9bc58a456363ada529ac37022cc9a06875d2be4e5d39880ee8d85c6673af64e5a8361902f1bb5804bdd7d70570f970c4a98425606468d363c841fc4e7badae2c390867d5d09b40423ed209eb19e98e8ffb1f255743a31ea5d61a917450b3b000f5486f8212672ea0f47dbb62bfbb4ae93", 0x9b}, {&(0x7f0000000400)="1a84e1e9695c3b73d92e6a6785a8423f2dc4e34885de1df5774ed23143aaf5faddf0d2e3685d42e05a596d9a28c7aa784b52a5b342fe25fa45ae927c9194897eb677a692f6c974f3a460e27e551bed8ca9670ef38c0df605a549c679fbc7b6ddc8bf6688d0b134123691210e3508332a34843397e8ba7852308436cfc0403e9dd7b698045031bc36c644f4f4f6a16d6e26d65f1f7f03fac72b38eba7743b34f8a415f21abe741e0fda878efebc101e7b67763e2aa211e22695946cddb91af15a3489ac2e22e4124807169e16e1430d", 0xcf}, {&(0x7f0000000500)="6d25c4614d7d5cf708f98698be18bb55c24f052d3f64ddd887ed8a13e5133582c9cccc711849b85682e7d663b2cf281769390697a8c9639d1fae2ff49dca6cd535ac9105dbb2ba50ffef8a2be589c14a92e6ecca2874b5199443b562e0eb3d3be49c23363720c1a7fa49aa52ab94e298dcd8b6e94c3d8b11538fd42b2680b76eed1365b1b5fff13aa48fc91c5e4b988ae06e143260b3867c8d74a29f12bbb3ef12059efdaf1ed664fafd706c46c42fb5e6545fd7", 0xb4}, {&(0x7f00000005c0)="6528cb0a298ec0c6b792e9024222aeeea80abfd9b5bea842f74a7c580dfd915e07cceeb3354778bec5a9bf98ca50384cc04090ebd964a816d7874dcdd40fc7c764", 0x41}, {&(0x7f0000000640)="6555851c39dabd7dce1ad775e07dd3a8065408dbde30660e11b2a2ea223d61b5df3d154ef53015eac89e623078de0e4ab5f8cae7ce02b75951378083aea4dd6b37f4e1ebdd98b516830800d9faa96a47714aa411f90b7130b0c9c36d9433c37f10a84392754eb5d40d68d9124e0294f5a7b854266e2642fecc4e7c2bfda8099d314bcdba5482eb1f91a077383fbfe6bf7cfb4005", 0x94}], 0x5, &(0x7f0000000200)}}, {{&(0x7f0000000780)=@ipx={0x4, 0x7, 0x9bec, "28d70259add0", 0xafdc250}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000800)="44ff22c51be59117d568295384d28ba8d3e1b95f93a744376c4a88b37736c70ed02660dbc642681050ebd6894f12a2da2580c7b66a120f37254d7a70ccdd87c96dce76991f03982d4a6e70084627404cfe340081d3032c3cb43d2bef3904e11c69d4747516747bde3afdaf6908d9dddbd6c9b19de9d7e12a", 0x78}, {&(0x7f0000000880)="8908d879e9bf779a1f6931604125f8a5c83c78cc14ef8c5df75c92286b980cba9a29cc0f1678118bad54462c587f1ed0d27d2d25bb758dba5c3e28649855c553e3147146b1993b8ca8dabbeed7ef3af2b3171506d3aee47e6d4f0173e4248e8883c85b031458edeeda5d4667163a45e85b4b53dedf2d4c2c541d951cd5a262c03074a6def0979c6233ff82d72b9022f6b19a019fb1728daa7571afc729f3ae1e139fc25d9cfc63b6e586145fb22580af3968762801b260f07c3a12daf3f1beff09e903991f679a2367c925c6fe4a2aec771febb3ecc36b3fe3dfe4334d149fce474d4068a575c93e2a0f93c9e4ce", 0xee}], 0x2, &(0x7f00000009c0)=[@timestamping={{0x14, 0x1, 0x25, 0x80000000}}, @mark={{0x14, 0x1, 0x24, 0xfffffffffffffffe}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x1ff}}], 0x60}}, {{&(0x7f0000000a40)=@llc={0x1a, 0x305, 0x1, 0xfe, 0x3, 0x6, @dev={[], 0xd}}, 0x80, &(0x7f0000002200)=[{&(0x7f0000000ac0)='A', 0x1}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f0000001b00)="86144dc0100c65c744fc1726b90d3d524b5a813c19e7f03b9fa28ff38940583762236082d624c93166574a379f33e020ed59e3b7423039ddb74f65332e29f1c3f283cb6d08fdbacccfd4beb1f8442bc2f1f1571b485467ad83b90ac4d28eb84400d6b6a3ac50ceb37fbdec739fa572f158d44ec622b919d07af20d1fac0bfdebd1dc20d1aa9f3202e79c54967d37216f6c71d10dffef078bc5ea227358b68e3e41a68d9a20a271cc64c18ba6657f03e920a187da1df04ccc95647b3fc576c1187e73e7092f68923a9e933a2798106979526c5af78a86662837613a7a4c0a36375510", 0xe2}, {&(0x7f0000001c00)="7fd88034c3296a5e0619aa09db82e01118aefbf0440a195d8d9f1f6bbb858d3452f353cbb24d833bc13141f470ebdadf93e0dc4afc673af253cf4616c3e3a4f5dea0d86293cf59d951a06e97e0b224f13e77eadb861eb268b5e9e8257aaf824fcd21bdef65a443dbda6dc2c43c2a40b2304f0e03456355813ea66aa4fb393d5a2b6cd4a8506263859e3377fdc8c73425757e0f40124fc76dfa545e1e9909c623b88a2bfd51b00ddad7a07b8f58fd2db5b810a0bc49ee0327982cdc1169ae6a4e32cb6adfd5819f76d16a875b6109d7b514b13ef6", 0xd4}, {&(0x7f0000001d00)="2941c8df4a485252760f52c04f41e2f197b152e4bd7e3cfacabc2b7ed781527355729172aa0de30ab6398f2651b80f2c391274441cf48b371fa8b4e8679c75aa81415a5649636899fc1e739f2a85d93478438d7c0da2548fdd3d77f1ca86e3ff0c59b2590c617b7e0beaf24aee560affee17e2983d400575dcae6b290da29dad105d0db2b5f938bb69ded5df7e0346f175322f308594840a886d22cb29d1a8a703a2bcf3d711fd3a4d18f7940a1a6c1d63be90f1c4253852244a660b773844eca4ddd5969a5d4b9e59efa6e5678a4aeefa4e1a42b702514bf65d95417a6384df36cc9b93fe5ac5062b7085e0747bfbe748", 0xf1}, {&(0x7f0000001e00)="ce6984f6bfb5e04f23e99a542e2e166b5e1204b52884c830fce23800969b", 0x1e}, {&(0x7f0000001e40)="990e740c90dfccb25d618ffd949c24c0de4fe69afcbe121b2b17cfaa76e1fde37b1ae2f9bdc45410732c68e2c851b6eaaa8facda917519aaf342da29852b7bf8d03e868949eb0804a6c49faa3a5b0beff5ac84f87077158505ae7c0f76d204c66659050472132aac29d0560a254e37a9b2b1d9f4b42f9fec360dfcb42a08178d38da49d417dac524881ca37e14529beb0a21b95d7bc0ed7e7754e46934e4b064c2ebddce2ef4419071555e703205a6b4a8c92e31", 0xb4}, {&(0x7f0000001f00)="9f47911d3e444b6d764c823cdcd1d9826b853db2a3e4373fbd6785a018171a85a71fa660b9a48e5fd0299b78367b7e8825d8d17d25eebdff1907a6df222b89889f864d1ff361a513332647292aa79408434baaa6fbeafa50babd5f312c97bbdd1d636a3b669e0f2c7cbe0b059faa9d7b5c092f3f68d653f36792e66815c527a32a9213a2394d4fad17f38144c18bd06bde0be46b1bf26475c34a23b495db0a3b4ae6975c50fd1e18892cf0774023ee4e97d77803eea1e87d11a9710f3f949964e2bc560a697e696b2c", 0xc9}, {&(0x7f0000002000)="82a89c963c61e18e3d0e80527af5d1d76847b6054afebc95e60c905f3d409afff6d56d8a746276613d1b8ef112df40f7c7c178e3989b71447552cb42e7ba1da5dc9dee306c3cf4a17b4cf60067ae08eb1bb1b15786b176b2e4d314bcd442720d0d3ae3445750c6aa0375986671cd63e8902e0f89a391f5343cb6e08224515acb29893700c1e473f1fcc8f840707ec4a118d18cfb938e3aa5f4162db1530c08558ec2d83540a242a10701310e8642c53775248b12f758f07792c3f5225cec89a61df5144b8dc5e741d04fb8adbf1ba9a9c9", 0xd1}, {&(0x7f0000002100)="4e170b7a074e14190ed1be304475a8bc98ab7695f0ed22dff7d9138a74ff36097aafa7227ad09fccf92c8c6bcd03e9a9d70f2439d2bb345415bbe1c463f7c147897e3c0b1369897923b87c5b215350baab0f9d67cf41178055eac4936f6eebf28f22de86d7102055586be54569daeb250d69f27b69c48a74f49894115a0c3dda677939a8cb8363843842f8dc03f676d6e0a355f5c6366e00c7f6fbcf89cd2862bcac3430dee726fd295dab31168570a0faf8f06667415d942aee7f8b904c53d6475201b23548366e8df3bba0", 0xcc}], 0xa, &(0x7f00000022c0)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x3ff}}, @timestamping={{0x14, 0x1, 0x25, 0x200}}], 0xa8}}, {{&(0x7f0000002380)=@nfc_llcp={0x27, 0x0, 0x1, 0x1, 0x1, 0xea59, "c51f02e7dc33ff199f9e02deb335117b9312aaee0ff9cec4065ee094a230f5a7143cebb15e8622684c489700a2503362a0526eea58fe78de4dc3466d11362b", 0x23}, 0x80, &(0x7f0000002480)=[{&(0x7f0000002400)="6105b65dbd82c90826cd27c08e32ffc97a25da023fcee263735bfad32fb6a8de6a16baf7a2793c480777b74cd5de790a196024bafbc1d49c383b015796ab4062f5f2a5f658", 0x45}, {&(0x7f0000003180)="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", 0x1000}], 0x2, &(0x7f00000024c0)=[@txtime={{0x18, 0x1, 0x3d, 0x72f800000000000}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0xbab}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0xf4b}}, @mark={{0x14, 0x1, 0x24, 0x8000}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0xe43b}}], 0xd8}}, {{&(0x7f00000025c0)=@caif=@rfm={0x25, 0x10001, "d70213acd379125885b7899c5ac45e75"}, 0x80, &(0x7f0000002880)=[{&(0x7f0000002640)="d4aad45411c6cb8d2446c186151cf02f78f4878c79b37e1e62d4f75a8804001a07e8bcdac4fa6d1597c3edd6bc584b088df6451a90efc5e098438934652bacefa03338c34d923be75c16bd88266f47e054215bb352ab8b897ef324d49d75341c3fe99a5114731ec96f4af835532700cda6a5e257a7b0b237b4f22897e9d96045c0d5d27891cefd101ab2549ac5c667e1501772ac62cf97c62d888b402e585f0e65fbb340bb00683d81dc6c08ccdd0b8d6189c9ab871c86c3b9985dba11", 0xbd}, {&(0x7f0000002700)="e77f194f9be11d949e9be3fbfc83fc2638568257d2b564778fd744b4fd0368dac3b3ec74eeb731f22d755a2d01a1ffb38abe748eaaf99c6ca4b7e150", 0x3c}, {&(0x7f0000002740)="90719cbc4d3cc909b4b58673833283ab2c402530f57c8383dc8d1fede8c93bd0bd806ade046b329deb2002bfd701f8f0bcb1b88b1e20bccef1c53d0fba564268d4ca53ce6ae4f53ce0507907b345b7dc4f31bf496c11f287f3136a0f2c2aa703aa167572c77d6f791c8bc4d783eef4db9fa675e84df0d8196c127e74407af26ac3f31269038748807dd66c258062", 0x8e}, {&(0x7f0000002800)="9412c4ec7057c363a7c004f24d50c5e19ccbc94633cca39b4884d499cd38f08f818944f593cf367d19b2cdba0a1db8ea5d1256fdec6bcb63f5df060693ca6941aab24b21edb597c4", 0x48}], 0x4, &(0x7f00000028c0)=[@mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x48}}, {{&(0x7f0000002940)=@generic={0x0, "c753498b3a1227785d841258bed6bdb87c08a760853235373e382fe67357f4b691b7314d1122adc4009f608ba7eaac8a1199691e132f549177f667a66ee4d62530298b7e1351f530e6799941d5c86bf2d4b7696860071511cd0216e1e722d985f3804f003fc69a615a8374b1f905135a32dd80ab39d4f125481bd67c9e9e"}, 0x80, &(0x7f0000002a80)=[{&(0x7f00000029c0)="dbf1831f5f88ee0ee387634fad475dedb13000553098c5fbf8ba392dfaf24d2918c160a18bab0fc4797bcdd6127eab3e207a65482a6295301902f77f1cf2bf55218e6c59710f015430781bda5869b298a5c712e821e10aea5e8f4069fead9ea380551d76efdff31029177c2bdcefeac6b176a96fcc35b44f41d65ce74de132bf49554818c6a1de9ec48b1ec82a", 0x8d}], 0x1, &(0x7f0000002ac0)=[@mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x96}}], 0x30}}], 0x6, 0x200000c8) r1 = socket$alg(0x26, 0x5, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000002dc0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000002d80)={&(0x7f0000004180)=ANY=[@ANYBLOB="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"], 0xe8}, 0x1, 0x0, 0x0, 0x4004000}, 0x80801) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$rose(r2, 0x104, 0x3, &(0x7f0000000040)=0x20, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = syz_open_dev$mouse(&(0x7f0000002c80)='/dev/input/mouse#\x00', 0x3, 0x40000) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r6, r7, 0x0, 0x50000000000443) recvmmsg(r6, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000002cc0)={0x0, 0x3}, &(0x7f0000002d00)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r4, 0x84, 0x78, &(0x7f0000002d40)=r8, 0x4) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r10, r11, 0x0, 0x50000000000443) getsockname$netrom(r11, &(0x7f0000000080)={{}, [@bcast, @netrom, @netrom, @rose, @null, @remote, @remote, @bcast]}, &(0x7f0000000100)=0x48) connect$bt_sco(r3, &(0x7f0000000000)={0x1f, {0x2, 0x40, 0x8bc, 0x80000000, 0x6, 0x10001}}, 0x8) [ 590.755849][T24624] binder: 24623:24624 ioctl c018620c 20000180 returned -1 [ 590.758024][T24639] binder: 24638:24639 ioctl c018620c 20000180 returned -22 [ 590.823320][T24649] binder: BINDER_SET_CONTEXT_MGR already set [ 590.861612][T24649] binder: 24648:24649 ioctl 40046207 0 returned -16 00:28:23 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x1, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 590.873224][T24649] binder: 24648:24649 ioctl c018620c 20000180 returned -22 [ 590.911967][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 591.003025][T24659] debugfs: File '24656' in directory 'proc' already present! [ 591.042992][T24659] binder: 24656:24659 unknown command 5 [ 591.062706][T24659] binder: 24656:24659 ioctl c0306201 20012000 returned -22 [ 591.096711][T24659] binder: 24656:24659 ioctl c018620c 20000180 returned -22 00:28:23 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:23 executing program 0: getpid() openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x15, "81b267b5bc192ee3db550264c172c62ce377f891e25a3835f604bc5a490c5073c0d1a14e1a1686c76cd5b20d692dbbc2e6d1d91086eadac8c7c195b01f8a0460", "8737516a07d8acd26a5e36d94eaf074c7a8ca201c36324d42f7a03826f7969ac61a35b7ff311d12367f00f1f6dd73bb3d5a4694d49ff5a7db7a2e2ccff1ec6c3", "c40df7828af21d4383a4c73432f9fef39b69b7cd1a156f8c744b53b2c0106fe3", [0x0, 0x7fff]}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:23 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:23 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x6, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="056304400000"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 591.223895][T24665] debugfs: File '24664' in directory 'proc' already present! [ 591.274220][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 591.299586][T24665] binder: 24664:24665 ioctl c018620c 20000180 returned -22 [ 591.311043][T24673] binder: BINDER_SET_CONTEXT_MGR already set [ 591.328837][T24673] binder: 24671:24673 ioctl 40046207 0 returned -16 [ 591.346981][T24666] binder: BINDER_SET_CONTEXT_MGR already set [ 591.348646][T24673] debugfs: File '24671' in directory 'proc' already present! [ 591.359434][T24666] binder: 24663:24666 ioctl 40046207 0 returned -16 00:28:23 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 591.397113][T24666] debugfs: File '24663' in directory 'proc' already present! 00:28:23 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x1, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 591.441621][T24666] binder: 24663:24666 unknown command -162021415 [ 591.464835][T24666] binder: 24663:24666 ioctl c0306201 20012000 returned -22 [ 591.529537][T24681] binder: BINDER_SET_CONTEXT_MGR already set [ 591.537778][T24680] debugfs: File '24679' in directory 'proc' already present! [ 591.555059][T24681] binder: 24677:24681 ioctl 40046207 0 returned -16 [ 591.555115][T24678] binder: 24663:24678 ioctl c018620c 20000180 returned -1 [ 591.571759][T24666] binder: BINDER_SET_CONTEXT_MGR already set 00:28:23 executing program 1: pipe(0x0) pipe(&(0x7f0000000440)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = dup(0xffffffffffffffff) connect$pppoe(r3, &(0x7f00000000c0)={0x18, 0x0, {0x3, @remote, 'bridge0\x00'}}, 0x1e) dup2(0xffffffffffffffff, r2) sendmsg$SEG6_CMD_SETHMAC(r3, 0x0, 0x4000) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 591.572466][T24680] binder: 24679:24680 unknown command 5 [ 591.584571][T24666] binder: 24663:24666 ioctl 40046207 0 returned -16 [ 591.592635][T24681] debugfs: File '24677' in directory 'proc' already present! [ 591.614522][T24680] binder: 24679:24680 ioctl c0306201 20012000 returned -22 [ 591.618865][T24681] binder: 24677:24681 unknown command -162021415 [ 591.635111][T24681] binder: 24677:24681 ioctl c0306201 20012000 returned -22 [ 591.651253][T24680] binder: 24679:24680 ioctl c018620c 20000180 returned -22 [ 591.681268][T24681] binder: BINDER_SET_CONTEXT_MGR already set [ 591.698540][T24681] binder: 24677:24681 ioctl 40046207 0 returned -16 00:28:24 executing program 0: pipe(0x0) pipe(&(0x7f0000000440)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = dup(0xffffffffffffffff) connect$pppoe(r3, &(0x7f00000000c0)={0x18, 0x0, {0x3, @remote, 'bridge0\x00'}}, 0x1e) dup2(0xffffffffffffffff, r2) sendmsg$SEG6_CMD_SETHMAC(r3, 0x0, 0x4000) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:24 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r5, r6, 0x0, 0x50000000000443) renameat(r3, &(0x7f0000000000)='./file0\x00', r6, &(0x7f0000000040)='./file0\x00') 00:28:24 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x1, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 591.764200][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 591.777991][T24681] binder: 24677:24681 ioctl c018620c 20000180 returned -1 00:28:24 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 591.956023][T24698] debugfs: File '24697' in directory 'proc' already present! [ 591.974968][T24698] binder: 24697:24698 unknown command 5 [ 591.996049][T24703] binder: BINDER_SET_CONTEXT_MGR already set [ 591.996077][T24698] binder: 24697:24698 ioctl c0306201 20012000 returned -22 [ 592.004371][T24703] binder: 24702:24703 ioctl 40046207 0 returned -16 [ 592.019252][T24703] debugfs: File '24702' in directory 'proc' already present! [ 592.031850][T24703] binder: 24702:24703 unknown command -162021415 [ 592.039128][T24703] binder: 24702:24703 ioctl c0306201 20012000 returned -22 [ 592.050585][T24703] binder: BINDER_SET_CONTEXT_MGR already set 00:28:24 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 592.057632][T24703] binder: 24702:24703 ioctl 40046207 0 returned -16 [ 592.062491][T24698] binder: 24697:24698 ioctl c018620c 20000180 returned -22 [ 592.067559][T24703] binder: 24702:24703 ioctl c018620c 20000180 returned -1 00:28:24 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x1, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:24 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:24 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 592.223508][T24711] debugfs: File '24710' in directory 'proc' already present! [ 592.255231][T24713] binder: BINDER_SET_CONTEXT_MGR already set [ 592.262353][T24711] binder: 24710:24711 unknown command 5 [ 592.268149][T24713] binder: 24712:24713 ioctl 40046207 0 returned -16 [ 592.277958][T24711] binder: 24710:24711 ioctl c0306201 20012000 returned -22 [ 592.287469][T24713] debugfs: File '24712' in directory 'proc' already present! [ 592.297797][T24711] binder: BINDER_SET_CONTEXT_MGR already set [ 592.306293][T24711] binder: 24710:24711 ioctl 40046207 0 returned -16 [ 592.313507][T24713] binder: 24712:24713 unknown command -162021415 00:28:24 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 592.321602][T24713] binder: 24712:24713 ioctl c0306201 20012000 returned -22 [ 592.330010][T24711] binder: 24710:24711 ioctl c018620c 20000180 returned -1 [ 592.341176][T24713] binder: 24712:24713 ioctl c018620c 20000180 returned -22 00:28:24 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:24 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 592.455509][T24721] debugfs: File '24720' in directory 'proc' already present! [ 592.480622][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:25 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:25 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:25 