d6519d1a24740fefadadf2c7493f48dfebbb46d79e224e6db6163e323d1b28d4b1b12c795740467dba96b0b3ab7d5a85326fa9cdf8bd0bb2eeb4a3b1fd875d6149dd0512d5191c4bd39ad1f20fb6eb0e2a4d50b891daa1335608f2d1e08aa45a8f29297ddba182297a19c8aac8726d4512620887ce67d6526498406df19945d81c841528df6d56b536e35d5e5edcfa54ddfe914494174025746285fac4265f31a9fe08d1f42a720741f9366e35b3ac93104dec3048e22084ad2fd1762c6b6d150e7c422a3f2c715335d1195ea9d8409edaec34177e36207d14885e125231b0959ca2f2b5c1df7b73fa2f8dd636cf89f7202a66c1ad829e5d0ac06e15e590acd689a93676028298f6bf30d643f7385cb1b8ce872959d8c7f2aa022ad8c8562de75813d2896f95af52169c593bddf8bbf70b2ec3b93dad02db9b6fd9e9c426697a07b333841a87b85bf6c24a9033b0773562ae15dd1c7a006404854b0b5f37c14d17c48c5d26cbfc47a8b24a032babc0f0033ba13f06e421374e8b6e36a478d087407f27e9905348516bbe7afcf4b7c253c488e21e8b52e3023b7eaa03c03634fea5dbad32a46dd6799eeb7e3ada9dbd6653df2322c5d4401e35980fba24d9a1995131c543b1a3ef6d19b960e605ff61d6a9cd7544975a903af95213285569a6e7328511496ad802a677ea27b259e612c1789feb77714f051d5b26e8d65c746bf8ed681c1321a52ba205f353962636697ffd56d9c928b2bffafe4fd59982ebe4c73fc737dc7d36a5863effc0b6256511188e3469d0e33a2d7430e9fc578aaba503cbdcfb5dfd9257aced1bd9dcc9baa230ca5da4740fb3accf67f238848981a44e87ffc939512b69ad12f64c944ba817ad095e9b2a7f7439b35de7e4871f537f71a130b5f8804c62dccdff3f1ab3fefe03f7ea4c1fa69c0537050f6f778351190c30ca9bb737a79db69d0d70b9b9ab455e4cf5933f0c45a02c8191bc5fc47ef74c8f7d5cfec348febb37fd42d82d911eb3fb59b994aa88f654065926517f4ad87d5bbef555b2ed0fc61e57b071044fbd83e5c4c9a560aafd7608fce4ecd8b817bbc08171dfa1e357461691941e8909077b45da9965f6412ad8d1d6698001944c78fb408018f69906f4cc18ad7e71c289bfb474dfb6129db3b90f9c1213e7d6fbaebb81ea2aaf5eae27a4bdc0322614a3c62e319da8df9cef616c5b30be6c75902cda01d3a6f7a8aa6b003e3630bde6325d1d0e292312191e14af3ccf15eb788f6fc0dce70abf2fc64f50b722c280db4b8ba065e9f2a68228fe4ba7e803401d7905b62a6e67a65ef7fbf9509fa327fb867bbb46a7b732370ba13ce918d0f17bf95c22d852b90b098d49decc95e80a856efb8831bd63e3e57f4d47a634e750fe185e32224249e7f3d9611280561b08429e9c063edc80a795f04a45c95a71a8384e625e93f66e1337239c618737be89951e6b9be4a336b4e2018cde264cb9f72ba259ad0b1d4b08e5ae439231bc6e7f636bf5457085187286d4ff47df4103e718aabb44c5bd498e14432aa3374e6bfaf998744da6f85b7ab47b0a4e8c931da7910c912e4b45be4e0b3ef554c0f156f4d6f58e82b4cbfc59b7a3a8bbd5d7b91ba2ad712454eaa659b89f5c1370f3f57bfc911ea42aacca45eca4f7394c0fad6d26de16679bc2e785fe2f15192483b2bee34e44625a9f7e1a532e5fee32d42924cc490d7a857ff8e39be41d98887d6478092803babd03d22d44bceb31c353b43c8af7102c3e2a3db046c24d4c86c0e7e64f0110497f42e9e5ec2ade7082f8d96d214fce66a1f61428454c8e57b583141ced979b58f2d303b4b463a52d1ee6fc3c81e2aee9f8e2667eb39e398921fe7a4a15df9db2669fc8d3fe3ab59cb9833cb957e0c6b33ac63705824cf357f8504652a59c8f7f0e6b1ef48c8b4b268823272312b558f5be86993ed1fb929ce3aa1d26af0d526bc8b03cff78e410ccbe40f3ea404ef0ce03cdc1965fab6fc16954497ba56161e6030bfd430c71aff92583dacb76aa4c9f8f555b28f41448b5f97f35c110ec0d480543a28475609c704ae3f0284e0f284536019726c4be2e9d2563920f5629661ca3a8921101af945a689e69dc0879e9dfa2c8c202f4930ca35486d490881597761630d1c0d8440ef4358a01055f54b73ab7e6e948dde8242e10251fd4f49d0a150e58284c34e7897770857490164aba73ababde0c41fe4271c306f081ab7d6adfa65cc64cfe00e5dfbe094f78637412c0f5b087bbac5f4c36f3d48b7e57f4e70490bb6dcdf6cd92bdb169f97fa108fa23767c7e551828ecd35e47adbc417d513d99f53a7c405edab8e99ca249c808bb5e8913b922aebb7641882dbf5655369361531b40476b5ff24e036c3c612660a526a44d9912873615e747907ed463ebf8f297eacf10a4fe63d5491626c7cea21b588ec492adc36ab45c62a0d7c61ddc91dc10335a4ec96d7a0475de7f34bcc84ebb0749024ab15dc3054d5d19666d261d148b6d0dafa6eccc59b201f3fa6e9e7d3339feb6cfefed5e3378e848e454a4b712da36013c763cd657033949eb1e02179094063cc331517f11f5d4fe7db9190577767dd922c92d2f06c578437a79bca9a90ae40c0c0e4c4d6ba0a6f09e7973bd9103de9673e68bd0ce2ecc41adcd265a88faa4e4b31a84254740c586e7163c60edf6793033b9bd560bb95a842e9ff067491fff74ed1a79e8fcb663e6b72866bb22fe51e6b75c64582fc5c4e717371ce9ce278b21c2945fb6ea9f49bfe1fdb5e0b492c241269dd25d9e0a6fb3908abce0b7793129a10b369a4680673dd6d5200de309cac40a91d336739c558b18150eab94a9d2cabaf9382fe358be5a24961eae51c6058d0ebc6156e98928289011b9c5ad69e69501c4efa1c6d8e8c204e77ce78377db822b2f8c5ea816691096f37ce9ee13715cc5fba5dafbba9548a015841ebb3927183d73c6ace7b05fb106f7a3f8a8403980ceb6d6d0838c9908cb901133c0d9dba4e4511c4182f5a2ab50f331ae7578ec26735c0bbae0f34ea1354ad83b69e122f0189aa3fc95cdb5569c31d0b00b98d5867231fb2f1a12aadb30ac0ad00ea5e64c72ee0059a60505db4a2c3a27b0d2850d9317a89b4b0351433e0b1e20798a9559178f261c675498c860e9f8d9563010185a4f8aa5bbe6b82cf50edbf979acb4ad69ffe6ef83e322b005df907f96f7c2ec73c60714bfa15cace14ea870feb0e9193619ec86324f942080843c45529f60171445d2489e7907fc8b7b09ac5c9739f63a0027c5eaddffaf91a602d4754809884595e4e9c049ee302e728559fa226ebf263375a94fd939ca0568633f26053b72c99b36cbfa45c9c51e2d14b783154ee927ba832f83858094776a0e446cbe90aa94d2af4fb96b3e8600f4aa4388ab79299db03262be193d3abf376269d06f1ee6226a1ab5f16acc330fb53748268971f84fa06002f492552455ec56b3daf2b2f35abf3b6bf94cf5a455bdeacc2a8f68f9f31fe877c91845fe106566a71b1e6e48749cb46e5d2dda7fdf9c4ae5d0d06143d117a5955f166ae7cbe67525197920a2c8e3e7e2a5e7cadad86c9ab27de8de7a49d81e36d9848874e4fd3876988ad1abae95cfd7257b0e751e3565f0d715e086b5e7a371530e2d9787485cc0268ec1da02719a6e45511ad685b1b4e6dd400c131a18cc588616d506453d1d1a03ccec28b95e6259020e335e602317b5052b924a2f2bf21f55226d5ad6d8f2c1216aab4fae165c49076b48847bf35191bc4841bbda20305865237bd47a7cde9957f9083f25438a2e1d5462de4f44561da2f8885b59e8160266511cd22ab2aedf89600940ae2570e48e8e9b21b5661f168db59696447700be619bf74697866c5f4416b6dc55ffdac86b18ba7a49e9a1cf893e0f86e317984a3c128376b1b04c557ea556d475cd47c0a709f19a93d5b683cb00c69390c83c8de8abc2140613934b8502f57291f2736a392bc8c67f031eb2002de4e93bd5b2372bbe446f5f160fbc20e82d3bd5408d5f570b3a23a66242d66dda3b2bdae9601e51670220b515314bdda02d80da212d8cf9e2c3b655edad1ccaece62341a5e595a9962fb3e39c696a546643a78f027391995d1ff9d5e0854f595a60e550d6db4626071bd92b7ec8c7d9c5d18751be0af1a25353aa47ffd6d8bcc6b92e739aedda08571e6747b3837c23dd6a52f78fb410472f163bff3e6931f4d74a30fa3155f4690e23128bc3ab8cd51d602b69f4c7b929a022f73a42caf40bbe40548c886198e2a8527ab2ac52723fa72431f0fdcd8ab40845932ce9f973dff09da674d5cf3c52fd2e4787e98891767df32052cb3436d9de4f18d2f0dfbedaeefbe99179693d837f29d92ce6ab39d06e765885ef430f65053e230ba9fcdf8c822cff527bd5ec75c2f205091b885b508d7c040ec2cb06051b42db8c50c8ae33bc1a7658f85807118156a7b38e6445a79c9894b8117c0b11b80c4de9488d418035ecf88e3274c69fc7f5a64131a0abdd1b356356eb44219841dda08be064a607e6d9eb9f1e169007775a98e86519d9a5a9ef728dd5f4efe93cb57f8b5f6889a8b5279a7deaaf0933b489ec13f2008a9c9f27f847567b5d5fb1939e06dc5467d516d83b4c9a4c2cdca5749c7418db22ee13fd659717b67fec4487a2be08caf46ac7037d1a07ff33dbd1db6f45dac882d4e8304ccbe5ba5dcaed1ee3ada70016470d143798528a96d2d124e69f3e5024d590ca50e86b42d4553df973c2cdb53478dff559701e397f21e87cf0d458ff7a85e256a1cc9a3b7df6675d86dbc09f545b16210ccc4a4fb4b2c83049ee209b4db1282eac68cb639232d948d6abd24065738b86d3696b48a8ca55276c64f904ad29ad70c1381c91cbd2daea9b0983080d861946104cb70996899a6192b6bc2b42463566b30dcdaa0f73cb2db0859582e4c68bcc3118726b9d8618f0981cf4c9bdefeb5db79cf07c486753ad5fcd99425ae5fd8577ce239da2647a8abe1dcea42e2da69d29f9568bee803050bc9c4af197e8a742700084f2bed60babce554285edd2d519fa0dce184663f20cdbaeae0cbd591e192b7e21d9246ced00a9a75934d533a7387e2b5f0cb336f4c95f2869325ce215e457d84a04247da7b7ac20143ff5db9c11e5573da9ee88677ca8d9cdccde6a2388cb779bd68e7a24aee570645115d24e3773d80081299202e00239cede753cac12bf25d209e6115cb274bc560b10d4eae40cc3ad7aaead0879331560d8903055adc33d0e09078ec5dff4b691df589b021d54d218be0fb2cb76ede27e6a5efe61abbfac65d5bc91c973e13eeadb29805e208442947e7c559365d9e1a93649f2dce4ebea10b71b0f5cf9ef916d4520751b60dc62134436e3411a159f8174ab1407923d4710e69365dbc83821b5239641d71acf46f474dbfa8c8b372dbecb2ea2fa6f96e5bcd84bfbedde20ceae39a85d81166182fa7e38d5ff8c0686fbc009eb0be38418788ce958aa913e77048c2170df7a7c6f8fcaf168044976b5ea09aabcdf1a2bed567184bf64d6c183a24fa0c79b6f54b031f9a07c99085c8c707a9823e686cfc6629653fbb7e980418af3b30606fdfb2b68a65e230bd07542728a83f0c944542afd2d9c9729f94d8b15db5d7387f7795d798cff6eeb4bbbb456e63a6ebc0fea9f22cd70d8e214640e7ecc1b872c0d148b0ff70896d9a01eb37f4f4eb506328af08b3c48d17dffc9d3e5575ff7639e1d087cdc", 0x1000}, {&(0x7f0000004880)="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", 0xfa}, {&(0x7f0000004980)="ea514bb0152aab7687b5a426db2c11836a4ed5efad9552f116ce5710fec6527c5b984732b74f3c29c21c8c3a6705e0afb123d174cb38a9ce1a", 0x39}, {&(0x7f00000049c0)="4bc6c02de78e59c4065262406d98feec9c1d3e7d149b9899de19ff307e3b06be5bf8c9568024cd765d2b49d63ef542c67dedc137cde8e2e188e4adffdd4ce282966f753c492c894c005d84697ad6ef6cbfe4d25199c255ec0d33aa38bd2ad54248e8f4c32b651b83c9ab75ca31b923e07d2abbbd6e78d9038e16769556b54367cd661021f5284f516cda932b24453b2d9cf2", 0x92}], 0x8, &(0x7f0000004b00)={0xd0, 0x107, 0x7, "e1f05103a00ed4839f2b785d2c999e8f9f0f75f74a817446175c3926d826a0fa0fc695189b8df21a1335be8fcfff4280ec7dee3df36507d0144a983c2a0509ea0eac1e8354b810f1569a90a3047b8d60d3dd41b02094c2543eadac40351c58b0ee29a1c677fce8458bc4f0274a88f883217bcd82d70309ff648e2397eba9c238d0361cf418fac7730e929b0c7795cb6a3967b452c8a19628c5f99e4827ef04b7bab0e1d2700e1b96607530af2c7e9721ea5514c4480170303451"}, 0xd0, 0x4004}, {&(0x7f0000004c00)={0x27, 0x1, 0x0, 0x0, 0xffff, 0x8854, "00bb2291c8d717df078df7b3ea5d0905be672eb4b01f0afbef09a7b16fabfa1f6327a190d9ce77595f44e6d615b79ba7dec78df6746300e2db2d1e7146deea", 0xd}, 0x60, &(0x7f0000004cc0)=[{&(0x7f0000004c80)="9abffb69e56d9cdb4828b1f8f5cb254811376663829c188111df1b0be4e61db4941e4b", 0x23}], 0x1, 0x0, 0x0, 0x4000}, {&(0x7f0000004d00)={0x27, 0x0, 0x1, 0x7, 0x7, 0x200, "5c885a6d054d8ed82164e6daab311d347205ec11ee5a4a15a34e43623177dcf71248059c651648fe40305f69ac99c14a657ba444fd2f70f8b1ed8551b12044", 0x11}, 0x60, &(0x7f0000005100)=[{&(0x7f0000004d80)="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", 0xfb}, {&(0x7f0000004e80)="0ade019f4ae6bb8fe49b644b0458fc8af1507eba5b32fe78df8f754e8dae90432c9d70170e9d5a3e13fa110d4023e864b070b9f56c99b0475526e8cbf5e24ca8dea682ce099e53dcfc99f0bf26eaa79469d1187c8d5550e4304d9c312fd9cff425ce94a6cf965cff310ce26caa260985d0b9fd336348a5594b92c6aefd43dc9f5b07635dee0186a47e285fe5a69e9cb438838d1fb66cb469b79c8928d53750e0b14be857cc02d7da9a5e38028e45fd2269344474d459fff2b0b6efe0413bb4a2f39026e9d6e91fc66ffc01be3b0069e59301370aa284bb3c1fc6467de5a8957a29cb8ddd34c68d", 0xe7}, {&(0x7f0000004f80)="00c6e9c398e5ec9fd832a13d2e32c2bf4a9be206894bb5de04ce833b2ecbf0039da55fd8fb66112fff4c7ba66e16fde9e9f32325bde2659d829ceece38eb8aceeac06430fcd4a65e144d0e20e660da7810590b815448ce5c097a3fd114558b525558c3a6cfd1f990c7c7c3218506fbbcd959946754008f02b27df82e31d55a1a4c272a875dab", 0x86}, {&(0x7f0000005040)="160cf4b08e9d30b96a489841afd48bbee292e2fb3519518e0ab17e327e6a6f6120df5bef04feddd919de0e8ad7abc9bbceab539b91d5b47a327fd184def1dd9183beab4ad1cdc4fa5d66f5d8ec41fd74d153c520ba43d2906d64ecc1588b969028b559d57e4e3dc397cef8850214aab2e556dc86a7a63da08ec41da871b785772b8d6cd112edd0bbe67e2556b773c5cb536a07f870bfa21eaa226788d294b4b12c497f4bdc10", 0xa6}], 0x4, 0x0, 0x0, 0x4080}, {&(0x7f0000005140)={0x27, 0x0, 0x1, 0x7, 0x80000001, 0x0, "87e6766734c133adc6ff3597dc807d3a5623bc238e3275fd8dd9b0fb2f11ad7eb169a26007ddb190f146510ebc0eb0f7a71164d069d9d5bbcb8a489d84b4b3", 0x2c}, 0x60, &(0x7f0000005380)=[{&(0x7f00000051c0)="802a7b4329505b021c83ecfe271124ec3e6bbe3337eb9def9d000485a2f3a8c3454923fb37cbdf71e6a90b4fc5aaac8584611a1aaa7cddaf31a583707ba8a53e31d71af81f6c4d0a818db0418c1d60eff47f293bfd54a6ad2369356bacbd86a2ca69510b463e43306575c615fd5abca0dc432e64476c7125d2492b7c48c0ecb73aa0ad69f9a927ae835fe5d60a", 0x8d}, {&(0x7f0000005280)="9e88156945bad811614b2f548f40026c40056ae8aabe4ba903e815d50640ed999d6af736e37829e032b9523c9beceffa25407677bc4aa5c00317c7bdf97bde3a6660bcac0547275ac8ee0b71639e08af48abb71b94ae538c532b036f7356e4d3ababdce8e331df4e91cd0ad28f72e85deb92d59ac70d3d9908487be279cb4f2a07c0fb9098b4a3b15be02abccf21a1ebb3018c443a33a776483167598632f65a413e7755d092e62c98103168faf217539b9055cba947ac971a79", 0xba}, {&(0x7f0000005340)="4f346321c3b9152d39bddb15330be3bff68dc10fd3da193ffc3180c70177bf", 0x1f}], 0x3, &(0x7f00000053c0)={0x58, 0x118, 0x7071, "4bf4ef384e249bee783614316b82393f04688abe60898d66ce243d7cb81ce84ca72e9512f2e253e1ebe793f79ca83043b457a4eab55197e2f18f51fbeb38c806be46bec665c52b"}, 0x58, 0xc0}, {&(0x7f0000005440)={0x27, 0x0, 0x1, 0x7, 0x8, 0x5, "98d46c96751956a0f83457f993b71a917f171904540b0f8bc49eafde36820a22b1648695331c5d803e74715a3bf542e2af622caa85fa52b455d732e4d1ddb7", 0x35}, 0x60, &(0x7f0000006900)=[{&(0x7f00000054c0)="af53fac2599fd741b368f1361f6635634f056eccfdf2428f9b074ff8888f32f6e991a9aa3bb640dcb48e9d06e365893cda5f023132f5e3e2cb2cce071104ddebce80cb871ab3eb1bcc8a9470f4b87c8dd9676e340cf5a174bcaf3fb699f413c4621105a9baad0ec9ef38a385853a7148fe46cc29d8c48e8507710c8fdf408e411b06de9bf072dd46b51ea3a22830d3826161fe", 0x93}, {&(0x7f0000005580)="035ea3a9f3901e36bbf61b2df22e286ae0c6ec5bfbfa4118", 0x18}, {&(0x7f00000055c0)="2250fb88cbf248cf187d1924c161274c82b80928f875051572015ec414eba237400f68be5b7f18b584fc8bef88b4a5d06931731ef611ac8ac70baad8a726fe778822f8eebdc0eac88c6731ff99dbafa021ef4241569f30657cb57c15ed0269e6da566935af83aaec5e45da1a514684f5", 