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x2, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:25 executing program 0: pipe(0x0) pipe(&(0x7f0000000440)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = dup(0xffffffffffffffff) connect$pppoe(r3, &(0x7f00000000c0)={0x18, 0x0, {0x3, @remote, 'bridge0\x00'}}, 0x1e) dup2(0xffffffffffffffff, r2) sendmsg$SEG6_CMD_SETHMAC(r3, 0x0, 0x4000) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:25 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) unshare(0x4b3797b2df007bca) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:25 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 592.778917][T24734] debugfs: File '24733' in directory 'proc' already present! [ 592.779441][T24740] binder: BINDER_SET_CONTEXT_MGR already set [ 592.812366][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:25 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000000)=0x101, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) [ 592.823545][T24747] binder: BINDER_SET_CONTEXT_MGR already set [ 592.853089][T24740] binder: 24738:24740 ioctl 40046207 0 returned -16 [ 592.884322][T24747] binder: 24738:24747 ioctl 40046207 0 returned -16 [ 592.884834][T24751] binder: 24738:24751 ioctl c018620c 20000180 returned -1 [ 592.895532][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 592.899202][T24734] binder: 24733:24734 ioctl c018620c 20000180 returned -22 00:28:25 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:25 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:25 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x2, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 593.096606][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 593.102099][T24759] debugfs: File '24758' in directory 'proc' already present! [ 593.182204][T24766] binder: BINDER_SET_CONTEXT_MGR already set [ 593.202456][T24765] binder: BINDER_SET_CONTEXT_MGR already set [ 593.208957][T24766] binder: 24758:24766 ioctl 40046207 0 returned -16 [ 593.226961][T24765] binder: 24764:24765 ioctl 40046207 0 returned -16 [ 593.247123][T24759] binder: 24758:24759 ioctl c018620c 20000180 returned -22 00:28:25 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 593.273891][T24765] binder: BINDER_SET_CONTEXT_MGR already set [ 593.320528][T24765] binder: 24764:24765 ioctl 40046207 0 returned -16 [ 593.320931][T24767] binder: 24764:24767 ioctl c018620c 20000180 returned -1 00:28:25 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:25 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 593.403830][T24770] debugfs: File '24769' in directory 'proc' already present! [ 593.427870][T24770] binder: 24769:24770 unknown command -162021415 00:28:25 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:25 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x2, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 593.461432][T24770] binder: 24769:24770 ioctl c0306201 20012000 returned -22 00:28:25 executing program 0: pipe(0x0) pipe(&(0x7f0000000440)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = dup(0xffffffffffffffff) connect$pppoe(r3, &(0x7f00000000c0)={0x18, 0x0, {0x3, @remote, 'bridge0\x00'}}, 0x1e) dup2(0xffffffffffffffff, r2) sendmsg$SEG6_CMD_SETHMAC(r3, 0x0, 0x4000) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:25 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:25 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 593.559252][T24781] debugfs: File '24779' in directory 'proc' already present! [ 593.576818][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 593.593696][T24781] binder: 24779:24781 unknown command 25349 [ 593.636231][T24781] binder: 24779:24781 ioctl c0306201 20012000 returned -22 [ 593.673150][T24785] binder: 24779:24785 ioctl c018620c 20000180 returned -22 00:28:26 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$KDGKBLED(r3, 0x4b64, &(0x7f0000000000)) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:26 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:26 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:26 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x3, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="056304"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:26 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:26 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 593.925949][T24806] debugfs: File '24804' in directory 'proc' already present! [ 593.967350][T24806] binder: 24804:24806 unknown command 287493 [ 594.000871][T24806] binder: 24804:24806 ioctl c0306201 20012000 returned -22 [ 594.030392][T24806] binder: 24804:24806 ioctl c018620c 20000180 returned -22 00:28:26 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:26 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:26 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 594.224208][T24820] debugfs: File '24819' in directory 'proc' already present! [ 594.258781][T24820] binder: 24819:24820 unknown command -162021415 [ 594.266451][T24820] binder: 24819:24820 ioctl c0306201 20012000 returned -22 [ 594.275681][T24820] binder: 24819:24820 ioctl c018620c 20000180 returned -22 [ 594.287582][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:26 executing program 0: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:26 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x3, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="056304"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:26 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 594.500657][T24830] debugfs: File '24829' in directory 'proc' already present! [ 594.540119][T24830] binder: 24829:24830 unknown command 287493 [ 594.557954][T24830] binder: 24829:24830 ioctl c0306201 20012000 returned -22 [ 594.606815][T24830] binder: 24829:24830 ioctl c018620c 20000180 returned -22 00:28:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) finit_module(r0, &(0x7f0000000000)='net/ip6_mr_vif\x00', 0x3) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) 00:28:27 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:27 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:27 executing program 1: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x15, "81b267b5bc192ee3db550264c172c62ce377f891e25a3835f604bc5a490c5073c0d1a14e1a1686c76cd5b20d692dbbc2e6d1d91086eadac8c7c195b01f8a0460", "8737516a07d8acd26a5e36d94eaf074c7a8ca201c36324d42f7a03826f7969ac61a35b7ff311d12367f00f1f6dd73bb3d5a4694d49ff5a7db7a2e2ccff1ec6c3", "c40df7828af21d4383a4c73432f9fef39b69b7cd1a156f8c744b53b2c0106fe3", [0x0, 0x7fff]}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:27 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x3, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="056304"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:27 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 594.768390][T24847] debugfs: File '24845' in directory 'proc' already present! [ 594.810494][T24847] binder: 24845:24847 unknown command 287493 [ 594.821243][T24849] debugfs: File '24846' in directory 'proc' already present! [ 594.837966][T24844] binder: BINDER_SET_CONTEXT_MGR already set [ 594.846065][T24847] binder: 24845:24847 ioctl c0306201 20012000 returned -22 [ 594.856223][T24844] binder: 24841:24844 ioctl 40046207 0 returned -16 [ 594.858187][T24849] binder: 24846:24849 unknown command -162021415 [ 594.870684][T24847] binder: BINDER_SET_CONTEXT_MGR already set [ 594.892656][T24844] debugfs: File '24841' in directory 'proc' already present! [ 594.894766][T24849] binder: 24846:24849 ioctl c0306201 20012000 returned -22 00:28:27 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:27 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001300)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x1) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @loopback}, &(0x7f0000000040)=0xc) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r4, r5, 0x0, 0x50000000000443) name_to_handle_at(r5, &(0x7f0000000080)='./file0\x00', &(0x7f0000001380)=ANY=[@ANYBLOB="6e3c807949000000900000007d57e63bfbf148c8b0bd3558e79c3d04141bf60c3846c7e6decc1f004b49d1fd02a35bf99066de683748d551311698ada8855fa48c953193f12ecea600da2c3e58033f1c25f21ac4338ce440f18aa2369fbea4886fb52e1577e745be531fde9520fb27259750916fd4f4f0037e8a6b5934bc9510fd1347151c25be94fcc5e7cbd62f561ce1ba19c9d32142c46f842a0168b0a97fcff6a035d6e48f396261c7115f1e35ab758221579fbbbb9811d588a2c493ae87684524d5f4707fce414f90e8d303110d772a1258a43e109cd72ee1cb39cf3c306511593b942876d480532bdf4e5aa26cd1ecc9"], &(0x7f0000000100), 0x400) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r6, &(0x7f00000017c0), 0x33d, 0x0) [ 594.904856][T24847] binder: 24845:24847 ioctl 40046207 0 returned -16 [ 594.937215][T24844] binder: 24841:24844 unknown command -162021415 [ 594.961249][T24844] binder: 24841:24844 ioctl c0306201 20012000 returned -22 00:28:27 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 594.982055][T24847] binder: 24845:24847 ioctl c018620c 20000180 returned -1 [ 595.035153][T24844] binder: 24841:24844 ioctl c018620c 20000180 returned -22 [ 595.048922][T24868] debugfs: File '24867' in directory 'proc' already present! [ 595.096356][T24868] binder: BINDER_SET_CONTEXT_MGR already set [ 595.102558][T24868] binder: 24867:24868 ioctl 40046207 0 returned -16 [ 595.113440][T24868] binder: 24867:24868 ioctl c018620c 20000180 returned -1 00:28:27 executing program 0: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:27 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:27 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(0xffffffffffffffff, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:27 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:27 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:27 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 595.373720][T24880] debugfs: File '24878' in directory 'proc' already present! [ 595.422849][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:27 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:27 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 595.468627][T24880] binder: 24878:24880 ioctl c018620c 20000180 returned -22 00:28:27 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(0xffffffffffffffff, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:28 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 595.621483][T24897] debugfs: File '24896' in directory 'proc' already present! [ 595.640384][T24897] binder: 24896:24897 ioctl c018620c 20000180 returned -22 [ 595.658212][T24899] debugfs: File '24898' in directory 'proc' already present! [ 595.703536][T24899] binder: BINDER_SET_CONTEXT_MGR already set [ 595.738886][T24899] binder: 24898:24899 ioctl 40046207 0 returned -16 [ 595.784918][T24906] binder: 24898:24906 ioctl c018620c 20000180 returned -22 00:28:28 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, 0x0) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:28 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 595.909600][T24910] debugfs: File '24909' in directory 'proc' already present! [ 595.942363][T24910] binder: 24909:24910 ioctl c0306201 0 returned -14 [ 595.964145][T24910] binder: 24909:24910 ioctl c018620c 20000180 returned -22 00:28:28 executing program 0: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') r1 = socket$alg(0x26, 0x5, 0x0) fcntl$setstatus(r1, 0x4, 0xaf652a5a7920e04) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f00000000c0)={0x9, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$TIOCNOTTY(r3, 0x5422) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r5, r6, 0x0, 0x50000000000443) write$binfmt_elf64(r6, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x8, 0x3, 0xffffffff, 0x200, 0x3, 0x3, 0xfffffffffffffffe, 0x359, 0x40, 0x9a, 0x10000, 0x3, 0x38, 0x2, 0x100000001, 0x3, 0x9}, [{0x4, 0x8, 0xffff, 0x4, 0x3, 0xfffffffffffffffb, 0x10001, 0x1000}, {0x5, 0x6, 0x6, 0x7, 0x4f, 0x0, 0x400, 0xd0}], "5a748c71165bf381504d929722c11cc9b2dec4230100241667231d28a4842ddc25e1f0cab5047f2a43b731d1ef", [[]]}, 0x1dd) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:28 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:28 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(0xffffffffffffffff, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:28 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:28 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, 0x0) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 596.274663][T24928] debugfs: File '24925' in directory 'proc' already present! [ 596.300568][T24924] debugfs: File '24923' in directory 'proc' already present! [ 596.305705][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:28 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 596.310400][T24928] binder: 24925:24928 ioctl c0306201 0 returned -14 [ 596.351018][T24924] binder: BINDER_SET_CONTEXT_MGR already set [ 596.366938][T24935] binder: BINDER_SET_CONTEXT_MGR already set [ 596.375834][T24924] binder: 24923:24924 ioctl 40046207 0 returned -16 [ 596.385722][T24935] binder: 24925:24935 ioctl 40046207 0 returned -16 00:28:28 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, 0x0) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:28 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 596.396780][T24928] binder: 24925:24928 ioctl c018620c 20000180 returned -1 [ 596.416071][T24924] binder: 24923:24924 ioctl c018620c 20000180 returned -22 00:28:28 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:28 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 596.560402][T24944] debugfs: File '24942' in directory 'proc' already present! [ 596.595382][T24944] binder: 24942:24944 ioctl c0306201 0 returned -14 [ 596.653747][T24947] debugfs: File '24946' in directory 'proc' already present! [ 596.684482][T24944] binder: BINDER_SET_CONTEXT_MGR already set [ 596.691879][T24947] binder: BINDER_SET_CONTEXT_MGR already set 00:28:29 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 596.694255][T24944] binder: 24942:24944 ioctl 40046207 0 returned -16 [ 596.716418][T24947] binder: 24946:24947 ioctl 40046207 0 returned -16 [ 596.741471][T24944] binder: 24942:24944 ioctl c018620c 20000180 returned -1 [ 596.754414][T24952] binder: 24946:24952 ioctl c018620c 20000180 returned -22 00:28:29 executing program 0: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:29 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:29 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:29 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:29 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r5, r6, 0x0, 0x50000000000443) recvmmsg(r5, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000000)={r7, r0}) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 00:28:29 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 597.184157][T24971] debugfs: File '24969' in directory 'proc' already present! [ 597.206736][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 597.223594][T24972] debugfs: File '24967' in directory 'proc' already present! [ 597.232948][T24971] binder: BINDER_SET_CONTEXT_MGR already set 00:28:29 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 597.260846][T24971] binder: 24969:24971 ioctl 40046207 0 returned -16 [ 597.260873][T24972] binder: BINDER_SET_CONTEXT_MGR already set [ 597.288372][T24972] binder: 24967:24972 ioctl 40046207 0 returned -16 [ 597.297626][T24982] binder: 24969:24982 ioctl c018620c 20000180 returned -1 00:28:29 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 597.334225][T24972] binder: 24967:24972 ioctl c018620c 20000180 returned -22 00:28:29 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 597.405260][T24989] debugfs: File '24986' in directory 'proc' already present! 