0x70}, {&(0x7f0000005640)="5b6fdba07a2edde9c095ccccfe310d8b2406066ae475892d9e97093a97ba89be015396cf96ccb9134144ac533300e7240d4daa465c0a02e941879fa826ea98d7", 0x40}, {&(0x7f0000005680)="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", 0x1000}, {&(0x7f0000006680)="a52144dc8ff522214a929c4b53f4b7fd2bd5cb2abffcf6515b61cfc99f21df7e5a54409f8818245a344cfcd843c9f85d7724416d693bec70b0469748ee6fe3a5087cb9ceeae33a39afb4bbbc8afb30ee6b61f994f242be38a1109ee94b0ae79978bef9f2de50915e4a9a51f1869fcf47469fd062c73eea084f755e7230ca6de6535b37d5f6270248c0ec766a15c7e18e52f29a06148fc593dadeeb805b321f86195d9299594fe4a44bfae11e296c4163420dc3848a59523d9ee0", 0xba}, {&(0x7f0000006740)="0331ae010197e5b2a9765b5ae6aacd766775e6cb6ed1a2e8823204ca2dc20960fabd75c36aabe55287ee588e9b38e0cc681c4a3254805fa30865c7b48cb5de0e7fc151adbe61a940776750a21818e5adf79662a51afbeffe7447de70009888c71365dda220dd506f496aa7ff0939e7ef70a70b83b18b8c81aed2c02fff32a185d86b60934fc656", 0x87}, {&(0x7f0000006800)="b526b0beb3a6cbc8a05ff3a8a5b2326ce6a040da95816221b32ae9f6501e371fbe05818264028ffe16a3a54c1ec3e0d64d1a6c323ccb8dc4ad00d7ae5954cd3b59cef8134ad30e4df83fa8824c99fd917c5182b9c4de960494a2b371877f6b877e8754a2eb6912fc7040f03cc12e67370d40182124a887666019b98f1894a1b0b499884d3a33657e0277429dc2a5", 0x8e}, {&(0x7f00000068c0)="10aa2a752c3c584f58fc", 0xa}], 0x9, &(0x7f00000069c0)={0xb8, 0x197, 0x20, "7152ee552d636bd6d7ec660eb361d12e665cd46bbeef2e46c85a7fc3b076bf1b52b249e9b45a7d9f0462b484ccb0d58da29f191d395ace40db810078c03fe35323ab831a5c7b9509a035e8a3f8615742c6dd55142a72bb63149e5a9fad9b8162fd90a2866ec2a3cf379ad454b7783d8c2e8a39604d89f613b54d14897a20d44b2185e20d596be444d436e83a0a9a16447506c3eb3cd142451895403eeba0664102bab7b456"}, 0xb8, 0x4000}, {&(0x7f0000006a80)={0x27, 0x0, 0x1, 0x7, 0x6, 0x3, "e21a11bfc582a89109a8c478ceac00ea1c57567eaa002af8fb7e05a14cd25eaf1793e9a819c2f78615403d0ecaaa42f3036082f8e4689112b707b8c139955a", 0xc}, 0x60, &(0x7f0000006ec0)=[{&(0x7f0000006b00)="52983a26ef61313ea3ad93191eb66a8d826cbf8713f872d0da1d97218d91b92730b4222c1f878795b94efa72dfee9c5d8fe1a305b493626f59065b78c3208cc7cd4cb0fcf4ada89bb05785173650469ea6c2e9d364a48b06ab42c5b36710f527042b88be92cdabe1b3c4b811c55341ef17036d664682ffb8bb888459bc3a912ded900bf670c58209a96909cdb8ca4e72247f8c98", 0x94}, {&(0x7f0000006bc0)="23f5659c5f19e8cd835813491d9e289f9cbad8810aa2c0a6e0c2b059eded659be9fca9aa118a407cf5684f1a7a58a6fbe7", 0x31}, {&(0x7f0000006c00)="dacdd5368925cf84af44712591d879f93d42ce8d539a8c7ae0fcb1917b246b45b04af3d741a36c5db37b82cc0a776bbd33fe2119b5327a859791d8b33bb50345e30c965644f56b51ca3f8302e2f23c36e154521ce990faaf5c4ab8c974dbebc8c296b9cd117688b16e1f52d71547e085a5f980a1175accf296b978b2453660d601e9150ee1f431b787d3e013b74e1129b37e9225b15c95f02f9cbe234fb62202e1051a59dedb5fa928c2f58230ae639a45b3656c5f2871d1ae41c8837778fb6cd87d67bdac8969261596a6ad26010bc14c93951f639c963aefac3783d1d191e7ff5ca98a54f11ab6195538fdf354", 0xee}, {&(0x7f0000006d00)="392cf9072d4ba76da23b7a2564", 0xd}, {&(0x7f0000006d40)="3310238a4ed3335f4f8f8f35f2a7f53350d49922c5f711c9c8d9b1647d79df3b3ffd8541a90f85f14d2b85c8bc557883f40a035cb19908a51745c071320791fb21f572c42b61b468b2a39879bd5d944f8cd10f25f1f5566e229502ade21c34316059f368bbeeaac7f03461e337d272dd02d3c897bcb87cb4cfa14bbc7dd9f33cacb241dbadb59c9de3bc207473f747c3d1c8aa617a2f58a7e8051eb764e22a476ae820a71d1c1d03280e8ffe6c4d438f72bf418a93fe8bc9af4a8a3b7ea8d579344fc2fc40cc778641a437dc7ed4732ff8092f8bf83a651ac23f415d7e8723f79cd933c62585699e93373e2e1497444f0f51d08f80", 0xf5}, {&(0x7f0000006e40)="e7011ab0b80c43da617b1c110a9bb2edf0a1f336aee8763a2fc43d111b59caa424d298389ffb74aefe9e46bda1518faaf2f9fca7c919d8f8230d80de55f32d231aedc83fa03d601a44", 0x49}], 0x6, &(0x7f0000006f40)={0xd0, 0x103, 0x5, "1bdc191c3c9eeadb1345dc0d0fad8ba559ac376224c25a34f475a59adf4727da26dc5a7700edac8ef536cfa67881af864e7d83bdd1d9156b041a6cf7379cabc3273b0cf25dc5677355334c2e7697f7d578b9db545a270c9fcccbfa972aebe711f39ac47f9986d2b0a2cd7867bcf2836ae93410da4940d1b813446dab1b875fd21c044ecff9d5671dc8336230fef3ea6e3d54d65d4507eb24bdb0c238fbd6f6906fa73ba189c18a905c16b5055db787f45016784a696930acee29a29b3f"}, 0xd0, 0x4}, {&(0x7f0000007040)={0x27, 0x1, 0x2, 0x1, 0x100000000, 0x3f, "604708431d02e253db413be275cace39b11835a2ad6272f90c0d825c17e11d72b64b99473ea31911b477293185d892da99d24c2c602839ae47a52b9d9ee37d", 0x1d}, 0x60, &(0x7f0000008540)=[{&(0x7f00000070c0)="a55305189a75852f569e7a271dd2fe4a6bdbc70177c7d436c7050dbf833cf70ddecab9372ee8d08a92d50a9cffd10e10b5330c086725694dfe95233a1c2d2c99ca2d28cc24d88def8d9f4d94699b1ed5bb3c5c1112ae12d88d718ff93d4c6743ddab0f40fb813bb014d365d146ed1e685d668418a725f06865531557ab3d198d5b739aefa58aa969a8ac791add14ecb5f34294a6eb0aaaf3c3ab7af252e6caa4b070e9cc864602ca1a11fa", 0xab}, {&(0x7f0000007180)="ed509740a64ab9fcd1786902df5c31a08c3077226758e4e277e42868bd7ad57320a4df657e002886733de2ecd256f48376c79929b690ac14634fadb4c3a268cb24bb867b50d301106971449278ebc9fd36d78279c1fddd267c7b8672bbb03266703875bf2cfe3ba8f664844acb9e410a9a3eeaa93ce24513b29a43d18b03ca376bb529bbe3d573ccd2ab9ed8b118abac5db369626a6f2d2a", 0x98}, {&(0x7f0000007240)="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", 0x1000}, {&(0x7f0000008240)="9b1e9ad9ee0be228e9300bd0157b9491350fd2adf989fee0109988850ef998a0d0a393d387c08b08b1ada1cd838297e23c8b1b4671ce06f4ac6ed564466e59caa3eb8ed49faeb1d109f2b0d85d50f267b1b516300e6ee05d0c3c639cbe64fc4ddafe03dbcf3e5201e93a768af64b10f4ae89d403e35759a281c652eacbd355431794062b230cd6eb96fae6ccd8", 0x8d}, {&(0x7f0000008300)="6e66bc198268caeca89382a24549943a09cd", 0x12}, {&(0x7f0000008340)="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", 0xff}, {&(0x7f0000008440)="bf6a0b846e59ceec720deb0e1a0110e1aab80f43b9ecc8ec3365cb8618b965091c41f8fce132006c236a1c5cc4dd7f8768bd278c7bba83a2ae54090d5ab637d45c57c83aa1337c863b89caddcf6e8d6b3e19ec218c7af1821cc761b58a3f82e9ce9c45a966e5d073554048549781b98680e2d3cc5482adbcb52d0adbcca82663d44d124186735779845c6ce594ff734a27e7bf1fdf1460c672f2d5afbe", 0x9d}, {&(0x7f0000008500)="b150b35dcab2daab5c601bfd5cf3d41c1b476aaf", 0x14}], 0x8, &(0x7f00000085c0)={0xb0, 0x10b, 0x80000001, "e59228c73219456989cd1eab29dd7ecb9a71da3263f608e8d35071887d827e87d89719227e3ba212136dcd18cf2b1974ac572c0af95718b36553242e851035c7d90e4c29d1426ede3b5d566c74a9fccda843d3561cc77110c6de585411cbe52f9a3904fdbd9bbc39cf6a6f13088be393e3c7b4884483b771477fd1b36b1e63a4f364c91895101510238fc380237defda6b80ebc8b68f09d03a"}, 0xb0, 0x90}], 0x8, 0x44810) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000380)={0x0, 0x0, 0x2080}) 15:13:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xb8040000]}}, 0x1c) 15:13:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$BLKPG(r0, 0x1269, &(0x7f0000000080)={0x80000000, 0x3166, 0x58, &(0x7f0000000140)="11dcd6a0b7da5f9760de57ebf9f82434ed9bfd7522a601d2cacf2ba1a4e590cf4471735bbcdcc0b09917707bfff8208b9a9c85e94dc9c61a1f4c22c7f157c39ab3e7fa61af9b95d72f7c6351320dcb8a80315b3e7fca7492"}) open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:16 executing program 5 (fault-call:1 fault-nth:1): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3}) [ 792.876799] FAULT_INJECTION: forcing a failure. [ 792.876799] name failslab, interval 1, probability 0, space 0, times 0 [ 792.878976] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 792.917312] CPU: 0 PID: 11514 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #27 [ 792.924654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.934049] Call Trace: [ 792.936661] dump_stack+0x1c4/0x2b4 [ 792.940322] ? dump_stack_print_info.cold.2+0x52/0x52 [ 792.945536] ? perf_trace_lock+0x14d/0x7a0 [ 792.949788] ? graph_lock+0x170/0x170 [ 792.953711] should_fail.cold.4+0xa/0x17 [ 792.957810] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 792.962938] ? graph_lock+0x170/0x170 [ 792.962971] ? graph_lock+0x170/0x170 [ 792.963015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.963035] ? check_preemption_disabled+0x48/0x200 [ 792.970654] ? check_preemption_disabled+0x48/0x200 [ 792.970677] ? find_held_lock+0x36/0x1c0 [ 792.970707] ? proc_control+0x831/0xef0 [ 792.970741] ? ___might_sleep+0x1ed/0x300 [ 792.970760] ? arch_local_save_flags+0x40/0x40 [ 792.970781] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 793.008599] ? find_held_lock+0x36/0x1c0 [ 793.012687] __should_failslab+0x124/0x180 [ 793.016936] should_failslab+0x9/0x14 [ 793.020762] kmem_cache_alloc_trace+0x2d7/0x750 [ 793.025458] ? lock_release+0x970/0x970 [ 793.029452] ? arch_local_save_flags+0x40/0x40 [ 793.034066] usb_control_msg+0xc4/0x4e0 [ 793.038066] ? usb_start_wait_urb+0x5a0/0x5a0 [ 793.042576] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 793.048169] proc_control+0x99b/0xef0 [ 793.052045] ? proc_bulk+0xa70/0xa70 [ 793.055795] usbdev_do_ioctl+0x1eb8/0x3b50 [ 793.060059] ? processcompl_compat+0x680/0x680 [ 793.064669] ? zap_class+0x640/0x640 [ 793.068421] ? mark_held_locks+0x130/0x130 [ 793.072693] ? zap_class+0x640/0x640 [ 793.076448] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 793.081651] ? graph_lock+0x170/0x170 [ 793.085472] ? zap_class+0x640/0x640 [ 793.089204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.094756] ? check_preemption_disabled+0x48/0x200 [ 793.099797] ? check_preemption_disabled+0x48/0x200 [ 793.104867] ? find_held_lock+0x36/0x1c0 [ 793.108955] ? avc_has_extended_perms+0x8cb/0x15a0 [ 793.113920] ? lock_downgrade+0x900/0x900 [ 793.118095] ? check_preemption_disabled+0x48/0x200 [ 793.123135] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 793.128950] ? kasan_check_read+0x11/0x20 [ 793.129930] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor1' sets config #160 [ 793.133138] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 793.133159] ? rcu_bh_qs+0xc0/0xc0 [ 793.133192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.133218] ? avc_has_extended_perms+0xab2/0x15a0 [ 793.161239] ? avc_ss_reset+0x190/0x190 [ 793.165237] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 793.171052] ? kasan_check_read+0x11/0x20 [ 793.175225] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 793.180543] ? rcu_bh_qs+0xc0/0xc0 [ 793.184134] ? ___might_sleep+0x1ed/0x300 [ 793.188306] ? arch_local_save_flags+0x40/0x40 [ 793.192914] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 793.197870] usbdev_ioctl+0x25/0x30 [ 793.201508] ? usbdev_compat_ioctl+0x30/0x30 [ 793.205958] do_vfs_ioctl+0x1de/0x1720 [ 793.209882] ? ioctl_preallocate+0x300/0x300 [ 793.214318] ? selinux_file_mprotect+0x620/0x620 [ 793.219105] ? __sb_end_write+0xd9/0x110 [ 793.223199] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 793.228766] ? fput+0x130/0x1a0 [ 793.232066] ? do_syscall_64+0x9a/0x820 [ 793.236059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.241613] ? security_file_ioctl+0x94/0xc0 [ 793.246048] ksys_ioctl+0xa9/0xd0 [ 793.249520] __x64_sys_ioctl+0x73/0xb0 [ 793.253427] do_syscall_64+0x1b9/0x820 [ 793.257359] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 793.262744] ? syscall_return_slowpath+0x5e0/0x5e0 [ 793.267690] ? trace_hardirqs_on_caller+0x310/0x310 [ 793.272727] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 793.277773] ? recalc_sigpending_tsk+0x180/0x180 [ 793.282549] ? kasan_check_write+0x14/0x20 [ 793.286805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 793.291678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.296876] RIP: 0033:0x457679 [ 793.300087] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:13:16 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5421, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:16 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x551f, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:16 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045503, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:17 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:17 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc00c5512, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:17 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004551e, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:17 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80085504, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:17 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105512, &(0x7f0000000000)) 15:13:17 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000080)={0xa0, 0x2000000}) [ 793.319029] RSP: 002b:00007f3d4e732c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 793.326752] RAX: ffffffffffffffda RBX: 00007f3d4e7336d4 RCX: 0000000000457679 [ 793.326762] RDX: 0000000020000000 RSI: 00000000c0185500 RDI: 0000000000000003 [ 793.326771] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 793.326779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 793.326788] R13: 00000000004cf508 R14: 00000000004bf7f2 R15: 0000000000000001 15:13:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x1400]}}, 0x1c) 15:13:17 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r2, 0x5, 0x30, 0x7fff, 