00:28:29 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 597.450243][T24989] binder: BINDER_SET_CONTEXT_MGR already set [ 597.481649][T24989] binder: 24986:24989 ioctl 40046207 0 returned -16 [ 597.495881][T24992] binder: 24986:24992 ioctl c018620c 20000180 returned -1 00:28:29 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 597.578627][T24996] debugfs: File '24995' in directory 'proc' already present! [ 597.625526][T24996] binder: BINDER_SET_CONTEXT_MGR already set [ 597.652043][T24996] binder: 24995:24996 ioctl 40046207 0 returned -16 [ 597.673110][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 597.692794][T25001] binder: 24995:25001 ioctl c018620c 20000180 returned -22 00:28:30 executing program 0: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:30 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:30 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:30 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:30 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 597.944232][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 597.976472][T25012] debugfs: File '25011' in directory 'proc' already present! [ 597.991073][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 598.027335][T25008] debugfs: File '25007' in directory 'proc' already present! [ 598.027839][T25018] binder: BINDER_SET_CONTEXT_MGR already set 00:28:30 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:30 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:30 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 598.112220][T25018] binder: 25011:25018 ioctl 40046207 0 returned -16 [ 598.112736][T25012] binder: 25011:25012 ioctl c018620c 20000180 returned -1 [ 598.126949][T25008] binder: 25007:25008 ioctl c018620c 20000180 returned -1 00:28:30 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 598.231657][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 598.254096][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:30 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:30 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 598.278342][T25034] debugfs: File '25033' in directory 'proc' already present! [ 598.288305][T25034] binder: 25033:25034 ioctl c018620c 20000180 returned -22 00:28:30 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 598.441649][T25042] debugfs: File '25041' in directory 'proc' already present! [ 598.455870][T25042] binder: 25041:25042 ioctl c018620c 20000180 returned -1 [ 598.462709][T25046] debugfs: File '25044' in directory 'proc' already present! [ 598.475874][T25046] binder: 25044:25046 ioctl c018620c 20000180 returned -22 00:28:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) gettid() 00:28:31 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:31 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:31 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:31 executing program 0: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:31 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 598.871720][T25055] debugfs: File '25054' in directory 'proc' already present! [ 598.881735][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:31 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)=ANY=[@ANYBLOB="ac1414aaac1414bb0100000008000000ac14140de0000001000000077f0000ae024d5dec5afa017f0000017f000001ac1414aaac1414aa"], 0x30) sendfile(r1, r2, 0x0, 0x50000000000443) getsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @loopback}, &(0x7f0000000040)=0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) [ 598.916325][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 598.954406][T25055] binder: 25054:25055 ioctl c018620c 20000180 returned -22 00:28:31 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:31 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:31 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 599.030536][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 599.144767][T25081] debugfs: File '25073' in directory 'proc' already present! [ 599.175853][T25081] binder: 25073:25081 ioctl c018620c 20000180 returned -22 [ 599.176032][T25082] binder: BINDER_SET_CONTEXT_MGR already set 00:28:31 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 599.201092][T25082] binder: 25080:25082 ioctl 40046207 0 returned -16 [ 599.243376][T25082] debugfs: File '25080' in directory 'proc' already present! [ 599.269200][T25086] debugfs: File '25085' in directory 'proc' already present! [ 599.287049][T25086] binder: BINDER_SET_CONTEXT_MGR already set [ 599.295293][T25086] binder: 25085:25086 ioctl 40046207 0 returned -16 [ 599.309050][T25086] binder: 25085:25086 ioctl c018620c 20000180 returned -1 00:28:32 executing program 0: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x15, "81b267b5bc192ee3db550264c172c62ce377f891e25a3835f604bc5a490c5073c0d1a14e1a1686c76cd5b20d692dbbc2e6d1d91086eadac8c7c195b01f8a0460", "8737516a07d8acd26a5e36d94eaf074c7a8ca201c36324d42f7a03826f7969ac61a35b7ff311d12367f00f1f6dd73bb3d5a4694d49ff5a7db7a2e2ccff1ec6c3", "c40df7828af21d4383a4c73432f9fef39b69b7cd1a156f8c744b53b2c0106fe3", [0x0, 0x7fff]}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) r2 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r3, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:32 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:32 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:32 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:32 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 599.715180][T25093] debugfs: File '25092' in directory 'proc' already present! [ 599.729395][T25098] debugfs: File '25094' in directory 'proc' already present! [ 599.738944][T25093] binder: BINDER_SET_CONTEXT_MGR already set [ 599.754642][T25093] binder: 25092:25093 ioctl 40046207 0 returned -16 00:28:32 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x2a, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c72"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 599.770573][T25093] binder: 25092:25093 ioctl c018620c 20000180 returned -1 00:28:32 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:32 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:32 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 599.928501][T25106] debugfs: File '25105' in directory 'proc' already present! 00:28:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB="0100008041004a28cc508cb7437da93fa1b1d0701e5fd267b23d80a4b203be584fe05077350d9d506cd609cfb81472378b4affe459e7df5b91bdf6be1a272369721d80e8c0924e09ce4d07edf72846aec07b98205375a212acd06ac0282bfd122aead5e8465e69bfd06fa6bbd016d6bdb9020439bce279d05212bb8a3987c157112e8425a61c5ad5f2c56447d3ffd4e5f912b7c6673a331b606fa86e4e85395a5ca812ae914b3e528da7b5b6318f2c3a1de7b2219edfbda8e73339b404e93460f7ebcf4422ce47e39ac96d3a1f0abdf01493f93a9b30b058ba285d4ae67a6efb089cd4ff1eca478a29d2200c411bd311929b284d856b619f7bb0eb3dbedcd8fc1ab76d85d8b7ae9fc33cd9abbbe3880569abcf8d826071dac46bba8ac95c68bd9c79bce5fd2aa89425133bf1f5e7089e0183e69aaaacc9fc472c728213bb2e5670b8409af97079849cb1", @ANYRES32=0x0], &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={r2, @in={{0x2, 0x0, @empty}}}, 0x98) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r4, r5, 0x0, 0x50000000000443) accept(r5, &(0x7f0000000380)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, &(0x7f0000000400)=0x80) fsetxattr$security_evm(r1, &(0x7f0000000100)='security.evm\x00', &(0x7f00000002c0)=@sha1={0x1, "94748fbd965a0734e78f8d59f1d4d7230ef9e977"}, 0x15, 0x6) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r2, 0x3a8e}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0xa, 0xfffffffffffffc01, 0x0, 0x7dd, 0x30}, 0x98) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r6, &(0x7f00000017c0), 0x33d, 0x0) r7 = open(&(0x7f0000000300)='./file0\x00', 0x20000, 0x20) ioctl$TUNSETVNETHDRSZ(r7, 0x400454d8, &(0x7f0000000340)=0x8f) [ 600.019223][T25106] binder: 25105:25106 unknown command -162021415 [ 600.024936][T25112] debugfs: File '25111' in directory 'proc' already present! [ 600.048314][T25100] binder: BINDER_SET_CONTEXT_MGR already set 00:28:32 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 600.066324][T25106] binder: 25105:25106 ioctl c0306201 20012000 returned -22 [ 600.074829][T25100] binder: 25099:25100 ioctl 40046207 0 returned -16 [ 600.076316][T25118] binder: BINDER_SET_CONTEXT_MGR already set [ 600.094163][T25118] binder: 25105:25118 ioctl 40046207 0 returned -16 [ 600.111219][T25119] binder: BINDER_SET_CONTEXT_MGR already set 00:28:32 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x2a, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c72"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 600.130340][T25106] binder: 25105:25106 ioctl c018620c 20000180 returned -1 [ 600.137957][T25119] binder: 25099:25119 ioctl 40046207 0 returned -16 00:28:32 executing program 0: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x15, "81b267b5bc192ee3db550264c172c62ce377f891e25a3835f604bc5a490c5073c0d1a14e1a1686c76cd5b20d692dbbc2e6d1d91086eadac8c7c195b01f8a0460", "8737516a07d8acd26a5e36d94eaf074c7a8ca201c36324d42f7a03826f7969ac61a35b7ff311d12367f00f1f6dd73bb3d5a4694d49ff5a7db7a2e2ccff1ec6c3", "c40df7828af21d4383a4c73432f9fef39b69b7cd1a156f8c744b53b2c0106fe3", [0x0, 0x7fff]}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) r2 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r3, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:32 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, 0x0) 00:28:32 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 600.214733][T25100] binder: 25099:25100 ioctl c018620c 20000180 returned -1 [ 600.217460][T25127] debugfs: File '25126' in directory 'proc' already present! [ 600.231086][T25127] binder: 25126:25127 unknown command -162021415 [ 600.237914][T25127] binder: 25126:25127 ioctl c0306201 20012000 returned -22 [ 600.302416][T25127] binder: 25126:25127 ioctl c018620c 20000180 returned -22 [ 600.327360][T25130] debugfs: File '25129' in directory 'proc' already present! 00:28:32 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 600.348776][T25130] binder: 25129:25130 ioctl c018620c 0 returned -14 00:28:32 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x2a, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c72"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:32 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, 0x0) [ 600.467277][T25141] debugfs: File '25139' in directory 'proc' already present! [ 600.536318][T25141] binder: 25139:25141 ioctl c018620c 20000180 returned -22 [ 600.562481][T25146] binder: BINDER_SET_CONTEXT_MGR already set [ 600.583423][T25146] binder: 25144:25146 ioctl 40046207 0 returned -16 00:28:33 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:33 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x3f, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bb"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 600.618129][T25146] binder: BINDER_SET_CONTEXT_MGR already set [ 600.629630][T25135] debugfs: File '25132' in directory 'proc' already present! [ 600.653559][T25146] binder: 25144:25146 ioctl 40046207 0 returned -16 [ 600.660478][T25135] binder: 25132:25135 unknown command -162021415 00:28:33 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 600.669752][T25147] binder: 25144:25147 ioctl c018620c 0 returned -14 [ 600.675445][T25135] binder: 25132:25135 ioctl c0306201 20012000 returned -22 [ 600.755786][T25151] debugfs: File '25150' in directory 'proc' already present! [ 600.772170][T25151] binder: 25150:25151 unknown command -162021415 [ 600.780066][T25151] binder: 25150:25151 ioctl c0306201 20012000 returned -22 [ 600.789299][T25151] binder: 25150:25151 ioctl c018620c 20000180 returned -22 00:28:33 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x3f, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bb"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x1f7, 0x0) 00:28:33 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:33 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, 0x0) 00:28:33 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) sendmsg(r3, &(0x7f0000001700)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x1, @broadcast, 'team_slave_1\x00'}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000200)="f16a23d95833e695cc25f7096df512a1c22755cd3da5a44343f19c092d24729f8b8e6d53c61d4ece7b8e621b4cd80d3d4f624d4f2e3660aeeebfb3d46e89443388de70ab21396346634737ac9a2325bf8670d9759a47269fcf9790d1a199d8afdcdd832f11435f070902bc673f36e9533525380479a798f8b4cdcd3c09d6f1e211ca04774b8192555695e2132a563e00bd3687e8f0b8ef2df5da16e4c9087bb7052eec004a32e1e5673917c2be8292357221c09331499196b90faf6d07f3a5db4e8156288b89c4424b07cfa3cf4037ef19a828316493d8284135347f9b349b2cc4108bf7fa2ffc3b41ebadd28fbd587e123dd982c762", 0xf6}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000000100)="845b3be8501a26917884f3022cce084e", 0x10}, {&(0x7f0000001300)="ee78dcde3dd1aee737e8fd770bfcd6c948554f08", 0x14}, {&(0x7f0000001340)="70017309de173149ea6c21b9e02bbb9b5c44481910993e56329a7a63ee23578bfeb777823d9e52bf8efc683e", 0x2c}, {&(0x7f0000001380)="d3177ee96f3cd009aa03e36484f5bc351d07a512727f5cddbcdbf5", 0x1b}, {&(0x7f00000013c0)="94a748d16301df899084ada392003c3f8c25a9ef7a02fc924aab7d10ab69cf7d4b09ccea7bd68564c0b20a1add0d379a813be1e6ac39e460004c4388d9438721a0385ed6320fabe9e7ecab94a01a68c8a6fee14cd08713b272595ac6092f18bb86408026455c48a88507704fe88db11c2a2020bff7b59258292dbf07060636be1dad1d7039af6e54b685bcbb7bd5a3376f7965ac1851ff439eb41bf33aba5cf2fb07dff0951c49b5451ecb8186a23a5e3215a83ef44fb831660b974bae3b1267bb3976133692aa4ac96b93bc61b641d88ec54a06122a99f4e0d5ae91983af29ff62a0681dcb33168ea60b0e0ada87c5e6fffe38ea219ed65", 0xf8}, {&(0x7f00000014c0)}, {&(0x7f0000001500)="a226b24c5baed5314e52dd9b25e2feb53ee8eb2cce97b278b4b4f199ad4b7b613a09d0573ae5d08145cfbfdcd694ac831c06761248fede4f0423914d2918ead70cf03792ca3161498fabbf667ef5204515fc1ec18f4a7c137a1a6e27cfd1141bdd57ad212073a2e3b0652073ad4603b5b1d2f955aeae7752dbac0cbc86acc4d493ce3413d91f52403042ed9ecdee22efd281ea42908831d48986af032f86ebdaa97373d17e9d06bf219d102b21eb8898a70a2f0d187caddd878d", 0xba}, {&(0x7f00000015c0)="6f3ebe4ae58ac8475cd9f89db0c38b4509f5e2fd90871943fae011e14a7becd9629cb240840368e9f5a161", 0x2b}], 0xa, &(0x7f00000016c0)=[{0x30, 0x10b, 0x2, "08adaabc7fd35a759e588a86b92f1de61a769f90f9614e2489828bc2103f"}], 0x30}, 0x2000) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r6, r7, 0x0, 0x50000000000443) ioctl$PPPIOCSNPMODE(r7, 0x4008744b, &(0x7f00000014c0)={0x3d, 0x1}) preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) [ 600.986607][T25165] debugfs: File '25164' in directory 'proc' already present! [ 601.007567][T25169] debugfs: File '25168' in directory 'proc' already present! [ 601.016349][T25165] binder: 25164:25165 unknown command -162021415 [ 601.028706][T25169] binder: 25168:25169 ioctl c018620c 0 returned -14 00:28:33 executing program 0: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x15, "81b267b5bc192ee3db550264c172c62ce377f891e25a3835f604bc5a490c5073c0d1a14e1a1686c76cd5b20d692dbbc2e6d1d91086eadac8c7c195b01f8a0460", "8737516a07d8acd26a5e36d94eaf074c7a8ca201c36324d42f7a03826f7969ac61a35b7ff311d12367f00f1f6dd73bb3d5a4694d49ff5a7db7a2e2ccff1ec6c3", "c40df7828af21d4383a4c73432f9fef39b69b7cd1a156f8c744b53b2c0106fe3", [0x0, 0x7fff]}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r3, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:33 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:33 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x3f, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bb"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 601.035624][T25165] binder: 25164:25165 ioctl c0306201 20012000 returned -22 [ 601.047135][T25165] binder: BINDER_SET_CONTEXT_MGR already set [ 601.055354][T25165] binder: 25164:25165 ioctl 40046207 0 returned -16 [ 601.065835][T25165] binder: 25164:25165 ioctl c018620c 20000180 returned -1 00:28:33 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x1ed, 0x0) 00:28:33 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 601.206912][T25188] debugfs: File '25185' in directory 'proc' already present! [ 601.224967][T25188] binder: 25185:25188 unknown command -162021415 [ 601.244947][T25188] binder: 25185:25188 ioctl c0306201 20012000 returned -22 00:28:33 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x15, "81b267b5bc192ee3db550264c172c62ce377f891e25a3835f604bc5a490c5073c0d1a14e1a1686c76cd5b20d692dbbc2e6d1d91086eadac8c7c195b01f8a0460", "8737516a07d8acd26a5e36d94eaf074c7a8ca201c36324d42f7a03826f7969ac61a35b7ff311d12367f00f1f6dd73bb3d5a4694d49ff5a7db7a2e2ccff1ec6c3", "c40df7828af21d4383a4c73432f9fef39b69b7cd1a156f8c744b53b2c0106fe3", [0x0, 0x7fff]}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 601.285230][T25188] binder: 25185:25188 ioctl c018620c 20000180 returned -22 00:28:33 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x4a, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e94639"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:33 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 601.405714][ C0] net_ratelimit: 9 callbacks suppressed [ 601.405722][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:33 executing program 0: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x15, "81b267b5bc192ee3db550264c172c62ce377f891e25a3835f604bc5a490c5073c0d1a14e1a1686c76cd5b20d692dbbc2e6d1d91086eadac8c7c195b01f8a0460", "8737516a07d8acd26a5e36d94eaf074c7a8ca201c36324d42f7a03826f7969ac61a35b7ff311d12367f00f1f6dd73bb3d5a4694d49ff5a7db7a2e2ccff1ec6c3", "c40df7828af21d4383a4c73432f9fef39b69b7cd1a156f8c744b53b2c0106fe3", [0x0, 0x7fff]}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r3, r2, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 601.488316][T25201] debugfs: File '25200' in directory 'proc' already present! 00:28:33 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 601.561790][T25201] binder: 25200:25201 unknown command -162021415 [ 601.615290][T25209] binder: 25200:25209 ioctl c018620c 20000180 returned -22 [ 601.653176][T25201] binder: 25200:25201 ioctl c0306201 20012000 returned -22 [ 601.656418][T25199] binder: BINDER_SET_CONTEXT_MGR already set 00:28:34 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 601.700558][T25199] binder: 25197:25199 ioctl 40046207 0 returned -16 [ 601.707321][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 601.761974][T25205] binder: 25197:25205 ioctl c018620c 20000180 returned -22 [ 601.805266][T25208] binder: BINDER_SET_CONTEXT_MGR already set [ 601.839531][T25208] binder: 25206:25208 ioctl 40046207 0 returned -16 00:28:34 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0xfffffffffffffe38, &(0x7f0000000040)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}, 0x3f}], 0x0, 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000000)={0x800, 0x9, 0x40}) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:34 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:34 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x4a, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e94639"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:34 executing program 3: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x15, "81b267b5bc192ee3db550264c172c62ce377f891e25a3835f604bc5a490c5073c0d1a14e1a1686c76cd5b20d692dbbc2e6d1d91086eadac8c7c195b01f8a0460", "8737516a07d8acd26a5e36d94eaf074c7a8ca201c36324d42f7a03826f7969ac61a35b7ff311d12367f00f1f6dd73bb3d5a4694d49ff5a7db7a2e2ccff1ec6c3", "c40df7828af21d4383a4c73432f9fef39b69b7cd1a156f8c744b53b2c0106fe3", [0x0, 0x7fff]}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 601.949127][T25223] debugfs: File '25222' in directory 'proc' already present! 