0xc5}, &(0x7f00000001c0)=0x18) mincore(&(0x7f0000002000/0x4000)=nil, 0x4000, &(0x7f0000001300)=""/4096) r3 = semget(0x2, 0x2, 0x40) semctl$GETPID(r3, 0x0, 0xb, &(0x7f0000000080)=""/188) 15:13:17 executing program 5 (fault-call:1 fault-nth:2): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3}) 15:13:17 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8008550e, &(0x7f0000000000)) 15:13:17 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185503, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x101, 0x0, &(0x7f0000000080), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x100000000}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0xb4}, 0x8) [ 793.728351] FAULT_INJECTION: forcing a failure. [ 793.728351] name failslab, interval 1, probability 0, space 0, times 0 [ 793.751072] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 793.777136] CPU: 1 PID: 11560 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #27 [ 793.784458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 793.793833] Call Trace: [ 793.796441] dump_stack+0x1c4/0x2b4 [ 793.800097] ? dump_stack_print_info.cold.2+0x52/0x52 [ 793.805323] ? kernel_text_address+0x79/0xf0 [ 793.809769] should_fail.cold.4+0xa/0x17 [ 793.813856] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 793.819005] ? save_stack+0xa9/0xd0 [ 793.822649] ? save_stack+0x43/0xd0 [ 793.822680] ? kmem_cache_alloc_trace+0x152/0x750 [ 793.822695] ? usb_control_msg+0xc4/0x4e0 [ 793.822724] ? proc_control+0x99b/0xef0 [ 793.822749] ? usbdev_do_ioctl+0x1eb8/0x3b50 [ 793.822765] ? usbdev_ioctl+0x25/0x30 [ 793.831229] ? do_vfs_ioctl+0x1de/0x1720 [ 793.831244] ? ksys_ioctl+0xa9/0xd0 [ 793.831258] ? __x64_sys_ioctl+0x73/0xb0 [ 793.831275] ? do_syscall_64+0x1b9/0x820 [ 793.831292] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.831314] ? find_held_lock+0x36/0x1c0 [ 793.831354] ? ___might_sleep+0x1ed/0x300 [ 793.831372] ? arch_local_save_flags+0x40/0x40 [ 793.831391] ? rcu_lockdep_current_cpu_online+0x1f0/0x2d0 [ 793.831408] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 793.831433] __should_failslab+0x124/0x180 [ 793.831470] should_failslab+0x9/0x14 [ 793.831498] __kmalloc+0x2d4/0x760 [ 793.831537] ? rcu_read_lock_sched_held+0x108/0x120 [ 793.831554] ? kmem_cache_alloc_trace+0x353/0x750 [ 793.831583] ? usb_alloc_urb+0x24/0x50 [ 793.887371] ? arch_local_save_flags+0x40/0x40 [ 793.887408] usb_alloc_urb+0x24/0x50 [ 793.887437] usb_control_msg+0x1dd/0x4e0 [ 793.887480] ? usb_start_wait_urb+0x5a0/0x5a0 [ 793.887496] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 793.887564] proc_control+0x99b/0xef0 [ 793.897067] ? retint_kernel+0x2d/0x2d [ 793.909434] ? proc_bulk+0xa70/0xa70 [ 793.909466] usbdev_do_ioctl+0x1eb8/0x3b50 [ 793.909489] ? processcompl_compat+0x680/0x680 [ 793.909523] ? zap_class+0x640/0x640 [ 793.964536] ? mark_held_locks+0x130/0x130 [ 793.968796] ? zap_class+0x640/0x640 [ 793.972532] ? __lock_acquire+0x7ec/0x4ec0 [ 793.976782] ? graph_lock+0x170/0x170 [ 793.980598] ? zap_class+0x640/0x640 [ 793.984332] ? dput.part.26+0x26d/0x790 [ 793.988319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.993882] ? check_preemption_disabled+0x48/0x200 [ 793.998921] ? check_preemption_disabled+0x48/0x200 [ 794.003982] ? find_held_lock+0x36/0x1c0 [ 794.008074] ? avc_has_extended_perms+0x8cb/0x15a0 [ 794.013028] ? lock_downgrade+0x900/0x900 [ 794.017187] ? check_preemption_disabled+0x48/0x200 [ 794.022222] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 15:13:17 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40087602, &(0x7f0000000080)={0xa0, 0x2000000}) 15:13:17 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0045878, &(0x7f0000000000)) 15:13:17 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001680)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000001780)=0xe8) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x10001, 0x5, &(0x7f0000001600)=[{&(0x7f0000000100)="b81f041d0b091110", 0x8, 0x9}, {&(0x7f0000000600)="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", 0x1000, 0x8}, {&(0x7f0000000380)="9e6f7ba7ee8a03f238ec510751a5ab45c56da4dc77fa693491836a2151011283651ccb9ab7939868d7379934dcd36ba774b9a0100dd446f28323ecd549d8cf081018c32627cf3cc0d89e4c82b27eb1a05324616a4a945b1d4403bbda415e0f1f68e8fdd522969dda964df4a976e0e7ccb32c35fb2c9a8f96b043c3d5837bdf641111f177a38e2fca3dc836900ce96bbca4827cd422ef9365ee1a39a5ed4590b2", 0xa0}, {&(0x7f0000000440)="5f2a21c558970d31c9e6141831d344505a03b7856eb79674f7dceb4241842144997ef3ca5f745bdaa4324ff42738fbd413f70c97102c85cd4b4f438293fd0473ce779065a2846c5774b1710470da9cbb57ef99c956eca9c13b759f97be6653ea0402d1d35be706a9c45e7b9150d36b7c0e4ea2903967cb2423e023ac840cc1bc4b4bae58e17be8077c7f0b9c9f41dc3488d136b8e1b98f0471e31bd355615c42e842542078ba342a330b16e66991b29b6a884ac0459ac7f167ba25811dc9404b45b22b693717afd9da40f5d5924596c6bc18c856f5bf1b", 0xd7}, {&(0x7f0000000240), 0x0, 0x1}], 0x10000, &(0x7f00000017c0)={[{@map_off='map=off'}, {@iocharset={'iocharset', 0x3d, 'iso8859-14'}}, {@unhide='unhide'}, {@uid={'uid', 0x3d, r0}}, {@mode={'mode', 0x3d, 0xf9}}, {@check_strict='check=strict'}]}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000001840)='/dev/bus/usb/00#/00#\x00', 0x4, 0x400400) ioctl$RTC_WIE_ON(r2, 0x700f) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x9, 0x2000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x8, &(0x7f0000000000)=0xffffffffffffffff, 0x223) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000001880)=0x3, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000002c0)={0xffffffffffffffbe, 0x1000000000004}, 0x8) listen(r5, 0x0) sendto$inet6(r4, &(0x7f0000000300), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) close(r4) ioctl$TIOCCBRK(r3, 0x5428) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_EPOCH_SET(r6, 0x4008700e, 0x255dab8f) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f6465762f6c6f6f70300052c772f22b5f969b503688e7d412217411b7a31d644127adb1f99e051bd99ee311922e6fe5bc827c59604078eaba6be1bdeeaa62a8944c954f327a73d59265d6773e97c74d3e71810416b308406081088abe33a9dc351325b3740caf3160681e4273e8a62451b8be5fae4206f9bc71c739c2c3532925f8d6f9c625d50313b368b839e145eebea8d3f45293f768b469146be7c433d8f7822014a12ace5ad15d1c63f9afa660"], &(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)='ext2\x00', 0x411, 0x0) [ 794.022241] ? kasan_check_read+0x11/0x20 [ 794.022259] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 794.022278] ? rcu_bh_qs+0xc0/0xc0 [ 794.022307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 794.022323] ? avc_has_extended_perms+0xab2/0x15a0 [ 794.022353] ? avc_ss_reset+0x190/0x190 [ 794.055569] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 794.061382] ? kasan_check_read+0x11/0x20 [ 794.065551] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 794.070849] ? rcu_bh_qs+0xc0/0xc0 [ 794.074435] ? ___might_sleep+0x1ed/0x300 15:13:18 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004551e, &(0x7f0000000000)) [ 794.078608] ? arch_local_save_flags+0x40/0x40 [ 794.083218] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 794.088171] usbdev_ioctl+0x25/0x30 [ 794.091815] ? usbdev_compat_ioctl+0x30/0x30 [ 794.096248] do_vfs_ioctl+0x1de/0x1720 [ 794.100169] ? ioctl_preallocate+0x300/0x300 [ 794.105118] ? selinux_file_mprotect+0x620/0x620 [ 794.109896] ? __sb_end_write+0xd9/0x110 [ 794.114561] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 794.120123] ? fput+0x130/0x1a0 [ 794.120143] ? do_syscall_64+0x9a/0x820 [ 794.120167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 794.120188] ? security_file_ioctl+0x94/0xc0 [ 794.137411] ksys_ioctl+0xa9/0xd0 [ 794.140913] __x64_sys_ioctl+0x73/0xb0 [ 794.144822] do_syscall_64+0x1b9/0x820 [ 794.144842] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 794.144863] ? syscall_return_slowpath+0x5e0/0x5e0 [ 794.144885] ? trace_hardirqs_on_caller+0x310/0x310 [ 794.144905] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 794.169090] ? recalc_sigpending_tsk+0x180/0x180 [ 794.173868] ? kasan_check_write+0x14/0x20 [ 794.178130] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 794.183036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.188253] RIP: 0033:0x457679 [ 794.191480] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 794.210404] RSP: 002b:00007f3d4e732c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 794.210424] RAX: ffffffffffffffda RBX: 00007f3d4e7336d4 RCX: 0000000000457679 15:13:18 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8108551b, &(0x7f0000000000)) [ 794.210434] RDX: 0000000020000000 RSI: 00000000c0185500 RDI: 0000000000000003 [ 794.210457] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 794.210466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 794.210488] R13: 00000000004cf508 R14: 00000000004bf7f2 R15: 0000000000000002 [ 794.238757] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x63]}}, 0x1c) 15:13:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x5, 0x0) shutdown(r1, 0x1) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x3, 0x0, @ipv4}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x3, @local}], 0x10) 15:13:18 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4b47, &(0x7f0000000000)) [ 794.306470] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 15:13:18 executing program 5 (fault-call:1 fault-nth:3): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3}) [ 794.452443] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:18 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x541b, &(0x7f0000000000)) [ 794.497060] FAULT_INJECTION: forcing a failure. [ 794.497060] name failslab, interval 1, probability 0, space 0, times 0 [ 794.544276] CPU: 1 PID: 11607 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #27 [ 794.551603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 794.560980] Call Trace: [ 794.563594] dump_stack+0x1c4/0x2b4 [ 794.567247] ? dump_stack_print_info.cold.2+0x52/0x52 [ 794.572492] should_fail.cold.4+0xa/0x17 [ 794.576594] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 794.581717] ? debug_smp_processor_id+0x1c/0x20 [ 794.586402] ? perf_trace_lock+0x14d/0x7a0 15:13:18 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5452, &(0x7f0000000080)={0xa0, 0x2000000}) [ 794.590657] ? mark_held_locks+0x130/0x130 [ 794.594907] ? graph_lock+0x170/0x170 [ 794.598738] ? zap_class+0x640/0x640 [ 794.602519] ? find_held_lock+0x36/0x1c0 [ 794.606624] ? ___might_sleep+0x1ed/0x300 [ 794.610788] ? arch_local_save_flags+0x40/0x40 [ 794.615385] ? usb_hcd_submit_urb+0x45d/0x22b0 [ 794.620005] ? _raw_spin_unlock_irq+0x27/0x80 [ 794.624527] __should_failslab+0x124/0x180 [ 794.628798] should_failslab+0x9/0x14 [ 794.632613] __kmalloc+0x2d4/0x760 [ 794.636176] ? kasan_check_write+0x14/0x20 [ 794.640428] ? do_raw_spin_lock+0xc1/0x200 [ 794.644678] ? usb_hcd_submit_urb+0x6f9/0x22b0 [ 794.644702] usb_hcd_submit_urb+0x6f9/0x22b0 [ 794.644720] ? save_stack+0xa9/0xd0 [ 794.653739] ? usb_create_hcd+0x40/0x40 [ 794.653755] ? ksys_ioctl+0xa9/0xd0 [ 794.653770] ? __x64_sys_ioctl+0x73/0xb0 [ 794.653787] ? do_syscall_64+0x1b9/0x820 [ 794.653803] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.653823] ? __x64_sys_ioctl+0x73/0xb0 [ 794.673156] ? do_syscall_64+0x1b9/0x820 [ 794.673174] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.673198] ? find_held_lock+0x36/0x1c0 [ 794.673220] ? __lockdep_init_map+0x105/0x590 [ 794.673246] ? __lockdep_init_map+0x105/0x590 [ 794.686730] usb_submit_urb+0x893/0x1590 [ 794.686763] usb_start_wait_urb+0x13d/0x5a0 [ 794.686777] ? usb_init_urb+0x174/0x1f0 [ 794.686803] ? sg_clean+0x240/0x240 [ 794.709269] usb_control_msg+0x332/0x4e0 [ 794.709290] ? usb_start_wait_urb+0x5a0/0x5a0 [ 794.709312] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 794.717612] proc_control+0x99b/0xef0 [ 794.717643] ? proc_bulk+0xa70/0xa70 [ 794.717698] usbdev_do_ioctl+0x1eb8/0x3b50 [ 794.717721] ? processcompl_compat+0x680/0x680 [ 794.751724] ? zap_class+0x640/0x640 [ 794.755452] ? mark_held_locks+0x130/0x130 [ 794.759716] ? zap_class+0x640/0x640 [ 794.763446] ? __lock_acquire+0x7ec/0x4ec0 [ 794.767699] ? graph_lock+0x170/0x170 [ 794.771520] ? zap_class+0x640/0x640 [ 794.775255] ? dput.part.26+0x26d/0x790 [ 794.779248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 794.784805] ? check_preemption_disabled+0x48/0x200 [ 794.789854] ? check_preemption_disabled+0x48/0x200 [ 794.794904] ? find_held_lock+0x36/0x1c0 [ 794.799003] ? avc_has_extended_perms+0x8cb/0x15a0 [ 794.803956] ? lock_downgrade+0x900/0x900 [ 794.808138] ? check_preemption_disabled+0x48/0x200 [ 794.813179] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 794.819029] ? kasan_check_read+0x11/0x20 [ 794.823198] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 794.828494] ? rcu_bh_qs+0xc0/0xc0 [ 794.832077] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 794.837647] ? avc_has_extended_perms+0xab2/0x15a0 [ 794.842590] ? avc_ss_reset+0x190/0x190 [ 794.846557] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 