00:28:34 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 601.996643][T25208] binder: 25206:25208 ioctl c018620c 20000180 returned -1 [ 601.998071][T25223] binder: 25222:25223 unknown command -162021415 [ 602.018941][T25223] binder: 25222:25223 ioctl c0306201 20012000 returned -22 [ 602.029060][T25223] binder: 25222:25223 ioctl c018620c 20000180 returned -22 00:28:34 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x4a, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e94639"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 602.054821][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:34 executing program 0: getpid() r0 = openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x15, "81b267b5bc192ee3db550264c172c62ce377f891e25a3835f604bc5a490c5073c0d1a14e1a1686c76cd5b20d692dbbc2e6d1d91086eadac8c7c195b01f8a0460", "8737516a07d8acd26a5e36d94eaf074c7a8ca201c36324d42f7a03826f7969ac61a35b7ff311d12367f00f1f6dd73bb3d5a4694d49ff5a7db7a2e2ccff1ec6c3", "c40df7828af21d4383a4c73432f9fef39b69b7cd1a156f8c744b53b2c0106fe3", [0x0, 0x7fff]}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r3, r2, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 602.148240][T25227] debugfs: File '25226' in directory 'proc' already present! [ 602.182503][T25239] binder: BINDER_SET_CONTEXT_MGR already set 00:28:34 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 602.183747][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 602.201505][T25239] binder: 25226:25239 ioctl 40046207 0 returned -16 [ 602.234410][T25238] debugfs: File '25236' in directory 'proc' already present! [ 602.264288][T25238] binder: 25236:25238 unknown command -162021415 [ 602.285415][T25227] binder: 25226:25227 ioctl c018620c 20000180 returned -22 [ 602.289538][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 602.307090][T25240] binder: BINDER_SET_CONTEXT_MGR already set 00:28:34 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x1de, 0x0) [ 602.333316][T25238] binder: 25236:25238 ioctl c0306201 20012000 returned -22 [ 602.341611][T25240] binder: 25236:25240 ioctl 40046207 0 returned -16 [ 602.367254][T25248] binder: 25236:25248 ioctl c018620c 20000180 returned -1 00:28:34 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:34 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x4f, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 602.502105][T25244] debugfs: File '25242' in directory 'proc' already present! 00:28:34 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x1c3, 0x0) [ 602.544030][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 602.596629][T25244] binder: 25242:25244 ioctl c018620c 20000180 returned -1 [ 602.608425][T25258] debugfs: File '25257' in directory 'proc' already present! [ 602.663058][T25258] binder: 25257:25258 ioctl c018620c 20000180 returned -22 00:28:35 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:35 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x4f, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:35 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x1b2, 0x0) 00:28:35 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x1a8, 0x0) 00:28:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$TCSETXW(r3, 0x5435, &(0x7f0000000000)={0x0, 0x9, [0x6, 0x7fffffff, 0x7, 0xfffffffffffff000, 0x7], 0xc73}) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) [ 602.886106][T25274] debugfs: File '25272' in directory 'proc' already present! [ 602.911571][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:35 executing program 0: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 602.949026][T25274] binder: 25272:25274 unknown command -162021415 [ 602.962841][T25274] binder: 25272:25274 ioctl c0306201 20012000 returned -22 [ 602.985065][T25274] binder: 25272:25274 ioctl c018620c 20000180 returned -22 00:28:35 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:35 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x4f, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 603.012634][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:35 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x19f, 0x0) 00:28:35 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) [ 603.075385][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 603.130475][T25291] debugfs: File '25290' in directory 'proc' already present! [ 603.164350][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:35 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) [ 603.191601][T25291] binder: 25290:25291 ioctl c018620c 20000180 returned -22 00:28:36 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 00:28:36 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x52, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:36 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x19c, 0x0) 00:28:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0, 0xff59}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x3ff, 0x0, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_BIND(r3, 0x40106436, &(0x7f0000000040)={r4, 0x4}) connect$rose(r3, &(0x7f0000000080)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xe595a0a9d581fc43}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) socket$bt_bnep(0x1f, 0x3, 0x4) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:36 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 603.769798][T25314] debugfs: File '25312' in directory 'proc' already present! [ 603.804819][T25314] binder: 25312:25314 unknown command -162021415 00:28:36 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 603.813389][T25314] binder: 25312:25314 ioctl c0306201 20012000 returned -22 00:28:36 executing program 0: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:36 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) [ 603.876554][T25314] binder: 25312:25314 ioctl c018620c 20000180 returned -22 00:28:36 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:36 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) 00:28:36 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) 00:28:36 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x52, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:36 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 604.192079][T25340] debugfs: File '25338' in directory 'proc' already present! [ 604.222354][T25340] binder: 25338:25340 unknown command -162021415 00:28:36 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 604.258782][T25340] binder: 25338:25340 ioctl c0306201 20012000 returned -22 [ 604.289888][T25340] binder: 25338:25340 ioctl c018620c 20000180 returned -22 00:28:36 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:37 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:28:37 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x52, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:37 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 604.683630][T25363] debugfs: File '25360' in directory 'proc' already present! [ 604.716486][T25363] binder: 25360:25363 unknown command -162021415 [ 604.723510][T25363] binder: 25360:25363 ioctl c0306201 20012000 returned -22 00:28:37 executing program 0: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:37 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:37 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') openat$audio(0xffffffffffffff9c, &(0x7f0000000680)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e23, @multicast1}}) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xffffffff, 0x2945c2) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="0e000000b910aa07fbc9972ffb45100586aa875977a1ab5095e9958c3eb9cce64920ff9666b8226cb72a161e41375a5c8d8d40fd482fafea789cbc1cf7e6951a00a8200055a3010fde930337f77258bdb9c48d626b9cd23f7801c4ba42877920eec60c5d73951b8868cba033d372c74ca2cc54b445", @ANYRES32=0x0], &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={r3, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r3, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000080)={r3, 0x8a, 0xffffffffffff8386, 0x2, 0xffffffffffffff80, 0x5, 0x7, 0x100000000, {0x0, @in={{0x2, 0x4e20, @rand_addr=0x20}}, 0xde0, 0x80000001, 0xfff0000000000000, 0x8, 0x4}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000240)={0x2, 0xb3678f17718c569e, 0x0, 0x5, r4}, 0x10) 00:28:37 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:37 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:28:37 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x53, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c0406004"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 604.739808][T25363] binder: 25360:25363 ioctl c018620c 20000180 returned -22 00:28:37 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:28:37 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0xed, 0x0}, 0x2}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000040)="be268f88559398f56d1e007ceea7d6fc5a4f2f56361256941732ed8f7208bb549e0bddefa6972a979fb00d9a30138508299a68b90f946202", 0x38}, {&(0x7f0000000080)="40aa276fee0aa5ac59206f5436ca445919b9b53b4812ef404ef77e54b80e326fab387eb2c86b3c53fd66b971334bd3b1a5dce21966c1348480020f1aa14fd00abb9ac10659e4f3744045f80c2057a1843cd5281f88a3215dc1aef941ab199643ac2d7d83f9a34aa9f2809e8135538be20ccf4c128467c3ec1add3d754f3d9bd18e846061b9e7", 0x86}], 0x2, 0x4) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000000)={0x8, 0x100000000, 0x7f, 0x201}) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) [ 604.892480][T25379] debugfs: File '25371' in directory 'proc' already present! [ 604.922083][T25379] binder: 25371:25379 unknown command -162021415 [ 604.977142][T25379] binder: 25371:25379 ioctl c0306201 20012000 returned -22 [ 605.036748][T25384] binder: 25371:25384 ioctl c018620c 20000180 returned -22 00:28:37 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:28:37 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:37 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x100) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000080)=[r1, r0], 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) 00:28:37 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x53, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c0406004"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 605.278220][T25401] debugfs: File '25399' in directory 'proc' already present! [ 605.358500][T25401] binder: 25399:25401 unknown command -162021415 [ 605.366605][T25401] binder: 25399:25401 ioctl c0306201 20012000 returned -22 [ 605.379021][T25401] binder: 25399:25401 ioctl c018620c 20000180 returned -22 00:28:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="1f0000000000000000000040050001000000e7fc4b0900000000000000b7871001000000000000002560b700ef"]) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x2, [{0x484}]}) 00:28:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r4, r5, 0x0, 0x50000000000443) recvmmsg(r4, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) sendfile(r1, r2, 0x0, 0x50000000000443) 00:28:38 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x53, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c0406004"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:38 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:38 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x0, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:38 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 605.752067][T25416] debugfs: File '25411' in directory 'proc' already present! 00:28:38 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x50000000000443) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000200)={[], 0x9, 0x103, 0x2, 0x0, 0x7f, 0x100000, 0x4, [], 0xf4f}) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000080)={'sit0\x00', @ifru_addrs=@nfc={0x27, 0x1, 0x0, 0x3}}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f0000000040)={0x3, 0x21b}) [ 605.793102][T25416] binder: 25411:25416 unknown command -162021415 [ 605.799681][T25416] binder: 25411:25416 ioctl c0306201 20012000 returned -22 [ 605.809035][T25416] binder: 25411:25416 ioctl c018620c 20000180 returned -22 00:28:38 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:38 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(0xffffffffffffffff, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3f9274e5aea09761e1bc095ad6f0fc98ab110a8dd4b95fcfd5b7a634139cf7aaafa322ccb93d7efe0510b0f4c6135583df08c324ee0690c3a9d6305f4fe8b6bbdb587725307721aa64c58b1e6d0e846073183cf59d7e0276f65b53da56b43f091488261c3f8e7e51999e07630449797958bc7dbc6544a055d5eaaa7b2dd33", 0xa4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 606.082233][T25434] debugfs: File '25432' in directory 'proc' already present! 00:28:38 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 606.154579][T25434] binder: 25432:25434 unknown command -162021415 [ 606.209156][T25434] binder: 25432:25434 ioctl c0306201 20012000 returned -22 [ 606.260567][T25434] binder: 25432:25434 ioctl c018620c 20000180 returned -22 00:28:38 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(0xffffffffffffffff, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:38 executing program 1: pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 606.429194][T25453] debugfs: File '25452' in directory 'proc' already present! [ 606.440915][T25453] binder: 25452:25453 unknown command -162021415 [ 606.448416][T25453] binder: 25452:25453 ioctl c0306201 20012000 returned -22 [ 606.457788][ C0] net_ratelimit: 14 callbacks suppressed [ 606.457797][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 606.476996][T25453] binder: 25452:25453 ioctl c018620c 20000180 returned -22 00:28:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="1f0000000000000000000040050001000000e7fc4b0900000000000000b7871001000000000000002560b700ef"]) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x2, [{0x483}]}) 00:28:39 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(0xffffffffffffffff, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:39 executing program 1: pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:39 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 606.710477][T25458] debugfs: File '25456' in directory 'proc' already present! [ 606.711518][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 606.734378][T25458] binder: 25456:25458 unknown command -162021415 [ 606.776236][T25458] binder: 25456:25458 ioctl c0306201 20012000 returned -22 [ 606.791333][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)) [ 606.826285][T25458] binder: 25456:25458 ioctl c018620c 20000180 returned -22 00:28:39 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x60, 0x0}}], 0x1, 0xc0000004, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xc0d) 00:28:39 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:39 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 606.993239][T25478] debugfs: File '25477' in directory 'proc' already present! [ 607.010910][T25478] binder: 25477:25478 unknown command -162021415 [ 607.036316][T25478] binder: 25477:25478 ioctl c0306201 20012000 returned -22 [ 607.054334][T25478] binder: 25477:25478 ioctl c018620c 20000180 returned -22 [ 607.086471][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x2b}, 0x2, @in=@broadcast, 0x0, 0x4}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 00:28:41 executing program 1: pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:41 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x2, [{0x486}]}) 00:28:41 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 609.230167][T25497] debugfs: File '25492' in directory 'proc' already present! [ 609.235475][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000040)={0x0, 0x7fffffff, 0x100000001, &(0x7f0000000000)=0x1f}) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4(r1, 0x0, &(0x7f0000000080), 0x80800) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r4, 0x0, 0x0, 0x0) listen(r4, 0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) write$FUSE_IOCTL(r5, &(0x7f0000000100)={0x20, 0x0, 0x4, {0x100000000, 0x4, 0x2, 0x1}}, 0x20) sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) [ 609.298892][T25497] binder: 25492:25497 ioctl c018620c 20000180 returned -22 [ 609.312491][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:41 executing program 4: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, 0x0, 0x0, 0x0, 0x0) 00:28:41 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:41 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:41 executing program 4: 00:28:42 executing program 0: [ 609.605217][T25519] debugfs: File '25518' in directory 'proc' already present! [ 609.624041][T25519] binder: 25518:25519 unknown command -162021415 [ 609.638416][T25519] binder: 25518:25519 ioctl c0306201 20012000 returned -22 00:28:42 executing program 4: [ 609.679140][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 609.702165][T25519] binder: 25518:25519 ioctl c018620c 20000180 returned -22 00:28:42 executing program 0: 00:28:42 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:42 executing program 4: [ 609.786552][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:42 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 609.987389][T25544] debugfs: File '25540' in directory 'proc' already present! [ 610.029898][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 610.057679][T25544] binder: 25540:25544 ioctl c018620c 20000180 returned -1 00:28:42 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:42 executing program 0: 00:28:42 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) creat(0x0, 0x0) getsockopt$inet6_int(r0, 0x3a, 0x1, 0x0, &(0x7f0000000200)) 00:28:42 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:42 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:42 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 610.373090][T25560] debugfs: File '25559' in directory 'proc' already present! [ 610.383686][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x7c, &(0x7f0000000480)={r1, @in6={{0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000140)=0x2d3) [ 610.444241][T25566] binder: 25559:25566 ioctl c018620c 20000180 returned -1 00:28:42 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:42 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:42 executing program 4: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffffd33) r0 = getpid() mknod(&(0x7f0000000100)='./file0\x00', 0x1142, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) prctl$PR_GET_TIMERSLACK(0x1e) ptrace(0x11, r0) 00:28:42 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005d00)=[{{&(0x7f0000000040)=@nfc_llcp, 0x80, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000200)=""/13, 0xd}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/73, 0x49}, {&(0x7f00000003c0)=""/232, 0xe8}], 0x6}, 0x8000}, {{&(0x7f0000000540)=@ethernet={0x0, @random}, 0x80, &(0x7f00000018c0)=[{&(0x7f00000005c0)=""/39, 0x27}, {&(0x7f0000000600)=""/45, 0x2d}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/34, 0x22}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/238, 0xee}, {&(0x7f0000001840)=""/85, 0x55}], 0x7, &(0x7f0000001940)=""/4096, 0x1000}, 0x1a}, {{&(0x7f0000002940)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000002a40)=[{&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/74, 0x4a}], 0x2}, 0x5}, {{&(0x7f0000002a80)=@x25={0x9, @remote}, 0x80, &(0x7f0000002d40)=[{&(0x7f0000002b00)=""/169, 0xa9}, {&(0x7f0000002bc0)=""/131, 0x83}, {&(0x7f0000002c80)=""/146, 0x92}], 0x3, &(0x7f0000002d80)=""/232, 0xe8}, 0x1ff}, {{&(0x7f0000002e80)=@generic, 0x80, &(0x7f0000003000)=[{&(0x7f0000002f00)=""/206, 0xce}], 0x1, &(0x7f0000004180)=""/4096, 0x1000}}, {{&(0x7f0000003040)=@nl, 0x80, &(0x7f0000005400)=[{&(0x7f00000030c0)=""/106, 0x6a}, {&(0x7f0000005180)=""/139, 0x8b}, {&(0x7f0000005240)=""/91, 0x5b}, {&(0x7f00000052c0)=""/10, 0xa}, {&(0x7f0000005300)=""/215, 0xd7}], 0x5, &(0x7f0000005480)=""/251, 0xfb}, 0x401}, {{&(0x7f0000005580)=@l2, 0x80, &(0x7f0000005900)=[{&(0x7f0000005600)=""/160, 0xa0}, {&(0x7f00000056c0)=""/182, 0xb6}, {&(0x7f0000005780)=""/13, 0xd}, {&(0x7f00000057c0)=""/45, 0x2d}, {&(0x7f0000005800)=""/141, 0x8d}, {&(0x7f00000058c0)=""/26, 0x1a}], 0x6, &(0x7f0000005980)=""/137, 0x89}, 0x7}, {{&(0x7f0000005a40)=@generic, 0x80, &(0x7f0000005c40)=[{&(0x7f0000005ac0)=""/127, 0x7f}, {&(0x7f0000005b40)=""/223, 0xdf}], 0x2, &(0x7f0000005c80)=""/88, 0x58}, 0x9}], 0x8, 0x40000022, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) accept(r3, 0x0, &(0x7f0000000000)) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) 00:28:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x100000005, 0x0) dup2(r1, r0) ioctl(r0, 0xffffffffffffffb9, &(0x7f0000000080)) [ 610.705205][T25584] debugfs: File '25580' in directory 'proc' already present! [ 610.726104][T25584] binder: 25580:25584 unknown command -162021415 00:28:43 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 610.754529][T25584] binder: 25580:25584 ioctl c0306201 20012000 returned -22 [ 610.767335][T25584] binder: 25580:25584 ioctl c018620c 20000180 returned -1 00:28:43 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:43 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 610.868854][T25596] debugfs: File '25595' in directory 'proc' already present! [ 610.878404][T25596] binder: 25595:25596 unknown command -162021415 [ 610.888093][T25596] binder: 25595:25596 ioctl c0306201 20012000 returned -22 00:28:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RSTAT(r0, 0x0, 0xfddf) 00:28:43 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 611.013555][T25599] debugfs: File '25598' in directory 'proc' already present! [ 611.049100][T25599] binder: 25598:25599 unknown command -162021415 00:28:43 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 611.066241][T25599] binder: 25598:25599 ioctl c0306201 20012000 returned -22 00:28:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:43 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 611.224453][T25614] debugfs: File '25612' in directory 'proc' already present! [ 611.233202][T25614] binder: 25612:25614 unknown command -162021415 [ 611.239640][T25614] binder: 25612:25614 ioctl c0306201 20012000 returned -22 00:28:43 executing program 4: pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:43 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, 0x0) [ 611.485069][T25628] debugfs: File '25627' in directory 'proc' already present! [ 611.494312][T25628] binder: 25627:25628 unknown command -162021415 [ 611.499564][ C1] net_ratelimit: 3 callbacks suppressed [ 611.499574][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 611.500844][T25628] binder: 25627:25628 ioctl c0306201 20012000 returned -22 [ 611.528827][T25628] binder: 25627:25628 ioctl c018620c 0 returned -14 00:28:43 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x100000000) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:43 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:43 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:43 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, 0x0) [ 611.652095][T25641] debugfs: File '25640' in directory 'proc' already present! [ 611.675779][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 611.688990][T25641] binder: 25640:25641 unknown command -162021415 00:28:44 executing program 5: socketpair(0x8, 0x5, 0x626, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000040)={@multicast1, @multicast2, @multicast2}, 0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) [ 611.724524][T25641] binder: 25640:25641 ioctl c0306201 20012000 returned -22 00:28:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r4, r5, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r6, 0x1000000000014) [ 611.770298][T25641] binder: 25640:25641 ioctl c018620c 0 returned -14 00:28:44 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x81102) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002101400010000080e00", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_GROUP={0x8}, @IFLA_IFNAME={0x14, 0x3, 'sit0\x00'}]}, 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipmr_newroute={0x3c, 0x18, 0x200, 0x70bd26, 0x25dfdbfe, {0x80, 0x0, 0x80, 0x8, 0xff, 0x4, 0x0, 0xa, 0x2100}, [@RTA_DST={0x8, 0x1, @empty}, @RTA_GATEWAY={0x8, 0x5, @empty}, @RTA_IIF={0x8, 0x1, r5}, @RTA_GATEWAY={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x25}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2000000}, 0x40080c0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x30604}, 0x0, 0x3d, r1, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) [ 611.993700][T25657] A link change request failed with some changes committed already. Interface veth5 may have been left with an inconsistent configuration, please check. 00:28:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:44 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, 0x0) 00:28:44 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 612.077518][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 612.114327][T25666] debugfs: File '25662' in directory 'proc' already present! 00:28:44 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x1) fallocate(r1, 0x4, 0x44f, 0x7) [ 612.135895][T25666] binder: 25662:25666 unknown command -162021415 [ 612.144150][T25666] binder: 25662:25666 ioctl c0306201 20012000 returned -22 00:28:44 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r5, r6, 0x0, 0x50000000000443) tkill(r0, 0x1000000000014) 00:28:44 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200)=0x1, 0x4) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = semget$private(0x0, 0x3, 0x20) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000080)=""/207) close(r0) [ 612.182582][T25666] binder: 25662:25666 ioctl c018620c 0 returned -14 00:28:44 executing program 2 (fault-call:13 fault-nth:0): getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, r4) 00:28:44 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:44 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 612.539370][T25697] debugfs: File '25694' in directory 'proc' already present! 00:28:44 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r5, r6, 0x0, 0x50000000000443) tkill(r0, 0x1000000000014) [ 612.584943][T25697] binder: 25694:25697 unknown command -162021415 [ 612.605648][T25697] binder: 25694:25697 ioctl c0306201 20012000 returned -22 [ 612.635481][T25697] FAULT_INJECTION: forcing a failure. [ 612.635481][T25697] name failslab, interval 1, probability 0, space 0, times 0 [ 612.693019][T25697] CPU: 0 PID: 25697 Comm: syz-executor.2 Not tainted 5.3.0-rc8+ #0 [ 612.700972][T25697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.711042][T25697] Call Trace: [ 612.714352][T25697] dump_stack+0x172/0x1f0 [ 612.718800][T25697] should_fail.cold+0xa/0x15 [ 612.723416][T25697] ? fault_create_debugfs_attr+0x180/0x180 [ 612.729270][T25697] ? lock_downgrade+0x920/0x920 [ 612.734180][T25697] ? ___might_sleep+0x163/0x280 [ 612.739052][T25697] __should_failslab+0x121/0x190 [ 612.744082][T25697] should_failslab+0x9/0x14 [ 612.744092][T25697] __kmalloc+0x2e0/0x770 [ 612.744108][T25697] ? mark_held_locks+0xf0/0xf0 [ 612.744121][T25697] ? _parse_integer+0x190/0x190 [ 612.744133][T25697] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 612.744146][T25697] tomoyo_realpath_from_path+0xcd/0x7b0 [ 612.744162][T25697] ? tomoyo_path_number_perm+0x193/0x520 [ 612.744178][T25697] tomoyo_path_number_perm+0x1dd/0x520 [ 612.744189][T25697] ? tomoyo_path_number_perm+0x193/0x520 [ 612.744207][T25697] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 612.796669][T25697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 612.802922][T25697] ? ___might_sleep+0x163/0x280 [ 612.807777][T25697] ? selinux_file_mprotect+0x620/0x620 [ 612.813424][T25697] ? __fget+0x384/0x560 [ 612.817640][T25697] ? ksys_dup3+0x3e0/0x3e0 [ 612.822084][T25697] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 612.828343][T25697] ? fput_many+0x12c/0x1a0 [ 612.832879][T25697] tomoyo_file_ioctl+0x23/0x30 [ 612.838207][T25697] security_file_ioctl+0x77/0xc0 [ 612.843148][T25697] ksys_ioctl+0x57/0xd0 [ 612.847424][T25697] __x64_sys_ioctl+0x73/0xb0 [ 612.852062][T25697] do_syscall_64+0xfd/0x6a0 [ 612.856852][T25697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.862741][T25697] RIP: 0033:0x4598e9 [ 612.866632][T25697] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 612.886244][T25697] RSP: 002b:00007f3e0c441c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 612.894832][T25697] RAX: ffffffffffffffda RBX: 00007f3e0c441c90 RCX: 00000000004598e9 [ 612.902884][T25697] RDX: 0000000020000180 RSI: 00000000c018620c RDI: 0000000000000005 [ 612.910859][T25697] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 612.918822][T25697] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e0c4426d4 [ 612.926881][T25697] R13: 00000000004cd1a0 R14: 00000000004d3f48 R15: 0000000000000007 [ 612.935119][T25697] ERROR: Out of memory at tomoyo_realpath_from_path. 00:28:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:45 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:45 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:45 executing program 2 (fault-call:13 fault-nth:1): getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 612.942221][T25697] binder: 25694:25697 ioctl c018620c 20000180 returned -22 00:28:45 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:45 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 613.111190][T25720] debugfs: File '25714' in directory 'proc' already present! [ 613.187124][T25720] FAULT_INJECTION: forcing a failure. [ 613.187124][T25720] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 613.200371][T25720] CPU: 1 PID: 25720 Comm: syz-executor.2 Not tainted 5.3.0-rc8+ #0 [ 613.208561][T25720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.218832][T25720] Call Trace: [ 613.222132][T25720] dump_stack+0x172/0x1f0 [ 613.226471][T25720] should_fail.cold+0xa/0x15 [ 613.231073][T25720] ? fault_create_debugfs_attr+0x180/0x180 [ 613.236886][T25720] ? lock_downgrade+0x920/0x920 [ 613.241744][T25720] should_fail_alloc_page+0x50/0x60 [ 613.246948][T25720] __alloc_pages_nodemask+0x1a1/0x900 [ 613.252322][T25720] ? __alloc_pages_slowpath+0x2520/0x2520 [ 613.258044][T25720] ? avc_has_extended_perms+0x8e4/0x10f0 [ 613.263676][T25720] ? unwind_get_return_address+0x61/0xa0 [ 613.269300][T25720] ? profile_setup.cold+0xbb/0xbb [ 613.274330][T25720] ? fault_create_debugfs_attr+0x180/0x180 [ 613.280220][T25720] ? lock_downgrade+0x920/0x920 [ 613.285069][T25720] cache_grow_begin+0x90/0xd20 [ 613.289832][T25720] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 613.295554][T25720] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 613.301805][T25720] __kmalloc+0x6b2/0x770 [ 613.306053][T25720] ? mark_held_locks+0xf0/0xf0 [ 613.310819][T25720] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 613.316557][T25720] tomoyo_realpath_from_path+0xcd/0x7b0 [ 613.322128][T25720] ? tomoyo_path_number_perm+0x193/0x520 [ 613.327771][T25720] tomoyo_path_number_perm+0x1dd/0x520 [ 613.333289][T25720] ? tomoyo_path_number_perm+0x193/0x520 [ 613.339026][T25720] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 613.344845][T25720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 613.351210][T25720] ? ___might_sleep+0x163/0x280 [ 613.356179][T25720] ? selinux_file_mprotect+0x620/0x620 [ 613.361651][T25720] ? __fget+0x384/0x560 [ 613.365939][T25720] ? ksys_dup3+0x3e0/0x3e0 [ 613.370357][T25720] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 613.376604][T25720] ? fput_many+0x12c/0x1a0 [ 613.381037][T25720] tomoyo_file_ioctl+0x23/0x30 00:28:45 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:45 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 613.385811][T25720] security_file_ioctl+0x77/0xc0 [ 613.390762][T25720] ksys_ioctl+0x57/0xd0 [ 613.394930][T25720] __x64_sys_ioctl+0x73/0xb0 [ 613.399563][T25720] do_syscall_64+0xfd/0x6a0 [ 613.404080][T25720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 613.409970][T25720] RIP: 0033:0x4598e9 [ 613.413865][T25720] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 613.433477][T25720] RSP: 002b:00007f3e0c441c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 613.441885][T25720] RAX: ffffffffffffffda RBX: 00007f3e0c441c90 RCX: 00000000004598e9 [ 613.449868][T25720] RDX: 0000000020000180 RSI: 00000000c018620c RDI: 0000000000000005 [ 613.457835][T25720] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 613.465805][T25720] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e0c4426d4 [ 613.473845][T25720] R13: 00000000004cd1a0 R14: 00000000004d3f48 R15: 0000000000000007 [ 613.497891][T25720] binder: 25714:25720 ioctl c018620c 20000180 returned -22 00:28:45 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:45 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r5, r6, 0x0, 0x50000000000443) tkill(r0, 0x1000000000014) 00:28:45 executing program 2 (fault-call:13 fault-nth:2): getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:45 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 613.629437][T25747] debugfs: File '25743' in directory 'proc' already present! [ 613.649939][T25747] binder: 25743:25747 unknown command -162021415 [ 613.661965][T25747] binder: 25743:25747 ioctl c0306201 20012000 returned -22 [ 613.681818][T25747] FAULT_INJECTION: forcing a failure. [ 613.681818][T25747] name failslab, interval 1, probability 0, space 0, times 0 [ 613.695723][T25747] CPU: 0 PID: 25747 Comm: syz-executor.2 Not tainted 5.3.0-rc8+ #0 [ 613.703633][T25747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.713796][T25747] Call Trace: [ 613.717102][T25747] dump_stack+0x172/0x1f0 [ 613.721446][T25747] should_fail.cold+0xa/0x15 [ 613.726161][T25747] ? fault_create_debugfs_attr+0x180/0x180 [ 613.731980][T25747] ? ___might_sleep+0x163/0x280 [ 613.736840][T25747] __should_failslab+0x121/0x190 [ 613.741784][T25747] should_failslab+0x9/0x14 [ 613.746290][T25747] __kmalloc+0x2e0/0x770 [ 613.750633][T25747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 613.756884][T25747] ? d_absolute_path+0x11b/0x170 [ 613.761827][T25747] ? __d_path+0x140/0x140 [ 613.766159][T25747] ? tomoyo_encode2.part.0+0xf5/0x400 [ 613.771801][T25747] tomoyo_encode2.part.0+0xf5/0x400 [ 613.776999][T25747] tomoyo_encode+0x2b/0x50 [ 613.781417][T25747] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 613.787206][T25747] tomoyo_path_number_perm+0x1dd/0x520 [ 613.792670][T25747] ? tomoyo_path_number_perm+0x193/0x520 [ 613.798326][T25747] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 613.804145][T25747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 