794.852347] ? kasan_check_read+0x11/0x20 [ 794.856498] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 794.861787] ? rcu_bh_qs+0xc0/0xc0 [ 794.865332] ? ___might_sleep+0x1ed/0x300 [ 794.869488] ? arch_local_save_flags+0x40/0x40 [ 794.874087] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 794.879012] usbdev_ioctl+0x25/0x30 [ 794.882643] ? usbdev_compat_ioctl+0x30/0x30 [ 794.887065] do_vfs_ioctl+0x1de/0x1720 [ 794.890968] ? ioctl_preallocate+0x300/0x300 [ 794.895373] ? selinux_file_mprotect+0x620/0x620 [ 794.900138] ? __sb_end_write+0xd9/0x110 [ 794.904204] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 794.909738] ? fput+0x130/0x1a0 [ 794.913021] ? do_syscall_64+0x9a/0x820 [ 794.917105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 794.922692] ? security_file_ioctl+0x94/0xc0 [ 794.927095] ksys_ioctl+0xa9/0xd0 [ 794.930554] __x64_sys_ioctl+0x73/0xb0 [ 794.934462] do_syscall_64+0x1b9/0x820 [ 794.938389] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 794.943762] ? syscall_return_slowpath+0x5e0/0x5e0 [ 794.948682] ? trace_hardirqs_on_caller+0x310/0x310 [ 794.953774] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 794.958791] ? recalc_sigpending_tsk+0x180/0x180 [ 794.963537] ? kasan_check_write+0x14/0x20 [ 794.967765] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 794.972606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.977781] RIP: 0033:0x457679 [ 794.980986] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 795.000165] RSP: 002b:00007f3d4e732c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 795.007881] RAX: ffffffffffffffda RBX: 00007f3d4e7336d4 RCX: 0000000000457679 [ 795.015138] RDX: 0000000020000000 RSI: 00000000c0185500 RDI: 0000000000000003 [ 795.022394] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 795.029660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 795.036939] R13: 00000000004cf508 R14: 00000000004bf7f2 R15: 0000000000000003 15:13:19 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="e5f5d47e1c8e2f73213e7fdf3d35178da6e43da98f67bbe031a46cff757bdfa7cd32e9d5729478a6a87c0614aabed7d8f4eca07bf194c44f1d9d697342104efa023f91cce59c01087d5221b898fc26cbf12bf959f78c29f431b7985cbc66ced909bbf87c753a3499e182d5a8b6906283ca6917b5306756a7c89040a01af09026e33c4876414ebb83c1daf56e3e2f0d06f38b9c1f67323f32cc1a4cda7d0ca931c450a2baa0b86e9220c33bac556bf3da", 0xb0, 0x6}, {&(0x7f00000002c0)="ee790488de7947149aa2404452267853cc1b41df0c066e82549108b2cd808a8cb729ea3166bc1f344317a520de1db33a1082d1c919ddbf58ee56f8d675b305ba34a27af066104264bb40118efb3c7d29c516657122d9d90d73273042206e8f4a80b4925dc95102a630bc60d82cda0284cff2f3a1f71b460adafdf35f529787773cfd6b2e75533eeaa09c0fb938903298f780cfab51ef56e72e4add8f8d0ab61ee6a9cb77507bcebfaf05194a4603357c1658fa0af467733b8d7778a8a8fa270f5f", 0xc1, 0x6}, {&(0x7f0000000480)="7444edaba1040eb6358605dbf591372197f8a9486c85d4b963d73f49694a989a9c5f59f21fe6750819061f5c138c423a0243a02642727b1805f3fe1b27a64d8f27c88f1b5156f55d93b8493029825fd7e4df14b39f0f0238046533b15a0cfe8e0eee2e8d9b1a4a51a7d7760df95814e2cef6ffa0818eb85c123ffe341a4cea8be26f875414f57d7a4de6825c69cb6c96673ed09159fcbd13dcd90635970a068a20d997006e3538c831daef6420172bad70f9965a2daaa73b07c64b5f41d8a918816ba326069beca540eb123ada5b01e3771175c4e2946a", 0xd7, 0x1f}, {&(0x7f0000000080)="cd231e5bab1c39", 0x7, 0xfffffffffffffffe}], 0x1000, &(0x7f0000000440)=ANY=[]) 15:13:19 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x2000000}) 15:13:19 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004551a, &(0x7f0000000000)) 15:13:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x1500000000000000]}}, 0x1c) 15:13:19 executing program 5 (fault-call:1 fault-nth:4): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3}) [ 795.183624] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.197870] vhci_hcd: invalid port number 0 15:13:19 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa3}) 15:13:19 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc020660b, &(0x7f0000000000)) 15:13:19 executing program 3: semctl$GETNCNT(0x0, 0x3, 0xe, &(0x7f0000000000)=""/152) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x200, 0x0) modify_ldt$write(0x1, &(0x7f0000000180)={0x0, 0x20001800, 0x0, 0x14, 0x1f, 0x9, 0x3}, 0xfffffffffffffeb8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af300200f5abfb9845f9e19859c9693206f2c60b0000000719e1d66e970123d893d974e5b9c3285677b2139823e5500c92ab5b94da3a7de19f063bb765b02bd5b660fb7fa898c6f5c6369c3f363068d10af833f6475bbe8b7967255b177607ba100f6c4654718232dbda64aa1f69cf9ab5b3ea3ed63452b7ebd37c9dae664e322e08ad8f6029fe8fd0b34c7117480471aeca0a3fc9eceb28509ca8a83e4f8b85131808bc5cfb4cc24e1901769c084c082712b470666b6dddf74ced693973ba1ded8b") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f00000003c0)=0xc) setpriority(0x3, r1, 0x8) fsetxattr(r0, &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000140)="0000000234a3a0382d686f883e1c11ba5b85f27e", 0x14, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000002c0)=0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[], &(0x7f0000000340)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x101}, 0xc) fchown(r0, 0x0, 0x0) [ 795.275835] usb usb5: usbfs: process 11638 (syz-executor1) did not claim interface 0 before use [ 795.288351] vhci_hcd: default hub control req: a100 v0000 i0000 l512 [ 795.301087] usb usb5: usbfs: process 11638 (syz-executor1) did not claim interface 0 before use [ 795.310986] vhci_hcd: default hub control req: a100 v0000 i0000 l512 15:13:19 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000000)={0xa3}) [ 795.397686] vhci_hcd: invalid port number 0 15:13:19 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x551f, &(0x7f0000000000)) 15:13:19 executing program 3: semctl$GETNCNT(0x0, 0x3, 0xe, &(0x7f0000000000)=""/152) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x200, 0x0) modify_ldt$write(0x1, &(0x7f0000000180)={0x0, 0x20001800, 0x0, 0x14, 0x1f, 0x9, 0x3}, 0xfffffffffffffeb8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af300200f5abfb9845f9e19859c9693206f2c60b0000000719e1d66e970123d893d974e5b9c3285677b2139823e5500c92ab5b94da3a7de19f063bb765b02bd5b660fb7fa898c6f5c6369c3f363068d10af833f6475bbe8b7967255b177607ba100f6c4654718232dbda64aa1f69cf9ab5b3ea3ed63452b7ebd37c9dae664e322e08ad8f6029fe8fd0b34c7117480471aeca0a3fc9eceb28509ca8a83e4f8b85131808bc5cfb4cc24e1901769c084c082712b470666b6dddf74ced693973ba1ded8b") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f00000003c0)=0xc) setpriority(0x3, r1, 0x8) fsetxattr(r0, &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000140)="0000000234a3a0382d686f883e1c11ba5b85f27e", 0x14, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000002c0)=0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[], &(0x7f0000000340)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x101}, 0xc) fchown(r0, 0x0, 0x0) 15:13:19 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8038550a, &(0x7f0000000000)) 15:13:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000140)=""/153) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) connect$netlink(r1, &(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x840}, 0xc) 15:13:19 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551c, &(0x7f0000000000)={0xa3}) 15:13:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0xc) write(r1, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r2 = dup2(r0, r1) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000000)) 15:13:19 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000003}) 15:13:19 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045510, &(0x7f0000000000)) 15:13:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xe6050000]}}, 0x1c) 15:13:19 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105500, &(0x7f0000000000)={0xa3}) 15:13:19 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000000)) [ 795.916642] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 795.945255] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.983247] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 15:13:19 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004551e, &(0x7f0000000000)={0xa3}) 15:13:19 executing program 3: socketpair(0x2, 0x6, 0x5, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x2, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x3, 0xfffffffffffffffd, 0x2, 0xf2, 0xfffffffffffffffb, 0x5}, 0x28000000}, 0xa) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r4 = getpid() syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x8b, 0x20000) sched_setscheduler(r4, 0x5, &(0x7f00000000c0)) setsockopt$packet_fanout(r3, 0x107, 0xa, &(0x7f0000000180), 0xffffffffffffff71) 15:13:20 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x5451, &(0x7f0000000000)) 15:13:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc020660b, &(0x7f0000000000)={0xa3}) 15:13:20 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x2, 0x5, 0x647a, 0x6000000000, 0x9, 0xffffffffffffff9c, 0x8001}, 0x2c) 15:13:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000064, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 15:13:20 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x40085511, &(0x7f0000000000)) 15:13:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185506, &(0x7f0000000000)={0xa3}) 15:13:20 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000300}) 15:13:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10000000]}}, 0x1c) 15:13:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004551a, &(0x7f0000000000)={0xa3}) 15:13:20 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4008550d, &(0x7f0000000000)) 15:13:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045518, &(0x7f0000000000)={0xa3}) [ 796.577404] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:20 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0045878, &(0x7f0000000000)) 15:13:20 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x41045508, &(0x7f0000000000)={0xa3}) 15:13:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x570}], 0xed, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x4001, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x83, 0x4000) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f662d2e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[]) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000780)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x4e20, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x3]}, 0x5c) mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) epoll_create1(0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x39, "c0bb8f112c48ab20a3e76d0e7be59c7baca6ad4021f84ca6d662c3ae763f780c"}) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000240)='./control\x00', 0x0, 0x20) umount2(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[]}}, 0x8000) getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') 15:13:21 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc018557a, &(0x7f0000000000)={0xa3}) 15:13:21 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8008551d, &(0x7f0000000000)) 15:13:21 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x8000000}) 15:13:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") write$binfmt_misc(r0, &(0x7f0000000140)={'syz0', "1ec123508a050246a61f98b9403afc4b7cd57bab898540c57f004bbaa371b66bf3516f61d5b0e00739a88222b7d2508a2f1db8133b068d5a1c288c6480f9c2eff21c0b5621404c6ec515197578f4e5b7bdd990653c0031986f7a4119d90b562047bbdc784b1cc0bc2389a0700060bd30a0cc43cee32571c72efd653f"}, 0x80) open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000440)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0x400080) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) 15:13:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xd00000000000000]}}, 0x1c) 15:13:21 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045503, &(0x7f0000000000)={0xa3}) 15:13:21 executing program 3: r0 = socket$inet6(0xa, 0x1fffffffffc, 0x10000000004) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x1b}, @multicast2, 0x1, 0x3fc7, [@multicast1, @broadcast, @broadcast, @broadcast, @multicast2, @local, @empty, @rand_addr=0x2, @empty, @local]}, 0x38) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000cc0)=0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000d80)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000e80)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000e40)={&(0x7f0000000dc0)={0x54, r4, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffff9}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x224}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x9}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x65}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0x81) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000d00)={0xad}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000140)={r2, 0x3, 0x30, 0x1, 0x101}, &(0x7f0000000180)=0x18) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000940)={0x4, {{0x2, 0x4e21}}, 0x1, 0x5, [{{0x2, 