613.810400][T25747] ? ___might_sleep+0x163/0x280 [ 613.815270][T25747] ? selinux_file_mprotect+0x620/0x620 [ 613.820734][T25747] ? __fget+0x384/0x560 [ 613.825246][T25747] ? ksys_dup3+0x3e0/0x3e0 [ 613.829669][T25747] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 613.835919][T25747] ? fput_many+0x12c/0x1a0 [ 613.840337][T25747] tomoyo_file_ioctl+0x23/0x30 [ 613.845090][T25747] security_file_ioctl+0x77/0xc0 [ 613.845103][T25747] ksys_ioctl+0x57/0xd0 [ 613.845114][T25747] __x64_sys_ioctl+0x73/0xb0 [ 613.845129][T25747] do_syscall_64+0xfd/0x6a0 [ 613.845143][T25747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 613.845153][T25747] RIP: 0033:0x4598e9 [ 613.845167][T25747] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 613.845173][T25747] RSP: 002b:00007f3e0c441c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 613.845185][T25747] RAX: ffffffffffffffda RBX: 00007f3e0c441c90 RCX: 00000000004598e9 [ 613.845192][T25747] RDX: 0000000020000180 RSI: 00000000c018620c RDI: 0000000000000005 [ 613.845198][T25747] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:28:46 executing program 0: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:46 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x383, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r6, r7, 0x0, 0x50000000000443) recvmmsg(r6, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x81}, &(0x7f0000001280)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000012c0)={r8, @in6={{0xa, 0x4e23, 0x5, @empty, 0x100}}, 0xffffffffffffffff, 0x4, 0x513, 0x5e}, &(0x7f0000001380)=0x98) fsetxattr$security_selinux(r3, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) r9 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r11, r12, 0x0, 0x50000000000443) ioctl$KVM_CREATE_DEVICE(r9, 0xc00caee0, &(0x7f0000000080)={0x1, r12}) r13 = accept4(r1, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r13, r14, 0x0, 0x50000000000443) ioctl$PERF_EVENT_IOC_ID(r14, 0x80082407, &(0x7f0000000000)) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:46 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:46 executing program 4: gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r4, r5, 0x0, 0x50000000000443) 00:28:46 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:46 executing program 2 (fault-call:13 fault-nth:3): getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 613.845210][T25747] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e0c4426d4 [ 613.935128][T25747] R13: 00000000004cd1a0 R14: 00000000004d3f48 R15: 0000000000000007 [ 613.944663][T25747] ERROR: Out of memory at tomoyo_realpath_from_path. [ 613.951495][T25747] binder: 25743:25747 ioctl c018620c 20000180 returned -22 00:28:46 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:46 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 614.073227][T25766] debugfs: File '25759' in directory 'proc' already present! [ 614.112277][T25766] binder: 25759:25766 unknown command -162021415 [ 614.120053][T25766] binder: 25759:25766 ioctl c0306201 20012000 returned -22 [ 614.137866][ T26] audit: type=1400 audit(1568593726.496:74): avc: denied { relabelto } for pid=25756 comm="syz-executor.5" name="ALG" dev="sockfs" ino=84655 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=socket permissive=1 00:28:46 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:46 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:46 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 614.179512][T25766] binder: 25759:25766 ioctl c018620c 20000180 returned -22 00:28:46 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 614.333422][T25790] debugfs: File '25788' in directory 'proc' already present! [ 614.357977][T25790] binder: 25788:25790 unknown command -162021415 [ 614.390804][T25790] binder: 25788:25790 ioctl c0306201 20012000 returned -22 [ 614.413496][T25790] binder: 25788:25790 ioctl c018620c 20000180 returned -22 00:28:47 executing program 0 (fault-call:9 fault-nth:0): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:47 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:47 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:47 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x2, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = msgget$private(0x0, 0x0) msgsnd(r3, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgsnd(r3, &(0x7f0000000100)=ANY=[], 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000100)=0x81) msgrcv(r3, &(0x7f0000000200)={0x0, ""/210}, 0xda, 0x0, 0x0) msgrcv(r3, &(0x7f0000000000)={0x0, ""/228}, 0xec, 0xe42821a6f81bd540, 0x0) msgsnd(r3, &(0x7f00000000c0)={0x1}, 0x8, 0x0) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000040)=""/118) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) accept4$unix(r1, 0x0, &(0x7f0000000000), 0x80000) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r6, r7, 0x0, 0x50000000000443) ioctl$SCSI_IOCTL_DOORLOCK(r7, 0x5380) 00:28:47 executing program 4: gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r4, r5, 0x0, 0x50000000000443) 00:28:47 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:47 executing program 3: pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 614.929050][T25813] debugfs: File '25803' in directory 'proc' already present! [ 614.946225][T25813] binder: 25803:25813 unknown command -162021415 [ 614.958817][T25813] binder: 25803:25813 ioctl c0306201 20012000 returned -22 00:28:47 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x10, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 614.994675][T25813] debugfs: File '25803' in directory 'proc' already present! 00:28:47 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 615.045722][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 615.105072][T25829] debugfs: File '25828' in directory 'proc' already present! [ 615.134736][T25829] binder: 25828:25829 unknown command -162021415 [ 615.160015][T25829] binder: 25828:25829 ioctl c0306201 20012000 returned -22 [ 615.195350][T25829] binder: 25828:25829 ioctl 10 20000180 returned -22 00:28:47 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:47 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4b47, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 615.209913][T25829] debugfs: File '25828' in directory 'proc' already present! [ 615.308031][T25841] debugfs: File '25840' in directory 'proc' already present! [ 615.323013][T25841] binder: 25840:25841 unknown command -162021415 [ 615.329619][T25841] binder: 25840:25841 ioctl c0306201 20012000 returned -22 [ 615.338800][T25841] binder: 25840:25841 ioctl 4b47 20000180 returned -22 [ 615.349258][T25841] debugfs: File '25840' in directory 'proc' already present! 00:28:48 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:48 executing program 3: pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:48 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:48 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4b49, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 615.761666][T25850] debugfs: File '25849' in directory 'proc' already present! [ 615.773724][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 615.799605][T25850] binder: 25849:25850 unknown command -162021415 [ 615.817659][T25850] binder: 25849:25850 ioctl c0306201 20012000 returned -22 00:28:48 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000)=0x10001, &(0x7f0000000040)=0x4) 00:28:48 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:48 executing program 4: gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r4, r5, 0x0, 0x50000000000443) 00:28:48 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4c00, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 615.859002][T25850] binder: 25849:25850 ioctl 4b49 20000180 returned -22 [ 615.887703][T25850] debugfs: File '25849' in directory 'proc' already present! 00:28:48 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 615.967457][T25872] debugfs: File '25870' in directory 'proc' already present! 00:28:48 executing program 3: pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 616.021326][T25872] binder: 25870:25872 ioctl 4c00 20000180 returned -22 [ 616.040290][T25872] debugfs: File '25870' in directory 'proc' already present! 00:28:48 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:48 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4c01, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 616.098961][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 616.173364][T25889] debugfs: File '25887' in directory 'proc' already present! [ 616.188796][T25889] binder: 25887:25889 unknown command -162021415 [ 616.195952][T25889] binder: 25887:25889 ioctl c0306201 20012000 returned -22 [ 616.212935][T25889] binder: 25887:25889 ioctl 4c01 20000180 returned -22 [ 616.241049][T25892] debugfs: File '25887' in directory 'proc' already present! 00:28:48 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a130", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:48 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:48 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x541b, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 616.649215][T25900] debugfs: File '25899' in directory 'proc' already present! [ 616.667429][T25900] binder: 25899:25900 unknown command -162021415 [ 616.680875][T25900] binder: 25899:25900 ioctl c0306201 20012000 returned -22 [ 616.683509][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 616.755224][T25900] binder: 25899:25900 ioctl 541b 20000180 returned -22 [ 616.768602][T25900] debugfs: File '25899' in directory 'proc' already present! 00:28:49 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:49 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r4, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') tkill(r0, 0x1000000000014) 00:28:49 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x5421, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:49 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) 00:28:49 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 616.933125][T25921] debugfs: File '25918' in directory 'proc' already present! [ 616.967465][T25921] binder: 25918:25921 unknown command -162021415 00:28:49 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:49 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 616.983640][T25921] binder: 25918:25921 ioctl c0306201 20012000 returned -22 00:28:49 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x5432, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 617.034170][T25921] debugfs: File '25918' in directory 'proc' already present! [ 617.199332][T25938] debugfs: File '25937' in directory 'proc' already present! [ 617.211932][T25938] binder: 25937:25938 unknown command -162021415 [ 617.218330][T25938] binder: 25937:25938 ioctl c0306201 20012000 returned -22 [ 617.227556][T25938] binder: 25937:25938 ioctl 5432 20000180 returned -22 [ 617.237983][T25938] debugfs: File '25937' in directory 'proc' already present! [ 617.247148][T25938] binder: 25937:25938 ioctl 5432 20000180 returned -22 00:28:49 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x2, 0x0, 0xfffffffffffffe5b) 00:28:49 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:49 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:49 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x5450, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:49 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 617.560851][T25950] debugfs: File '25947' in directory 'proc' already present! [ 617.578056][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 617.593101][T25950] binder: 25947:25950 unknown command -162021415 [ 617.618729][T25950] binder: 25947:25950 ioctl c0306201 20012000 returned -22 [ 617.675830][T25950] debugfs: File '25947' in directory 'proc' already present! 00:28:50 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r4, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') tkill(r0, 0x1000000000014) 00:28:50 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:50 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x4, 0x202302) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001280)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet_dccp_buf(r3, 0x21, 0xf, &(0x7f0000000000)=""/124, &(0x7f0000000080)=0x7c) bind$alg(r1, &(0x7f00000012c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) 00:28:50 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x5451, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:50 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 617.795157][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 617.861722][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 617.879090][T25976] debugfs: File '25972' in directory 'proc' already present! [ 617.898945][T25976] binder: 25972:25976 unknown command -162021415 00:28:50 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 617.908912][T25976] binder: 25972:25976 ioctl c0306201 20012000 returned -22 00:28:50 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r4, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 617.937168][T25976] debugfs: File '25972' in directory 'proc' already present! [ 618.039746][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:50 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x5, 0x0, 0xfffffffffffffe5b) 00:28:50 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x5452, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:50 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:50 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:50 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) tkill(r0, 0x1000000000014) [ 618.489061][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 618.507037][T26005] debugfs: File '25999' in directory 'proc' already present! [ 618.511557][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:50 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 618.544749][T26005] binder: 25999:26005 unknown command -162021415 [ 618.575280][T26005] binder: 25999:26005 ioctl c0306201 20012000 returned -22 00:28:51 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x5460, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 618.662228][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:51 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) socket$alg(0x26, 0x5, 0x0) tkill(r0, 0x1000000000014) 00:28:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:51 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 618.753318][T26023] debugfs: File '26022' in directory 'proc' already present! [ 618.766948][T26023] binder: 26022:26023 unknown command -162021415 00:28:51 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) bind$alg(r2, &(0x7f0000001380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0xffffffa3) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x4c1a, {0x8, 0x9, 0x0, 0x1000, 0x6, 0x2}, 0x6, 0xffff}, 0xe) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r6, r7, 0x0, 0x50000000000443) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001300)=ANY=[@ANYRES32, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002101400010000080e006f2905fa72a39a007d2f5d7c8cb39ade3e344e4f45890edfc946ff12adca625ec218af943d832ab67ee8edc155765868ab0931f3e50678cdd08991", @ANYRES32=0x0, @ANYBLOB="00000000ef7d0000"], 0x5}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_GROUP={0x8}, @IFLA_IFNAME={0x14, 0x3, 'sit0\x00'}]}, 0x3c}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000001280)=@setneightbl={0x70, 0x43, 0x20, 0x70bd2d, 0x25dfdbfb, {0x7}, [@NDTA_PARMS={0xc, 0x6, [@NDTPA_MCAST_PROBES={0x8, 0xb, 0x1}]}, @NDTA_PARMS={0x2c, 0x6, [@NDTPA_MCAST_PROBES={0x8, 0xb, 0x9}, @NDTPA_MCAST_PROBES={0x8, 0xb, 0x7}, @NDTPA_MCAST_REPROBES={0x8, 0x11, 0x3}, @NDTPA_IFINDEX={0x8, 0x1, r10}, @NDTPA_UCAST_PROBES={0x8}]}, @NDTA_THRESH1={0x8, 0x2, 0x2}, @NDTA_THRESH1={0x8}, @NDTA_GC_INTERVAL={0xc}, @NDTA_THRESH1={0x8, 0x2, 0xfff}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd590, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r13, r14, 0x0, 0x50000000000443) ioctl$TIOCGICOUNT(r14, 0x545d, 0x0) [ 618.816760][T26023] binder: 26022:26023 ioctl c0306201 20012000 returned -22 [ 618.832811][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 618.849523][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:51 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 618.869128][T26023] debugfs: File '26022' in directory 'proc' already present! 00:28:51 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) connect$pppoe(r4, &(0x7f0000000100)={0x18, 0x0, {0x2, @dev={[], 0x20}, 'bridge_slave_0\x00'}}, 0x1e) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_256={{0x303}, "584929fc883a1e1e", "74473e97de5c5d691eb363bf8f2f80091ffff49e9c64c8f7b0094195f4222c2d", '\x00', "4387449a95bf213f"}, 0x38) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:51 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x6364, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:51 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) tkill(r0, 0x1000000000014) 00:28:51 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:51 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 619.456445][T26057] debugfs: File '26055' in directory 'proc' already present! [ 619.468382][T26057] binder: 26055:26057 unknown command -162021415 [ 619.477135][T26057] binder: 26055:26057 ioctl c0306201 20012000 returned -22 [ 619.490954][T26057] binder: 26055:26057 ioctl 6364 20000180 returned -22 00:28:51 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:28:51 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x700f, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 619.523302][T26057] debugfs: File '26055' in directory 'proc' already present! 00:28:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 619.629223][T26075] debugfs: File '26074' in directory 'proc' already present! [ 619.650402][T26075] binder: 26074:26075 unknown command -162021415 [ 619.659816][T26075] binder: 26074:26075 ioctl c0306201 20012000 returned -22 00:28:52 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 619.674199][T26075] binder: 26074:26075 ioctl 700f 20000180 returned -22 [ 619.688647][T26075] debugfs: File '26074' in directory 'proc' already present! 00:28:52 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) 00:28:52 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:28:52 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000140)="000000b07e607eeac8038b62451b8fa5d49fac9cc84bd74cc828b9dc8279dfbb1611b84a76985dcebd970b700ccf", 0xfffffffffffffd58, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:52 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:28:52 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x8912, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:52 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:52 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:52 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:28:52 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 620.419361][T26113] debugfs: File '26105' in directory 'proc' already present! 00:28:52 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000000)=0xd4) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) [ 620.482025][T26113] binder: 26105:26113 ioctl 8912 20000180 returned -22 [ 620.549144][T26113] debugfs: File '26105' in directory 'proc' already present! 00:28:52 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:28:53 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x8933, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:53 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 620.715562][T26138] debugfs: File '26137' in directory 'proc' already present! [ 620.750060][T26138] binder: 26137:26138 unknown command -162021415 [ 620.756713][T26138] binder: 26137:26138 ioctl c0306201 20012000 returned -22 [ 620.778946][T26138] binder: 26137:26138 ioctl 8933 20000180 returned -22 [ 620.792338][T26138] debugfs: File '26137' in directory 'proc' already present! 00:28:53 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:28:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:53 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:53 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x8946, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:53 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$UI_DEV_DESTROY(r4, 0x5502) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xfff, 0x200) r5 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0xd96, 0x2) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x1f3) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:53 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 621.353491][T26152] debugfs: File '26150' in directory 'proc' already present! [ 621.372965][T26152] binder: 26150:26152 unknown command -162021415 00:28:53 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:53 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x818, 0x0, 0x2000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff8a56, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000000, 0x200}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/72}, {&(0x7f0000000080)=""/13}, {&(0x7f0000000200)=""/146}, {&(0x7f0000000380)=""/114}, {&(0x7f00000002c0), 0xe2af002cab4e06ab}], 0x1386, 0x0) [ 621.403444][T26152] binder: 26150:26152 ioctl c0306201 20012000 returned -22 00:28:53 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x50000000000443) recvmmsg(0xffffffffffffffff, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 621.497143][T26152] binder: 26150:26152 ioctl 8946 20000180 returned -22 00:28:53 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000700)=@ipv6_newrule={0x3c, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_SRC={0x14, 0x2, @empty}, @FIB_RULE_POLICY=@FRA_IP_PROTO={0x8, 0x16, 0x2e}]}, 0x3c}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000040)=0x3f) 00:28:53 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:53 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x8981, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:54 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x50000000000443) recvmmsg(0xffffffffffffffff, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 621.675786][T26187] debugfs: File '26186' in directory 'proc' already present! [ 621.686093][T26187] binder: 26186:26187 unknown command -162021415 [ 621.714844][T26187] binder: 26186:26187 ioctl c0306201 20012000 returned -22 [ 621.720238][ C0] net_ratelimit: 13 callbacks suppressed [ 621.720248][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 621.734890][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 621.750671][T26191] netlink: 'syz-executor.5': attribute type 22 has an invalid length. 00:28:54 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:54 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x50000000000443) recvmmsg(0xffffffffffffffff, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 621.772124][T26187] binder: 26186:26187 ioctl 8981 20000180 returned -22 [ 621.784329][T26187] debugfs: File '26186' in directory 'proc' already present! [ 621.803120][T26191] netlink: 'syz-executor.5': attribute type 22 has an invalid length. [ 621.894735][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:54 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xae01, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:54 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$inet6(r3, &(0x7f00000003c0)={&(0x7f0000000000)={0xa, 0x4e23, 0x575c93c8, @local, 0xc916}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000040)="3c08914156609c1c53cde056dde766a4f7e16e4878799d139b92baacbf9da698bdeeed5635637b047a5238b1969b370a16f2b5d2d292872a811c583be23a014a50932abd974444533d95f0ff7fc665f6", 0x50}, {&(0x7f00000000c0)="13f953be7b6f2cde", 0x8}, {&(0x7f0000000200)="9629d125ef090ea39a49771fcfd1be5516beb81a7907acc616e6cc23805e82fb102d320a52512f27225d7ee25e79c9d861c8ada09e744df5e5716c4b517b9fce23398813b10c66af7c3323a9c36c6b4ac81904a6da654f7ac6feef5e73ca608ef1d534e3a645650bcd5c6a3145fc48f263d5f66172387cc771e7c5e57f1eed177aeab36cd7d425feb8187ef61b50709b64e275237e84bc2c6c626b6f0ddaf793b1050681968d1e86fc857839725cb6f2580ff930f79d9fef7775c642a2c4389de2ac2828d9dd891c4183983f584cfeee7449b37fc0e2b72ba6b129ecd5", 0xdd}], 0x3, &(0x7f0000000300)=[@rthdrdstopts={{0x20, 0x29, 0x37, {0x66b7e0b6dbccd308, 0x0, [], [@enc_lim={0x4, 0x1, 0x5}]}}}, @tclass={{0x14, 0x29, 0x43, 0xffffffffffff66f8}}, @rthdr={{0x38, 0x29, 0x39, {0x3a, 0x4, 0x2, 0x3ff, 0x0, [@mcast2, @loopback]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x101}}], 0x88}, 0x10000485) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:54 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:28:54 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:54 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x7, 0x50c07dd47b4c6547) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x6}, &(0x7f00000001c0)=0x8) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r5, r6, 0x0, 0x50000000000443) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) connect$inet6(r7, &(0x7f00000003c0)={0xa, 0x4e23, 0x10000, @loopback, 0xdf}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000000)={r8, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r8, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000240)={r8, 0x3}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000002c0)={r9}, &(0x7f0000000300)=0x8) socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000340)={0x0, 0x6}, &(0x7f0000000380)=0x8) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:54 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:54 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 622.290323][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 622.308676][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 622.325583][T26222] debugfs: File '26212' in directory 'proc' already present! 00:28:54 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xae41, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 622.401990][T26222] binder: 26212:26222 ioctl ae01 20000180 returned -22 [ 622.407532][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:54 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 00:28:54 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 622.524512][T26239] debugfs: File '26236' in directory 'proc' already present! [ 622.540533][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:55 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 622.572599][T26239] binder: 26236:26239 unknown command -162021415 [ 622.578995][T26239] binder: 26236:26239 ioctl c0306201 20012000 returned -22 [ 622.609771][T26239] binder: 26236:26239 ioctl ae41 20000180 returned -22 [ 622.640586][T26239] debugfs: File '26236' in directory 'proc' already present! 00:28:55 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000000)={0x8, 0x10000, 0x5, @broadcast, 'erspan0\x00'}) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:55 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 00:28:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:55 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xae80, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 623.128110][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 623.141393][T26264] debugfs: File '26262' in directory 'proc' already present! [ 623.171787][T26264] binder: 26262:26264 unknown command -162021415 [ 623.180318][T26264] binder: 26262:26264 ioctl c0306201 20012000 returned -22 [ 623.190044][T26264] binder: 26262:26264 ioctl ae80 20000180 returned -22 00:28:55 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:28:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:55 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 00:28:55 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) [ 623.254877][T26264] debugfs: File '26262' in directory 'proc' already present! 00:28:55 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 623.295084][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:55 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) 00:28:55 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xaeb7, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:55 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000000)={0x8100000000000000, 0x2800, 0x1, 0x4, 0x16}) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:28:55 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:28:55 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) linkat(r4, &(0x7f0000000100)='./file0\x00', r5, &(0x7f0000000200)='./file0\x00', 0x2800) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f00000002c0)="fe42c22220cda7ff66b572aa93a22c9eb7d0dfcc89b0399accf436", 0x1b) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x606}, "256c7a10c0fcbbc9", "7dd8ddcc1a6c3722f342760970b1f0a026fdba9998fcc03bfcd67ab0bcc47528", "0d764188", "2d6a8494e217f61d"}, 0x38) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000140)=0xff) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x2, 0x2) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20400}, 0xb, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r8, 0xaa44c481d6221100, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1000, 0x80000001, 0x4, 0xffbfffffffffff00}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r7, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r8, 0x800, 0x70bd25, 0x25dfdbfe, {}, ["", ""]}, 0x1c}}, 0x8000) r9 = accept4(r6, 0x0, 0x0, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r11, r12, 0x0, 0x50000000000443) fcntl$getown(r12, 0x9) r13 = gettid() tkill(r13, 0x1000000000015) r14 = syz_open_procfs(r13, &(0x7f0000000140)='net/sockstat6\x00') sendfile(r9, r14, 0x0, 0x50000000000443) mmap(&(0x7f0000e0e000/0x1000)=nil, 0x1000, 0x2000000, 0x1010, r14, 0x0) [ 623.493920][T26296] debugfs: File '26291' in directory 'proc' already present! [ 623.509051][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:55 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) [ 623.564996][T26296] binder: 26291:26296 ioctl aeb7 20000180 returned -22 00:28:56 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x40045431, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 623.610390][T26296] debugfs: File '26291' in directory 'proc' already present! 00:28:56 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) 00:28:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 623.680661][T26323] debugfs: File '26320' in directory 'proc' already present! [ 623.698514][T26323] binder: 26320:26323 unknown command -162021415 00:28:56 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:28:56 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x400454ca, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 623.746115][T26329] binder: 26320:26329 ioctl 40045431 20000180 returned -22 [ 623.748460][T26323] binder: 26320:26323 ioctl c0306201 20012000 returned -22 [ 623.780341][T26323] debugfs: File '26320' in directory 'proc' already present! 00:28:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 623.850992][T26336] debugfs: File '26335' in directory 'proc' already present! [ 623.874517][T26336] binder: 26335:26336 unknown command -162021415 [ 623.900069][T26336] binder: 26335:26336 ioctl c0306201 20012000 returned -22 [ 623.919435][T26336] binder: 26335:26336 ioctl 400454ca 20000180 returned -22 [ 623.942263][T26336] debugfs: File '26335' in directory 'proc' already present! 00:28:56 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) iopl(0x398a) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000000)={0x9, 0x5, 0x1000, 0x30c}) 00:28:58 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:28:58 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:28:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:58 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x40045566, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:28:58 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r5) r6 = accept4$ax25(r1, &(0x7f0000000400)={{0x3, @bcast}, [@null, @rose, @bcast, @rose, @null, @rose, @null]}, &(0x7f0000000300)=0x48, 0x180000) getpeername(r6, &(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000500)=0x80) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {0x1, 0x4}, [{0x2, 0x1, r2}, {0x2, 0x7, r4}, {0x2, 0x4, 0xee00}], {0x4, 0x3}, [{0x8, 0x0, r5}, {0x8, 0x2, 0xee00}, {0x8, 0x7}, {0x8, 0x1, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x4, r8}], {0x10, 0x4}, {0x20, 0x1}}, 0x6c, 0x0) 00:28:58 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 626.594682][T26362] debugfs: File '26360' in directory 'proc' already present! [ 626.619944][T26362] binder: 26360:26362 unknown command -162021415 [ 626.636668][T26362] binder: 26360:26362 ioctl c0306201 20012000 returned -22 00:28:59 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:28:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)={0x8f, 0x0, 0x7ff}) [ 626.646699][T26362] binder: 26360:26362 ioctl 40045566 20000180 returned -22 [ 626.679205][T26362] debugfs: File '26360' in directory 'proc' already present! 00:28:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:28:59 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x40046205, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 626.744028][ C1] net_ratelimit: 4 callbacks suppressed [ 626.744038][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:28:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) [ 626.854625][T26393] debugfs: File '26391' in directory 'proc' already present! [ 626.906864][T26393] binder: 26391:26393 unknown command -162021415 [ 626.921065][T26393] binder: 26391:26393 ioctl c0306201 20012000 returned -22 [ 626.946608][T26393] debugfs: File '26391' in directory 'proc' already present! 