0x4e21}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}}, {{0x2, 0x4e22, @remote}}, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e23}}]}, 0x310) sendmmsg(r0, &(0x7f00000008c0)=[{{&(0x7f0000000200)=@ethernet={0x306, @remote}, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="c5f0fdec709ecf83f00eca5eb853e7efe7b35d7ed5be0fa839440f81b5246706e0b7cde576ca22781c901065309a94c9e28fb62645e8b2d0d289600b86e74dbb7c39ae7cff1ce9c6ff7c8a4f6a6b97de97d5b5c28ea24af083fb63c1fc833f70c9898fec78a726f12b7006698cd6561d733b46af6510d5f961436aa37ab0b107d899bbd1ee4f12e1c40536036b719326"}], 0x0, &(0x7f0000000380), 0x0, 0x1}, 0x169}, {{&(0x7f0000000480)=@sco={0x1f, {0x55b8, 0x100, 0x2c4b, 0x4, 0x0, 0x80000001}}, 0x0, &(0x7f0000000740)=[{&(0x7f0000000500)="9a6955e50175b0874975613ec54644fb270d64fa7297246ad5e7ce46eb58b4232f07fbbf74e57744091b3f03eca87473e64755263a263f94134102e6eb04997f7509ebc132ec63303e629d8fc171b4d158b1c52d77570d51c579154efdc4f904a71b92c4822829e47916a7c8a7a7c3"}, {&(0x7f0000000580)="1b6729aa52cec2d2"}, {&(0x7f00000005c0)="31224f185b2f72f39bebd18145ec90416d746ddc4d94a4a4bd97c98d89069935f798db2669adf775b2558339f597ca1ef0275a38f9814f96bd7aa95fed7b99ff190a65d1af4cb7080dc66b1e4e3dd5af79f01e"}, {&(0x7f0000000640)="f833a2e8d0fc3e106d7ddc754945e462785f81c7eb45269d15168a5c5a0134202fc4cb386357a8b231c29b64fc395f94fb6d155ee3e052bcdfb520ec0fda0501337dd72a7216ecbf51c1c0aa06f7aa4dd5c3fb2711e37c0ec0715b5f1db0055d1933af2b27aa1af138652f1217ee"}, {&(0x7f00000006c0)="ffd3e110826254e3abf13b9deae79d12b2a1e0ab51811cf382b43cd080bf3cc92a77d61b63196f5d0721d463c87faacfde78289c82195ba946ad13fbec6603364f885eeabe252e70a5429ab82e7a0480fa98c03307b7bf3bc339a9220a"}], 0x0, &(0x7f00000007c0)=[{0x0, 0x11d, 0x2, "a763152aad41fafcca1bf97ee710d1bda04692465c182ef26f25667141ee150f61f706916f2d0db3f9d8504402524409e6353f52f7340e2023c2be69b94406213b96155e0668b52dfbaff52d1c0ea5bd11720f6e1d601751a9661b11bfbd00364c9260a2b0c5edc40f513112270475fe32"}, {0x0, 0xfffffffffffffffc, 0xf29, "b788516902692917cfc9ca828c8176080d672cf8a916e7999a6fc1ea270b0a043b55e18a5f2f89d50e65b417e39b18f7466b60d5063fcd9e8762292a20b2c0e13ac7af63dde4b9ae604fe2ac03325f5ab6bb45036ac33f"}], 0x0, 0xfa6d97bd798ec9ea}, 0x3f}], 0x400020a, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000c80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800080}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x78, r5, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffff8}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb2a6}]}, 0x78}, 0x1, 0x0, 0x0, 0x40000}, 0x4014) 15:13:21 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:21 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x1000000}) 15:13:21 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000700)={0x0, 0x8, 0x4, 0x1, 0x0, 0x1}, &(0x7f0000000740)=0x14) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000100)=""/117, &(0x7f0000000080)=0x75) r2 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000002c0)="72c233dee8c39336637c3c91da28cd3d6974d7ad3117f9b38dd9ba6e47c963f46ce7dc8a9b34f2bfda1ffb84b318df2dac6afa103a4d529dc749b5a95c7eaf234dd52974d7266911fd1b3b5abf24b5ba901d9ea761eb5f0f746626428e0ad2c235b65e8b5b5129f86a82fdd9bc07c5e95a4e0e8da4416b4b5c588b4a7d681c2dfb2095042e510151fb3378b4ab011f9d96d2397515eadacdd160dc01499324feb2976554decf274c5e7877bde75090bd6223c267d5b6", 0xb6, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r2, 0xb9) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000780)={r1, 0x3}, &(0x7f00000007c0)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB="720af8ffc2f49c146140000000bfa100000000000007010000f8ffffffb702000000000000bf120000000000008500000004000000b710000000000000950000000000000065121e2df93119735d471a4637bb0af34ecf1037428846740aed479f190038620e830cf16277e290c9a47256ad35d759ed313e1a13aef2c555833aec78ea226c86e3ecc4feb45102772acd4093d291e44d266f7bc0fa9d1393f5d218a43935979b"], &(0x7f00000000c0)='GPL\x00', 0x0, 0xfffffffffffffeab}, 0x48) 15:13:21 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc00c5512, &(0x7f0000000000)) [ 797.345840] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:21 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f0000000000)={0xa3}) 15:13:21 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:21 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045503, &(0x7f0000000000)) 15:13:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x80000, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000140)=0x1) open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='gretap0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:21 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x2, &(0x7f0000000000)={0xa3}) 15:13:21 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x4000000000000000]}}, 0x1c) 15:13:22 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045519, &(0x7f0000000000)) 15:13:22 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x4000000}) 15:13:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5451, &(0x7f0000000000)={0xa3}) 15:13:22 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="20000304", @ANYRES16=r2, @ANYBLOB="04e9b092a1c5fdd47502039894002bbd7000fcdbdf25030000000c000800ff03000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20000080) ioctl(r0, 0x9, &(0x7f0000000280)="153f6234488dd25d766070") r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) tee(r1, r3, 0x8, 0x6) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000140)=ANY=[@ANYRESDEC=r3]) accept$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={@empty, 0x73, r4}) 15:13:22 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x40086602, &(0x7f0000000000)) 15:13:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40087602, &(0x7f0000000000)={0xa3}) 15:13:22 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, &(0x7f0000000000)) 15:13:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40049409, &(0x7f0000000000)={0xa3}) [ 798.276896] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:22 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4020940d, &(0x7f0000000000)) 15:13:22 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, &(0x7f0000000000)) 15:13:22 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, &(0x7f0000000000)) 15:13:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185504, &(0x7f0000000000)={0xa3}) 15:13:22 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105500, &(0x7f0000000000)) 15:13:22 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000002}) 15:13:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xc00000000000000]}}, 0x1c) 15:13:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000140)='bond_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc018554c, &(0x7f0000000000)={0xa3}) 15:13:22 executing program 3: socket$l2tp(0x18, 0x1, 0x1) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000000)) 15:13:22 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x550b, &(0x7f0000000000)) [ 798.777829] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:22 executing program 3: socket$l2tp(0x18, 0x1, 0x1) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000000)) 15:13:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185560, &(0x7f0000000000)={0xa3}) 15:13:22 executing program 3: socket$l2tp(0x18, 0x1, 0x1) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000000)) 15:13:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5460, &(0x7f0000000000)={0xa3}) 15:13:22 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f0000000000)) 15:13:22 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000000)) [ 799.063526] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 15:13:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000008}) 15:13:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x6300]}}, 0x1c) 15:13:23 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000000)={0xa3}) 15:13:23 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000000)) 15:13:23 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0189436, &(0x7f0000000000)) 15:13:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x60500000000000}) 15:13:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x200003, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x80000001}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r3, 0x5}, 0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e23, 0x4, @mcast2, 0x514}}, 0x6, 0x400, 0x0, 0x2a1f}, &(0x7f00000003c0)=0x98) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:23 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:23 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000000)) [ 799.514024] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:23 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0045878, &(0x7f0000000000)={0xa3}) 15:13:23 executing program 3: socket$l2tp(0x18, 0x1, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000000)) 15:13:23 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80087601, &(0x7f0000000000)) 15:13:23 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000000)={0xa3}) 15:13:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x240]}}, 0x1c) 15:13:24 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:24 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x550b, &(0x7f0000000000)={0xa3}) 15:13:24 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80085504, &(0x7f0000000000)) 15:13:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x200000000000000}) 15:13:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0xfffffffffffffffa) open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:24 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:24 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0045878, &(0x7f0000000000)={0xa3}) 15:13:24 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000000)) [ 800.248160] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:24 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:24 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105504, &(0x7f0000000000)) 15:13:24 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185568, &(0x7f0000000000)={0xa3}) 15:13:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x14]}}, 0x1c) 15:13:24 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:24 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185574, &(0x7f0000000000)={0xa3}) 15:13:24 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x40049409, &(0x7f0000000000)) 15:13:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x2000000}) 15:13:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000140), &(0x7f0000000080)=0x68) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f00000014c0)='./file0/file0\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x40) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x2) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)='./file0/file0\x00') ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$bfs(&(0x7f00000001c0)='bfs\x00', &(0x7f0000000200)='./file0\x00', 0x100, 0x1, &(0x7f0000000240)=[{&(0x7f0000000480)="e355972ab3d6249a8efffbd514e4ba3d9ec6574e75cfd5fc31a6f38fb07656a801009569c4991da15d6f94f901d65a91f01683a9b895da284c9a74ec3b15a0a998fec822531f1c04c982023f783c4242227b4cbdbac6a9f024d5385c68eccec28781436337fa17a9a784d397e833540b90e3682f61e8205c7ac4042ce00fa1a3ba4e7d5455905e43967e6a94431fb49dc3671d7d4229a97ba5e6d94cb78cec3855ead8beb635ee9cc3c5a25a216d0ea34eeea238a84fa2e719b82a9d3e5a0ef046c1efa3f2c17ece14cc4ac9a74a2095834cb5051080d9aab22904bc49bd14b96e465b791930efc30a970fe7b7760f0f217deaa5392ca0488bd611380587d5da7776028d187155a84919a1b85edfa6d2900670fcee697228cbdff6f191218f6d642ada5f454425e453b749fa5ac7bb9b60b428905ddf928a60d0099da103b1337aa1a8246fb66a4f2a503309ba73b9aad2fd9c85d075b93648e1bd569479dad7020177d979ddecf9c26ccad23ac5d00e9bcdbd3c0fd8f7c90d00b8662297fef9c70c9e98cbbffa5516872d97db8df072a8c5da3001bd7dadb7cc544a1b717bb6c76926c5734dabca04362cbb37a3b1a9948245b7b8660da5af7c09586dc58a03fd014e244184e53f7ebf960df46e65374d31716d617f38d412e8dd8eeb6081d1cb6dd177cb7462337e82778ec46c806e1417b554e66c994482418c7d06df42c206dbc0d0b4117cb145cbdb44820a467214b68d3761b11c4b809082cda21794b1820ccfabfa6c5f482948aec363f9b9c0605035eeb1f6b5edaa16313e7185b4b1c01fa0f80f74b15e47a873c2605c40929abe6e6351993537861c46e7a9decd9d006927505cf40f483643b6d13a4eb6789d5950eca94ed91d9fb6fc7a49906ed20e303681d62c7a5438a1fab93c7c28ee0f4bb6572ea5e747f08b7469ad7c37897171e82d501ec1462fba0ccd875db49d321427e18b1c3ecf9f3d9294a70665382bd8e57db1d00fb5298314f28cc1d11be66631af0c62e05f0483ec771c95111f85ca86c6fdc0c3cf537c7c21aea0fd4439e9ea13a074ef071958cf2e1bb1a4d558edd56b8ad5095c09249baeeb148290b0a814682056f9956a6f69199f91fa8d33035a7ff9df7f3118cb592917c3ad17fd3812df2bd41711712d04f78077b32706bcca4e1fa0b9c084bafee8b58094d62eabc5da25afbd3c3459e1794a3537b8099d4b86d4a7427e5028d5a5c750b05ea3706616b9ce1ddb282c3548f3cabc1ba277b89530ce332dd4e9b05742052cce8736c1946168b7da25423f9cbceeb0a28fb86f250e98f4129723942edd672609860df6b9a20a540a27ec10a0466234b69fa9eea0be7816013c6a10cc5978150106e815f556a9991db6e1ea37898abb992784fffc6e06b7f7e7311ac8040d08bae560fb87837a6d7b9ca7c798922a56c5ad5faf5e614c3ff43e451307d1cc5b39589ea48ed2977ab8d9127d097375188092ffcc55ec05957855007d5d8804c848bfa571bcff32b49219f55a458999957984ceafde538e079694e9bcc96301e6c73fbb11b1bbb8e53c02103805c7f8439bb2ef7c79eca1610208109d648391a84b6f96d4ac38f0f3c20ed3f678bc5b01336b721c608318164723d6f09841ac8a1d6cd7656a8be6bbde43052821dcf7b6edee272fd00912c7fe8399049ff8fd814b60fe1bc1bf43d07b2fde0b3e0caa042672ae5d52aeb2528b4ddebe4beefddad110ef9697ef9895b5b739e4595dc74b23313d6aeb22d0fed2bfb19b27b4b179cae4dddb2da2564ea7835c9ac8443b96792bcd8d4ca545c19c35a8744ff547c889d9d5403b7a9f1bde31d0dabb0e370586123e1c565ee24da43ced0509cb4490fee6c4aed9b7cd6599fb42789af39a234e13456c6f7cc201070f961608e587ddce626fe25053439521ee6317d77a08d73fb415279b86c415ee619ebf231a4a88f443c6589cd0e537cb7271293df57e1edc4fca15ce8cb8210c8e68fc0e3c6973ff6b7e5147359a2a887428ce7110f4d491d93626850b45a73f9842eedda271cde598b3025580c64efb5864134fd530b68ae8ab84f06902c121a40583d28ebd09a797d8c41720cb8d7ab88226b115ab187d48c985c76523c56a9f6790275e8996d25af2d1cb54d9aa2415fe4d5715645408835403e9c69768e5ca178a772f6b441c8722863056fa4fe8884548bbb129fe6733c775ffb390a05848419d333423380c6f273472fff8ff038526248e9386ddb883e5c11ddf6fc54dcb160a7ca7fc5408ae0fcdf0e9e93d9dafd72ea9333c4c8b2e12cd439c9237d467026be9a4d6422fde59a3fa33017dee01dea7329932ca1bf3101c45a2655d8dccefcfb241bec7de81c0861400404a3b02e8ad86a7d2e2f8cd1b5ca5d53c31be7131f13272f7bc144debe7e13ef081a950d047b6d5e50c7fd4142deef7e1c9570cf6c897e07d7b2620bd58bce15cc4d0f49a7e402d90f07419b339472f3712b150a81b685ea0c88555ae3310ad21010970c7896d1e157684fa8ac2dadd1bd82dbd199e455596b0b4079f16c32d971298c4d65697223392b7cbe57434e2a9859dc7469137b88cfb0e57c95e6597484658922d9bfbfb7f476a49da125642fdcbbfb5204dd8400c51c2965f1363742e1648a966de4fb83e7580d63c5b7235ab857345242623f0fbc526606e4d48e3b87069a541bd7921aa5d546efaaf02dc80a5b9db06e773772a31b0e0a1e9d41207ff58cf448ac34c650cda23ed2f02d7024859d119f1930e85a04568b06cafe86b5e1f2189096c3a4936712975866da653dee2470ff461005ed950462cb1fdd32ead3cc93633be15fe59cbf0368be47503685338f1a8baaaa18f5cf26bfb6fe25ac087d91e192b5d3331a2bb7b343f5655619a4b5fa52bdeebfa0f37fce042a12c173192d16874760b2098608b8f7fc5efb9b79d47a8e4542bdb29908ffc950070233d20edf8a7e2d10a44d7dc91c4895db3e5bf2354fa859251a25c1aa56730ed21e0be0278623d9415d4169a49dafbdd14e16034de0ebafd5bfca25c6cb26c85940eb88edfd84dee63f8edd66e00d98411b9ab4275f19c5ab6cc7ca26daefadc842be000957bfa55e2b596a1bfc943d855cb6fdac131bfa16ebbe9f0dd19ec149ff730ffc224cf5a10cf5736f30841203fc5218d73ae427c7914cacd6fba6f2341e0c1ef428e94cb7acc606371536231bc7a2c98e8757cdddcdb8c764b8b25bf3e6b3ce678508c8d9a5c774e10d1ac131831b8ca508c221a487e8ea25c722fd8feb26b93157a10eb6bcf2464ead7246a8423275b6849f2f1324156b94871db8abfae521b88d67444a0f5ddcad72ccd122274e63b565747ab565ff20bed3ee68a6724ac4990730ffb164c2d1ff58382091adffa5c48cef9ed491c732c5d76720d75d8b7b6cb01424cb426e117914f5bf2225b554ac5986548fdbac24c3c06491fdca4e7463e7171e4c4ffa68ff9b0abc59b394b2dd9d5884b177814a90533f75a21ff314d29796f342145f7456313c47188e51b5723b31f9581713ea47ed7c1b289e507df0694589fd1e70f79cf4c3b14dd1de7a962bab8c67c5a6e4a37845b628a8bbeb65c34da89b700c8bc79228d6d1910842d7a86d52dd2030de3fef93d0a333abbc2378bd5598b71f3151003c50ebb45c260f516d9ea3cb2fcd562be05d1a64d595a197d484cbd2278e19dbd7544def89ffad6327703a19260d939ba868d99fb92ff67b38b794e11da264a43944725b38352746f5e0a0b4e480d6196b0993aadb063d1beda1a86a9a803ab23652bc51320609b1f2d1d7645b5ddac91c07f3043494ef1a8696f8cd5975311c564fc059cc73c40c303c286211a4cf6299dcca5593cc490166a9e202d135d8400100b3c8233105ce476ca31c4a264f7d09859804173fb3070a2838e6e47aca5585bd36c34277cd0a3ef0f6c4d8a7c28c929c03fbd1d7c245d0f9a7b12fb2d147a5db02ef96580e71bd64945a1f1a6d565372d654a0f47524ae1e6fd2a3900ec3f1a7cd054c72f7079084f6e553e63cf802607ee7c3504ee8ae153b69d156e28c4f0c14bd2e641cf965a24274999c36dc37db4af1adf184b63bf126018e171aae5ce9fbf52c6e38b8acdd3f7dcb437997a1c92f9904698cd855bcada2fb333e4860034bc610818acc4b00c5bdc62f17587ae25d9172ea8361064cd12540f8d0a79a4e2f3167e9fa63853bfce7fe08592f750cb20b1e558af50bf1a0eb4400fd07833b8aba0b684928904b3bb935a70d4f60e86e4f439fe119e312bf012db33b353c2bbb4d68b399395b9a03e50bb84b2ee773777537b65ed4287b30f12dc832dd38fc4f98bebf652aca827138fbc01610bd57faf5f478ff95750f78e3de754b99ad7bf1381a232fa72df62573bcfb8d8aef2a361d734cec4c919d9367dcf0daf0a940425d52598bea6505dae24e74cf383277a4d0a884276aa1f1225f00512e6fb3197c43447599e219192156dfce06be7f001d97a14fd6f61e35845ebf1c53a5e88d7d8bcf13cafa66f977cd70415f2ea58a78215bc2196f4106d2ed4be00afeacc8c1d791205daae13055f732d494790063edd8616e65331b2a2d1a9a62bc9263f757ea3045ac70e5bca6857c1a2a581116d655b0388436ca48b5d639705943921d3990454d41d3ebca770a6f088c574d2f3fefd257ce1fc044675d5a4cd4917ea7cd33e8fbc29f1040ed4295fd2adcaa0351e36507c0dbc4ac95527ed400172171101e270a373702281bc30a1df2452f35700877dd2a39df56dd19fe8741033815ed889530471b3d88527c0faf7d7d8cad4c242524af5ce41cb6fa952fbc751345573b38a705d4cf365b41696db771e2896e1d47b99a380078ebd4f6ee8208564c056a1a9847677b052ae834fc045616677530dc0dfc690fa263491452ddae2aca37968578bb7f11938b7c8982bc42d9f7ca6fc915d6899c0741d41e5d82e162fc590a369a2702004a97e85e13fa5e5b93906c53cd1df22d835f91c8aa628a6b6cecf6d74af4cf3790068c0550c8d425ffbeac8ac8ae4810bcefb8034fa016956c6097d9ccbb535bcd3c5565a36c59ae20b2eb8973f0ce80b13c21538304be0824cd5d5bbe306116f055daf97c13710f8fc063ae18141a49b139497645532e70ea82e8cc010675d3d33be8d239b62886af8b254ef4146f866e798044427ca679dc460ad39a5f69ef5555b2cabb4079cd0e4b5bb4384c8ae4482a29b6a50764ede3c188407760b82e35fca8c0746971229c6978a6f6d4e8f51e7cf7d91fecbd9668b4c79a67f8616eda84b1bdd39b1025cfaae02aacd35d7043e29bdda7e26f5c463b0ee56307efa2cd6e21a2150bf1f180940a5a0d90354794995704a1b9e2dbc91f5f701eb774fba540cfe317c91804d38e48b8f0aa35d61a7d426c104f759ce7c74fdcd8638f8866b4229c97c8b08a8334c1f63f0fc67d78d7c6c81235d041060af32125e4d67b2746b84b7deb15c4ee8a8d95efe50aa9dcd69f4b52cfb59e392005a0ffec0fd4c0cba851f29c905da0ca55308a20d6ca3b308625a6db24d053d37421018334b073b11f7d7f1f26b9cbcfab12a466141674a7c486dac261faed1c6255eb6f4ea2f00b2437a8fa26aa6dec39556ab1401f0b4feb201187918710150eb8fe021261579a7ca7569d796ae28ce9fc39b4ec7e25d529e17a58ae557d0ad39720819293cb855bf99529d4f8ca6382c88f9b08689e925500341d524df6eaaea2a1750b3a628cde4318f7d04a4109fb6d7c77c7276eee552", 0x1000, 0x8}], 0x1000000, 0x0) lookup_dcookie(0x6, &(0x7f0000000300)=""/171, 0xab) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000001480)={0x401, r1, 0x201}) 15:13:24 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:24 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x541b, &(0x7f0000000000)={0xa3}) 15:13:24 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4008550c, &(0x7f0000000000)) [ 800.833614] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:24 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:24 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045510, &(0x7f0000000000)={0xa3}) 15:13:25 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x8000000}) [ 801.054209] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 801.178620] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) 15:13:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x100000000000000]}}, 0x1c) 15:13:25 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185548, &(0x7f0000000000)={0xa3}) 15:13:25 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x400000}) 15:13:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000080)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80087601, &(0x7f0000000000)={0xa3}) 15:13:25 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) [ 801.477754] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:25 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:25 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x5421, &(0x7f0000000000)) 15:13:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550c, &(0x7f0000000000)={0xa3}) 15:13:25 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:25 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x300000000000000}) 15:13:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xc000000]}}, 0x1c) 15:13:25 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000000)) 15:13:25 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x8008551c, &(0x7f0000000000)) 15:13:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) open$dir(&(0x7f0000000580)='./file0\x00', 0x80000, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="73697430000100000020a5a7f643ff00") getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000001c0), &(0x7f0000000200)=0x8) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = epoll_create(0x100000002) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x2, r2, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000640)=[{&(0x7f0000000140)="c109c38bdd0ebc37d3c94b084d1e00fbbfd64aeb797bf6fa8762", 0x1a, 0x40000}, {&(0x7f00000002c0)="17aac40fde788fc5288a4ba7c65e794954c5a7340e26d77b413b7aaaabc273bb60d1a00fa9e4272c0852707e2c4ec3f89c3dd7c8cb28331eec07370f71556a0b2a3c531703ed321b25af57bbd58a87f52417f50867082dcf84b4b3cb4e0827d97f205c5f4bf0b4e4daf69eb1b9af4006fda0b11b0e1ba6679da89cb849b84162b250bdb9287326b32aab053d109b8fffb2a621486666586022e1c31fa454dde4ab6d3155c0004ea6fca18f9986f6aa783ef02c9033eaa7b326e65e5f22ce4fb27a", 0xc1, 0x5}, {&(0x7f0000000700)="956c47e405774511b2c5003a6389fa799ebd1b42411bc8ba92180b5e914de08425bfc76d5f216916c3668ce50c3c5322775bb8517f6f9c88c8079c32b3ebc8e660b935f59fc2104de5f7196ef90890df79ceb2188cf7eef64ef8d546ebe6ee53edb8295ffdd7cfd2f98598414ac12b23ea9e6be0eb7ed3f48f73b250ce265e531759ace436734efdc6f8742bcdc6c1431c37066b1980b1900c622e1af46afbaff4226044c179e8ab41aa3eb27bd49ba5ad84fc2b6fba", 0x438}, {&(0x7f0000000480)="f40f27336af029a7c9d9d4827d3447fc4732fe7d69150ea1a9bb97930bda1717e8835a9f82ab1468cc76af5962dfc30b5530a777436589ae909b67975aa43938db8a034324aaf676bc7bc6638d1cc5d3e03ff208c91b890652dbe5f5c3e9567a9060d401ac6a982e335b982fed27e266d5071ac942fd516ab140ab718d7318d6ca770980233a0c118f7f3d0454adc771557f4579450dab22375c644ccf6e138852803881144559786ff457dadeea5f8c2144ccbd0879332389b4de8e3158618d530e4a23e55e412b", 0xc8, 0x1}, {&(0x7f00000003c0)="1f04008fa0e7a86bb2ae3465a78a0853a35d8beace", 0x15, 0xf91}, {&(0x7f00000007c0)="3d41cce63dea6ecd0b073435497de1b9e897a201a4f81e03287a33b38fed391a3a33fb12fb2e6a79627f12d50411d69538352e6257aed525ea99289fdfae8813412044b7080e524d00000000000000ff2bb4bf390b9d16f41f39ef9798084876b355df4228abe0ddf4aeb71f2e1620464539f994699e0e072c2596518d8c16ac0a0000f182b5c4cc0fed0c1806056042e8e2b47b03bb58", 0x97, 0x732}], 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000240)={'lo\x00', {0x2, 0x4e23, @multicast2}}) 15:13:25 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0xffffffff00000000}) 15:13:26 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x5460, &(0x7f0000000000)) [ 802.050791] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:26 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, &(0x7f0000000000)) 15:13:26 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x41045508, &(0x7f0000000000)) 15:13:26 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, &(0x7f0000000000)) 15:13:26 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4008550d, &(0x7f0000000000)={0xa3}) 15:13:26 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x5450, &(0x7f0000000000)) 15:13:26 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x8004550f, &(0x7f0000000000)) 15:13:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xf0ffffff]}}, 0x1c) 15:13:26 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x9300}) 15:13:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x8081, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{0x2, 0x4e21, @multicast1}, {0x0, @local}, 0x20, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 'eql\x00'}) ioctl(r0, 0x8912, &(0x7f0000000080)="029f89e961924f2a153f620f9bfd850163fef7727f8fb4403e6b4ab9ab42dda308ac1bf4ab2a6e960e73053ce7a00e693dff5065e790994164d92b") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) socket$inet_dccp(0x2, 0x6, 0x0) [ 802.690480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:26 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x5514, &(0x7f0000000000)) 15:13:26 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80085504, &(0x7f0000000000)={0xa3}) 15:13:26 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:26 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:26 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x5452, &(0x7f0000000000)) 15:13:26 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8010550e, &(0x7f0000000000)={0xa3}) 15:13:26 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185502, &(0x7f0000000000)) 15:13:26 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:26 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000000)={0xa3}) 15:13:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xe803]}}, 0x1c) 15:13:27 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 15:13:27 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x8b, &(0x7f0000000100)=""/139}) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0105502, &(0x7f0000000000)) 15:13:27 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185508, &(0x7f0000000000)={0xa3}) 15:13:27 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0xe07000}) 15:13:27 executing program 4: r0 = socket$inet6(0xa, 0x7, 0x800000000000) ioctl(r0, 0x2000008911, &(0x7f0000000080)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:27 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x40) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) 15:13:27 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 15:13:27 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5421, &(0x7f0000000000)={0xa3}) [ 803.486706] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:27 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) write$sndseq(r1, &(0x7f00000001c0)=[{0x3, 0x5b, 0x7fff, 0x0, @tick=0x100000001, {0x1, 0xffff}, {0x1e0000000000, 0x1}, @note={0x1, 0x16906fa2, 0x9, 0x4, 0x80000000}}, {0xffffffff, 0xfffffffffffffffc, 0x5, 0x7, @tick=0x3, {0x3}, {0x5, 0x6}, @ext={0xb7, &(0x7f0000000100)="1c8ab3206180dfc33e07f65f0a7a30018272468d3ffb6e22625a2a966f898567fbb60f12e988814337d30c6fc33fd85c73b3a2b90f23811d5b15b831eff0160fb3cd2aa7d9cc8bd35c45a35cf1ba307c79ba3d25dc359a3bdfffae6e202160a66721608855de59fdc2199191f559e31931f29a0c93b9e3539cacb00e092ff90b42f9ace29e809950173ec4b0d623154e592ac1fc7d2f40fa25d718cd3efa66b56fc6178e95ece9cb4ee6b85b028bb8eff1656de3fc5fc8"}}, {0x71, 0xd54, 0x81, 0x5, @tick=0x6, {0x5, 0x7f}, {0x4, 0x2}, @quote={{0x6, 0xfffffffffffff801}, 0x3, &(0x7f0000000040)={0x1f, 0x5425, 0x2, 0xff, @tick=0x8001, {0x9, 0x400}, {0x1, 0xfffffffffffff1b6}, @raw32={[0x800, 0x2, 0x4]}}}}], 0x90) 15:13:27 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 15:13:27 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4020940d, &(0x7f0000000000)={0xa3}) 15:13:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x983a]}}, 0x1c) 15:13:27 executing program 3: socket$l2tp(0x18, 0x1, 0x1) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000000)) 15:13:27 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x181) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) 15:13:27 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc018550a, &(0x7f0000000000)={0xa3}) 15:13:27 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x930000}) [ 803.937919] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)="6272696467655f73846176655f3000") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:28 executing program 3: socket$l2tp(0x18, 0x1, 0x1) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000000)) 15:13:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045519, &(0x7f0000000000)={0xa3}) 15:13:28 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x40001) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x76, 0x5f2}, &(0x7f0000000200)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000380)={r3, 0x1, 0xcc, "8f34e23700976fc570078b8b00241f00adc8ffc8e10431f75a8eb5ba4a09b8064adabac007b64af59e1abc483dc9df973f620682a01631b193aad608eb8a2dc12d0ac450929c3d9f5c0a7e2aa5de1077e9398908b3bcaf84481e39715e837915afb3edd361cb5b6418be277348cf826aba53b2e1fba5ef1d91fdc6d4844183a876f1c22bab5503e8104dc8e725ef65dd8647e5fa3a33f406417f964c5a7ccfdbb93f5d16de3413821005c07d7180916d226cf7f9e75732838ea99c83e9f33fb61557728d9590db13ac535345"}, 0xd4) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000100)="db1c66b9ad08000066b8b1c6000066ba000000000f3066b98404000066b85fcb000066ba000000000f300f20573e0f001c3ea466b9df02000066b82900000066ba000000000f30f30f7f48fd05c30066b80b0000000f23c80f21f866350000f0000f23f8", 0x64}], 0x1, 0x50, &(0x7f00000001c0)=[@dstype3={0x7, 0x1}], 0x1) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0105502, &(0x7f0000000000)) 15:13:28 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x800000000000000}) 15:13:28 executing program 3: socket$l2tp(0x18, 0x1, 0x1) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000000)) 15:13:28 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x200001) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) r3 = memfd_create(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 15:13:28 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = dup3(r0, r0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x1b, "987941a48eac6c3512ffeb61eaaa078d20e8785ad32d393e575777"}, &(0x7f0000000080)=0x23) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={r2, 0x9}, &(0x7f0000000140)=0x8) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x7, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0105502, &(0x7f0000000000)) 15:13:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4b49, &(0x7f0000000000)={0xa3}) 15:13:28 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000000)) 15:13:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x6400]}}, 0x1c) 15:13:28 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x400000000000}) 15:13:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)={0xa3}) 15:13:28 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000000)) 15:13:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000140)=""/221, &(0x7f0000000080)=0xdd) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:28 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) write$P9_RMKDIR(r1, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x10, 0x4, 0x5}}, 0x14) [ 804.608357] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8108551b, &(0x7f0000000000)={0xa3}) 15:13:28 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000000)) 15:13:28 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x422, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) 15:13:28 executing program 3: socket$l2tp(0x18, 0x1, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000000)) 15:13:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0189436, &(0x7f0000000000)={0xa3}) 15:13:28 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x300}) 15:13:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xc0ce020000000000]}}, 0x1c) 15:13:29 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000040)={0x32, @dev={0xac, 0x14, 0x14, 0x12}, 0x4e21, 0x4, 'nq\x00', 0x2, 0x1, 0xc}, 0x2c) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0x8, 0x4) 15:13:29 executing program 3: socket$l2tp(0x18, 0x1, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000000)) 15:13:29 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x705000}) 15:13:29 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000000)={0xa3}) 15:13:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) r1 = msgget$private(0x0, 0x106) msgrcv(r1, &(0x7f0000000080)={0x0, ""/18}, 0x1a, 0x0, 0x1000) 15:13:29 executing program 3: socket$l2tp(0x18, 0x1, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000000)) [ 805.396350] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:29 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5514, &(0x7f0000000000)={0xa3}) 15:13:29 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000140)={@dev, @loopback, 0x0}, &(0x7f0000000180)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000001c0)={@remote, 0x10, r2}) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) 15:13:29 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:29 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5452, &(0x7f0000000000)={0xa3}) 15:13:29 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0x81, "f883e32f7fb5f88a3f21f6b153aae4f806412eec7b5a1316ae01879799b4d1f41df0086a8537b8490ef99de1d0a5b639e430d4555ee183044473221373ff3f86279a9de4f26732c1cabe5e0d24def119d35913e02c7a9cc07ff93c8aab5cb41074562f465538d22cce7c8ee7d506c77b6cf331c0ea2650a95e20abbb4f55955bb3"}, &(0x7f0000000300)=0x89) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000340)={r2, 0x1}, 0x8) ioctl(r0, 0x2, &(0x7f0000000200)="f93e6234488dd25d766070") r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$key(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xb0}}, 0x4080) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) socket$bt_bnep(0x1f, 0x3, 0x4) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$TUNSETLINK(r4, 0x400454cd, 0x339) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0105502, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x5}) 15:13:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x8000000]}}, 0x1c) 15:13:29 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:29 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80086601, &(0x7f0000000000)={0xa3}) 15:13:29 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x206002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) 15:13:29 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x3000000}) [ 805.938991] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:30 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x551f, &(0x7f0000000000)={0xa3}) 15:13:30 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x8001, 0x80) ioctl$TIOCCBRK(r1, 0x5428) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r4 = getpid() execveat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000140)='+\x00', &(0x7f0000000180)='/dev/sg#\x00', &(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', &(0x7f00000002c0)='/dev/sg#\x00', &(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000340)='security\x00'], &(0x7f00000004c0)=[&(0x7f0000000400)='/dev/sg#\x00', &(0x7f0000000440)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000480)='/dev/bus/usb/00#/00#\x00'], 0x800) sched_setscheduler(r4, 0x5, &(0x7f0000000200)) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000800)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000005c0)}, &(0x7f0000000600), &(0x7f0000000740)=""/133, 0x0, 0x5, 0x0, &(0x7f0000000680)}) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0105502, &(0x7f0000000000)) write$FUSE_IOCTL(r2, &(0x7f0000000500)={0x20, 0xffffffffffffffda, 0x5, {0x44, 0x0, 0x200, 0x6}}, 0x20) 15:13:30 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x4000}) 15:13:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000080)=@generic={0x0, 0x3, 0x8}) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x501c41, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000480)={0x0, 0x0, 0x2080}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0xe4ffffff]}}, 0x1c) 15:13:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) [ 806.527247] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:30 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4008550c, &(0x7f0000000000)={0xa3}) 15:13:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:30 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x3fffe) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) 15:13:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:30 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8916, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000040)={0x31, 0x6, 0x0, {0x3, 0x6, 0x8, 0x0, 'GPLppp0]'}}, 0x31) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) 15:13:30 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x605000}) 15:13:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:30 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) write$cgroup_pid(r0, &(0x7f0000000100)=r2, 0x12) 15:13:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:30 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488db4c33bc7a497349349f20617d25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) 15:13:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x5c02]}}, 0x1c) 15:13:31 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) [ 807.291691] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:31 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185507, &(0x7f0000000000)={0xa3}) 15:13:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)="6772653000000061478a490080000002") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x6f, 0x2) 15:13:31 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x3}) 15:13:31 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x5, 0x100) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) r3 = mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x10, r2, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000080)={r3}) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0105502, &(0x7f0000000000)) 15:13:31 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:31 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000100)="5a69118b8a42eea7c67ae87f57dbe424423bc6d9d7fd10382def8e2e4954e1555d9987565c21a1db4d872f15", 0x2c, 0xfffffffffffffff8) r3 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000001c0)="3d2a0c9373393d6ac69431d8798a8e8bce063adcac9d7f0fa983bf65e9b9ae7948074959818bcba658d0455839105f9ea5e36968cc074280f50a5dcb4a", 0x3d, 0xfffffffffffffffe) r4 = add_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000002c0)="ff", 0x1, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000300)={r2, r3, r4}, &(0x7f0000000340)=""/25, 0x19, &(0x7f0000000440)={&(0x7f0000000380)={'ghash-generic\x00'}, &(0x7f00000003c0)="519f1e0ed496f1ccd4c694f0b66364162ed0d49dd7cb2471bc247aae6e7f57a9313b5a29a9c153783f565a63f6363a50d3153d23671ead2f1222942c9e50481138ed21bd1d89ee55f76fec76", 0x4c}) 15:13:31 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185503, &(0x7f0000000000)={0xa3}) 15:13:31 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:31 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:31 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551d, &(0x7f0000000000)={0xa3}) 15:13:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x2cec0]}}, 0x1c) 15:13:31 executing program 0: syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x2, 0x80000) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) read$eventfd(r1, &(0x7f0000000180), 0x8) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0105502, &(0x7f0000000000)) timerfd_settime(r2, 0x1, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f0000000080)) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000100)=0x9) 15:13:31 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) [ 807.862620] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) write$P9_RSTAT(r1, &(0x7f0000000140)={0x79, 0x7d, 0x1, {0x0, 0x72, 0x10000000000000, 0xcc, {0x82, 0x2, 0x5}, 0x18000000, 0x5, 0xc72, 0x0, 0x34, 'wlan0wlan0vboxnet0!ppp0*proc,cgroupselinuxlotrusted@', 0x0, "", 0x5, 'eth1>', 0x6, 'btrfs\x00'}}, 0x79) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:31 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40085511, &(0x7f0000000000)={0xa3}) 15:13:31 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:31 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x7fffffffefff}) 15:13:31 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x40000) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f00000002c0)={0x4, 0x6, 0xe96, 0x2, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}]}) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x3) r2 = request_key(&(0x7f0000000400)='blacklist\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000480)='+bdevbdevvmnet1/ppp0\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r2) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0105502, &(0x7f0000000000)) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='./file0\x00') 15:13:32 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:32 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000000)={0xa3}) 15:13:32 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x88000000008, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) 15:13:32 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc018556c, &(0x7f0000000000)={0xa3}) 15:13:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x4002]}}, 0x1c) 15:13:32 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:32 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)=0xffffffffffff6bb3) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000340)) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x9}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000600)='cgroup.type\x00', 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="07000000743f4ff3058a0a"], &(0x7f0000000400)=0xf) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000440)={r5, 0xfffffffffffffff7, 0x7, 0x2}, 0x10) ioctl$FS_IOC_FSGETXATTR(r4, 0xc0105502, &(0x7f0000000000)) [ 808.367040] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)='bridge_s`ave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:32 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:32 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105502, &(0x7f0000000000)={0xa3}) 15:13:32 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x930000000000}) 15:13:32 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4b47, &(0x7f0000000000)={0xa3}) 15:13:32 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:32 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x506000}) 15:13:32 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008550e, &(0x7f0000000000)={0xa3}) 15:13:32 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x8a03]}}, 0x1c) 15:13:32 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40086602, &(0x7f0000000000)={0xa3}) [ 809.039583] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:13:33 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x5) 15:13:33 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:33 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0x50700000000000}) 15:13:33 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5450, &(0x7f0000000000)={0xa3}) 15:13:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x3, &(0x7f0000000100)="820499a186e5846c6bcd4a864d433fc3df06bebdb4c1ff63a91420017276f013877ae2c5ed6f7574aa24561bd053b12ce72fb40000000000000000a4b3046d633a78016d5bedc5c191f73d1e125eb41811d6b6ed7ab95e") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000000c0)='bridge_slave_1\x00') 15:13:33 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc00c5512, &(0x7f0000000000)={0xa3}) 15:13:33 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000000)) 15:13:33 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 15:13:33 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.events\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000100)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0xc0105502, &(0x7f0000000000)) 15:13:33 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185505, &(0x7f0000000000)={0xa3}) 15:13:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x13a, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x44000, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x7]}}, 0x1c) 15:13:33 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x80045505, &(0x7f0000000000)) 15:13:33 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0xa1}) 15:13:33 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105502, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{}, {}, {}]}) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f00000001c0)) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x800}, 0x4) 15:13:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x80, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000240)) open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0xdd39, 0x4000) getsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) 15:13:33 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000080)={0xa0, 0x2000000, 0xffefffffff7f0000}) [ 809.893486] kasan: CONFIG_KASAN_INLINE enabled [ 809.902909] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 809.911864] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 809.918128] CPU: 1 PID: 12732 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #27 [ 809.924812] kobject: 'loop4' (000000004ae79e36): kobject_uevent_env [ 809.925408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 809.925435] RIP: 0010:usb_find_alt_setting+0x38/0x310 [ 809.925461] Code: 89 fb 48 83 ec 18 48 89 7d c0 89 55 d4 89 75 d0 e8 dd c8 7e fc 48 8d 7b 04 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 84 02 00 00 [ 809.932178] kobject: 'loop4' (000000004ae79e36): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 809.941211] RSP: 0018:ffff88018d11f4a0 EFLAGS: 00010247 [ 809.941226] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90002eec000 [ 809.941236] RDX: 0000000000000000 RSI: ffffffff85000ba3 RDI: 0000000000000004 [ 809.941246] RBP: ffff88018d11f4e0 R08: ffff8801bc9826c0 R09: ffffed0031a23eb2 [ 809.941255] R10: ffffed0031a23eb4 R11: ffff88018d11f5a7 R12: 0000000000000000 [ 809.941264] R13: ffff8801ce3b5600 R14: ffff8801d8df0780 R15: 0000000000000000 [ 809.941275] FS: 00007f3d4e733700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 809.941285] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 809.941293] CR2: 0000000000720488 CR3: 00000001cd5f4000 CR4: 00000000001406e0 [ 809.941311] Call Trace: [ 809.963718] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 809.965438] check_ctrlrecip+0x1e6/0x320 [ 809.965456] ? _copy_from_user+0xdf/0x150 [ 809.965481] proc_control+0x151/0xef0 [ 810.062722] ? mark_held_locks+0x130/0x130 [ 810.066974] ? proc_bulk+0xa70/0xa70 [ 810.070702] usbdev_do_ioctl+0x1eb8/0x3b50 [ 810.074941] ? processcompl_compat+0x680/0x680 [ 810.079541] ? futex_wait+0x5ec/0xa50 [ 810.083347] ? zap_class+0x640/0x640 [ 810.087062] ? mark_held_locks+0x130/0x130 [ 810.091300] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 810.096490] ? graph_lock+0x170/0x170 [ 810.100300] ? drop_futex_key_refs.isra.15+0x6d/0xe0 [ 810.105888] ? futex_wake+0x304/0x760 [ 810.109695] ? check_preemption_disabled+0x48/0x200 [ 810.115220] ? find_held_lock+0x36/0x1c0 [ 810.119287] ? avc_has_extended_perms+0x8cb/0x15a0 [ 810.124218] ? lock_downgrade+0x900/0x900 [ 810.128364] ? check_preemption_disabled+0x48/0x200 [ 810.133385] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 810.139185] ? kasan_check_read+0x11/0x20 [ 810.143334] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 810.148614] ? rcu_bh_qs+0xc0/0xc0 [ 810.152157] ? rcu_bh_qs+0xc0/0xc0 [ 810.155705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 810.161244] ? avc_has_extended_perms+0xab2/0x15a0 [ 810.166187] ? avc_ss_reset+0x190/0x190 [ 810.170169] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 810.175974] ? kasan_check_read+0x11/0x20 [ 810.180131] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 810.185407] ? rcu_bh_qs+0xc0/0xc0 [ 810.188975] ? ___might_sleep+0x1ed/0x300 [ 810.193133] ? arch_local_save_flags+0x40/0x40 [ 810.197727] ? kasan_check_write+0x14/0x20 [ 810.201975] ? trace_hardirqs_off+0xb8/0x310 [ 810.206444] usbdev_ioctl+0x25/0x30 [ 810.210076] ? usbdev_compat_ioctl+0x30/0x30 [ 810.214487] do_vfs_ioctl+0x1de/0x1720 [ 810.218386] ? ioctl_preallocate+0x300/0x300 [ 810.222800] ? selinux_file_mprotect+0x620/0x620 [ 810.227561] ? rcu_read_lock_sched_held+0x108/0x120 [ 810.232589] ? __x64_sys_futex+0x47f/0x6a0 [ 810.236828] ? do_syscall_64+0x9a/0x820 [ 810.240807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 810.246347] ? security_file_ioctl+0x94/0xc0 [ 810.250761] ksys_ioctl+0xa9/0xd0 [ 810.254218] __x64_sys_ioctl+0x73/0xb0 [ 810.258112] do_syscall_64+0x1b9/0x820 [ 810.262005] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 810.267377] ? syscall_return_slowpath+0x5e0/0x5e0 [ 810.272310] ? trace_hardirqs_on_caller+0x310/0x310 [ 810.277329] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 810.282347] ? recalc_sigpending_tsk+0x180/0x180 [ 810.287107] ? kasan_check_write+0x14/0x20 [ 810.291347] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 810.296200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.301388] RIP: 0033:0x457679 [ 810.304585] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 810.323508] RSP: 002b:00007f3d4e732c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 810.331223] RAX: ffffffffffffffda RBX: 00007f3d4e7336d4 RCX: 0000000000457679 [ 810.338491] RDX: 0000000020000000 RSI: 00000000c0185500 RDI: 0000000000000003 [ 810.345765] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 810.353034] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 810.360300] R13: 00000000004cf508 R14: 00000000004bf7f2 R15: 0000000000000000 [ 810.367578] Modules linked in: [ 810.373647] ---[ end trace a4feae268a6a908e ]--- [ 810.378502] RIP: 0010:usb_find_alt_setting+0x38/0x310 [ 810.384627] kobject: 'loop4' (000000004ae79e36): kobject_uevent_env [ 810.384757] Code: 89 fb 48 83 ec 18 48 89 7d c0 89 55 d4 89 75 d0 e8 dd c8 7e fc 48 8d 7b 04 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 84 02 00 00 [ 810.406955] kobject: 'loop4' (000000004ae79e36): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 810.410661] RSP: 0018:ffff88018d11f4a0 EFLAGS: 00010247 [ 810.427665] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90002eec000 [ 810.436429] RDX: 0000000000000000 RSI: ffffffff85000ba3 RDI: 0000000000000004 15:13:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8915, &(0x7f0000000180)="153f6234488dd25d766070") open$dir(&(0x7f0000000040)='./file0\x00', 0x4040, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x401) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='bridge_slave_0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1000, &(0x7f0000000440)=ANY=[@ANYRES32]) set_tid_address(&(0x7f0000000080)) [ 810.444168] RBP: ffff88018d11f4e0 R08: ffff8801bc9826c0 R09: ffffed0031a23eb2 [ 810.452336] R10: ffffed0031a23eb4 R11: ffff88018d11f5a7 R12: 0000000000000000 [ 810.460003] R13: ffff8801ce3b5600 R14: ffff8801d8df0780 R15: 0000000000000000 [ 810.467567] FS: 00007f3d4e733700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 810.476126] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 810.478631] kobject: 'loop4' (000000004ae79e36): kobject_uevent_env [ 810.482408] CR2: 0000001b2f127000 CR3: 00000001cd5f4000 CR4: 00000000001406e0 [ 810.490662] kobject: 'loop4' (000000004ae79e36): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 810.496245] Kernel panic - not syncing: Fatal exception [ 810.511861] Kernel Offset: disabled [ 810.515487] Rebooting in 86400 seconds..