00:29:01 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:01 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:01 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x68, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0], 0x5, 0x7, 0x2, 0x1}) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000200)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x4, 0x20, 0x7fffffff, 0x3}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={r5, 0x10000, 0x100}, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:29:01 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x40046207, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:01 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000940)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000001c0)="803d5ce4bc0dc7c5debcb54b892be7f113513e98657d19517c3cec2042b23238455be1b92892608afc4c6b0f88ac0b2968c4af89eb876231038929845c25", 0x3e}, {&(0x7f0000000200)="dc8d53264f778473f1aec5e6821d15bc5a94872082bf7ce3619cad1592693e67f1c54d9f2e3f0f481ed8c14d725474c64e6d5d0243ade1dd4c420030429706ab0171f2877cbd7b53b0628913507a153914af210652e4169188fd04896f4820abf261425005b8e7db1e656b89cb51348a39e360180a688f803ae31431872b14a4950afa828c6f9be12e89224d534a", 0x8e}, {&(0x7f00000002c0)="701cacc80e2c6628f8ea11be8f334ae0d89ff127e9039989937e7852b840e531175e705c47497918ed8a5ebf288930725668a917422e1f52e02a69195c5e394461f745e4a53f9f80921b60fb7cef5e8ea9b39f91ec0f79ddba8a56f15a1c2747916fdf9b18a2db2bfbbcefe855eb248a27ce3caa01ca7dc5ceb74d0e075f7f6007179a2891aef331a6fd92a837d4d8b4ecca82f7c33146218c696f7d6a846a8b6c57637bbad7b4f2166c2bd66009ca93057afbd84afd23ec70fec9d8cf54e2f0038ef722e35cb9590ffdcf994209f51a9eef025df39727a36b383db1c18d5b5384e25b158e115d", 0xe7}, {&(0x7f00000003c0)="e45da47126bd5707263fc32bccff3637a4426428e563322d8a4f4c2cc9ee12ede04db7096ab81e9f3c6d452c2012429977b4205990ec5be1cb34fca7c47752ae443a1a", 0x43}, {&(0x7f0000000440)="51947a95af9683ea9822bcc6280756bd61cf870ba915b4f8b19843873183173a55493a82cc3ff56c9328c820c1ad9f7cc878a5aa771995c72942d907292844ac9a4f9e62106a910e20740faeede71dde0171b035d0c9c07741d5f6d54d879ddc44c42561ed706aa97c2f287a994b26164d52489b48406e3341cf1ba1b5afe04c4494e9c406b7231f029e1837ffc9ce7a1df1025d0a4d864d70cd238c125d3070442add6fa7574e671ef57fedaffe6489a1be71c2dad6f8c45181cba7f0287f21a124109a24d72f3590afb638d16bc094", 0xd0}, {&(0x7f0000000540)="d420a1770eff67793c48102a5755baaa48cb9fdc2b77253e5b63f01d19da25f22184d7b51e16cb08bfd4cb4cf12face6841bd8c529e3db79956fa5e8b130699ee3252fd067ffcaa9e7dacd", 0x4b}], 0x6, &(0x7f0000000640)=[{0xa0, 0x107, 0x4, "849a6b8857011249af3267ee56a4e658530b8d771cba9f8eae10a32845a29592480e595b0a0bace6ab8a827f997f3337371e5a7347ab88f364f01ca1a1abee523486ccfed38aa8caa18cf0fcc4dd2ba469f8d9d0c9ece334abc11d28bd98c076bdddf771bc232f0266e2e21fdbf1866d222453f649599b042787135504bedb2beb92be3787de536f1d9a88f464b0"}, {0x48, 0x109, 0x5, "f420f8852dc0fe352c5ab3eb79049fcb72d8ca45a2bc8617419cffc50e153295d2438ee80dc83f48902b002ee54ddd8da484f8eb28"}, {0xc8, 0x1, 0x3ff, "ab7a2056547dc94d2f1fd1d38ac1759579a7286dc7381e0796623fb957a8620ef12e069ea30c0e10bf30cf8f4232a8237079562cfb4da397ee538a28936e5875d045a987ce5807b2e3f8e959e8ef9c357288f6d78addb04115deabef85a15b7d2f741ba155455c3f8edbbc43ceb7320919e9ce39e53220d64bc022480e0d750997f983248dfdec520975a2486e975a4e4089476b969fe99e028a91c05a86406cf8f00394eaa074553f025467fa8f6ccde7ff542afb9428b3"}, {0x38, 0x112, 0x70000000000, "8d2a3801e79d00a39cc0fe75625339544862b4e50ca6f87f62c8a68296f8cce3bbf386e0"}, {0x68, 0x114, 0x6336ee19, "52a6c09b4559c3bc84e4f3eb16e1a8346f7fc9e2ad7a7b9f5cbdb070cca222fb6df2cc51c0f5e425e64dc4af37d824ff0a89c72a7d99042cc80386002e6d17df541e3b168589398afd47ff9cf17c6a56b094b508"}, {0x88, 0x104, 0x3, "908e2cd3fed52796406d0b74fb9c6cd1501f4d5529c70f148e68c68b4d9673e54a3c2029dcef949f9fc65ebe4d5804cd2474b6bb41d318245a58bca7708550270be551f8e081925de8fd456bf269cfea0129e8f8f85d949d6c4132caef778983c722d792b0b24a00f0eef45dea89a100194dc8ae80"}, {0x18, 0x0, 0x1, "e24f319430dbb7"}], 0x2f0}, 0x20020850) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 629.653011][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 629.668630][T26415] debugfs: File '26412' in directory 'proc' already present! 00:29:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:02 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 629.710612][T26415] binder: 26412:26415 unknown command -162021415 [ 629.729097][T26415] binder: 26412:26415 ioctl c0306201 20012000 returned -22 [ 629.753421][T26415] binder: BINDER_SET_CONTEXT_MGR already set 00:29:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:02 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 629.774666][T26415] binder: 26412:26415 ioctl 40046207 20000180 returned -16 [ 629.785188][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 629.831044][T26415] debugfs: File '26412' in directory 'proc' already present! 00:29:02 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x40046208, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 629.883539][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 629.948393][T26445] debugfs: File '26442' in directory 'proc' already present! [ 629.966748][T26445] binder: 26442:26445 unknown command -162021415 [ 629.981749][T26445] binder: 26442:26445 ioctl c0306201 20012000 returned -22 [ 629.994563][T26445] debugfs: File '26442' in directory 'proc' already present! 00:29:05 executing program 4: r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:05 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:05 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x40049409, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:05 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') socket$caif_stream(0x25, 0x1, 0x3) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7ff, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, @perf_config_ext={0x2e6, 0xfffffffffffffffe}}, 0x0, 0x0, r0, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(rfc7539esp(xts(tnepres),xcbc-aes-ce))\x00'}, 0xfffffffffffffe60) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) preadv(r3, &(0x7f0000000000), 0x0, 0x0) 00:29:05 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000001, 0x50, 0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 632.753906][T26464] debugfs: File '26459' in directory 'proc' already present! [ 632.770305][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 632.771084][T26464] binder: 26459:26464 unknown command -162021415 00:29:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:05 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:05 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x40086602, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 632.804938][T26464] binder: 26459:26464 ioctl c0306201 20012000 returned -22 00:29:05 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000000)={0x2ea, "cc90910019381b24261888ea531bedf39e572d2936d5d004596f559976954da9", 0x2, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:29:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 632.924898][T26484] debugfs: File '26483' in directory 'proc' already present! [ 632.929884][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:05 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 632.978346][T26484] binder: 26483:26484 ioctl 40086602 20000180 returned -22 [ 633.055337][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:08 executing program 4: r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:08 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x40087602, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:08 executing program 5: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000001580)={0x2, 0x0, @multicast1}, &(0x7f00000015c0)=0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={r2, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r2, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000001600)=@assoc_value={r2, 0x401}, &(0x7f0000001640)=0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) 00:29:08 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:08 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20400}, 0xb, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r5, 0xaa44c481d6221100, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1000, 0x80000001, 0x4, 0xffbfffffffffff00}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x60008010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r5, 0x1, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000004}, 0x10000040) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) socket$inet6(0xa, 0x402, 0xfff) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:08 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 635.821804][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 635.849527][T26515] debugfs: File '26512' in directory 'proc' already present! 00:29:08 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x0, 0x44) 00:29:08 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 635.899146][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 635.919885][T26515] binder: 26512:26515 unknown command -162021415 [ 635.941574][T26515] binder: 26512:26515 ioctl c0306201 20012000 returned -22 00:29:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 635.968077][T26515] binder: 26512:26515 ioctl 40087602 20000180 returned -22 [ 635.983295][T26515] debugfs: File '26512' in directory 'proc' already present! 00:29:08 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4008ae89, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 636.082859][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 636.129470][T26542] debugfs: File '26540' in directory 'proc' already present! [ 636.148840][T26542] binder: 26540:26542 unknown command -162021415 [ 636.156391][T26542] binder: 26540:26542 ioctl c0306201 20012000 returned -22 [ 636.172413][T26542] binder: 26540:26542 ioctl 4008ae89 20000180 returned -22 [ 636.185381][T26542] binder: 26540:26542 ioctl 4008ae89 20000180 returned -22 00:29:11 executing program 4: r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:11 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:29:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:11 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:11 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4008ae90, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:11 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x304}, "02e8bcfc2183084c", "a42b1995e9f36ef14b2cb2973390ccf32c8e2d596dff0700000d170062173dbb", "f1d27d94", "1de364e92e8bd354"}, 0x38) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 638.869552][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 638.888541][T26560] debugfs: File '26556' in directory 'proc' already present! 00:29:11 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:11 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x10000) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000080)={0x0, 0xfffffffffffff800, 0x1f, &(0x7f0000000040)=0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) [ 638.946242][T26560] binder: 26556:26560 ioctl 4008ae90 20000180 returned -22 00:29:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:11 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4008ae93, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:11 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 639.012646][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 639.140184][T26588] debugfs: File '26585' in directory 'proc' already present! [ 639.157335][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 639.167729][T26588] binder: 26585:26588 unknown command -162021415 [ 639.175543][T26588] binder: 26585:26588 ioctl c0306201 20012000 returned -22 [ 639.185056][T26588] binder: 26585:26588 ioctl 4008ae93 20000180 returned -22 [ 639.195786][T26588] debugfs: File '26585' in directory 'proc' already present! 00:29:14 executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(0x0, 0x1000000000014) 00:29:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:14 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4008af10, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:14 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:14 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={r1, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r1, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x4, 0x7, 0x3, 0xffffffffffff98db, r1}, &(0x7f0000000040)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x3af, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x96}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) 00:29:14 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000140)={0x188a, 0x9, 0xffffffffffffc682, 0xfffffffffffff800, 0x0, 0x4faa, 0x80000000, 0xfffffffffffffffb, 0x2a9f, 0x6, 0x0, 0x7}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000001c0)='{cpuset\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffffff9c) listen(r4, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 641.966628][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 642.006337][T26607] debugfs: File '26606' in directory 'proc' already present! 00:29:14 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') prctl$PR_SET_TSC(0x1a, 0x3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$VT_DISALLOCATE(r3, 0x5608) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000040)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cachefiles\x00', 0x4000, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0xb, &(0x7f0000000300)=0x2, 0x4) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x8000, 0x4) 00:29:14 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 642.036775][T26607] binder: 26606:26607 unknown command -162021415 [ 642.094714][T26607] binder: 26606:26607 ioctl c0306201 20012000 returned -22 [ 642.096071][T26623] binder: 26606:26623 ioctl 4008af10 20000180 returned -22 [ 642.127811][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:14 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:14 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x401054d5, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 642.153951][T26607] debugfs: File '26606' in directory 'proc' already present! 00:29:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 642.252571][T26636] debugfs: File '26635' in directory 'proc' already present! [ 642.279865][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 642.297569][T26636] binder: 26635:26636 ioctl 401054d5 20000180 returned -22 00:29:15 executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(0x0, 0x1000000000014) 00:29:15 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:15 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4010641c, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:15 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e1e, 0x0, @mcast1, 0xffffffffffffffff}, 0x1c) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$VIDIOC_G_CROP(r5, 0xc014563b, &(0x7f0000000180)={0x9, {0x8, 0x1, 0x80, 0x9}}) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:15 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 642.848228][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 642.869089][T26656] debugfs: File '26649' in directory 'proc' already present! [ 642.903539][T26656] binder: 26649:26656 unknown command -162021415 [ 642.921216][T26656] binder: 26649:26656 ioctl c0306201 20012000 returned -22 [ 642.950212][T26656] binder: 26649:26656 ioctl 4010641c 20000180 returned -22 [ 642.964862][T26656] debugfs: File '26649' in directory 'proc' already present! 00:29:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 00:29:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:15 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:15 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4018620d, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 643.066260][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 643.068282][T26677] debugfs: File '26676' in directory 'proc' already present! 00:29:15 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 643.142287][T26677] binder: BINDER_SET_CONTEXT_MGR already set [ 643.161385][T26677] binder: 26676:26677 ioctl 4018620d 20000180 returned -16 [ 643.180968][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:16 executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(0x0, 0x1000000000014) 00:29:16 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x404800, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) 00:29:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:16 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000140)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000001c0)={@remote, r3}, 0x14) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:16 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x40189206, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 643.707594][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:16 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x101, 0x5, &(0x7f0000001340)=[{&(0x7f0000000080)="7d42b063465f3d27411178add8eb029df5ac46814fd93f60dcc716c9cbd8f7925b852cb923cb85858532120dc3d5e367a1802671e2e57a095ca54d6055aa1fe2e28137c1bbafa0bb9a0fd95f69aad96a8d99176ccfd11704a2c701ed5d442470323f10eedde25ddfcf5be07b46d4", 0x6e}, {&(0x7f0000000200)="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", 0x1000, 0x8}, {&(0x7f0000001200)="eb462a50075c5098b4917c5d8509df11075aea870c92b06acc0f535d001fc4aeb87b0a45ff1a809125b99dcd6ac2a6db1cf2385687f57ec859f78d9300a77b289f64e3246022ef74f06d2d1eab0a843d11dd72d75e67563c96a7635c031b2b34dddff0b8a87f6ecad51bbd8ef35d87adf4583694999a9b3275407cf009377f4eb2d038735b7b44c3d24cc8ea43305d9983f0dff09f48783abf9095aff9b0092dca", 0xa1, 0x5}, {&(0x7f00000012c0)="c7985e39e2c3025d4364e57ef30b5315bf6d104b56cd6d9feda7efa057208c0fe9764461fa14790b95c11cec8f57b5146e9b43c7b6a2c0bc27e9efdb94c7cc1ff78f12c4965a1103c55894c1749755b740e9c8532086f80e92ce0eb17c1f794f095c78c71e57058035544b0be8", 0x6d, 0x20}, {&(0x7f0000000100)="42c71cc5418b0f6b5128655b8d53c288b9df391e5f60f21e7c87572c", 0x1c, 0x800}], 0x4020, &(0x7f00000013c0)={[{@noacl='noacl'}, {@norecovery='norecovery'}, {@statfs_quantum={'statfs_quantum', 0x3d, 0x3}}, {@quota='quota'}, {@quota_account='qoo\xab\x8b\xfb`A\xff,\x95nt'}, {@upgrade='upgrade'}, {@lockproto_dlm='lockproto=dlm'}], [{@euid_lt={'euid<', r1}}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x800, 0x0, 0x0, 0x0, 0x0, 0x51ca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) syz_mount_image$hfsplus(&(0x7f0000001440)='hfsplus\x00', &(0x7f0000001480)='./file0\x00', 0x9941, 0x1, &(0x7f0000001540)=[{&(0x7f00000014c0)="5a81c9c4db10f0fb46e9ee01b0cbc64904f7cdcbc200c67daedebfc972b959e0e3406e79b1d83ff04cc38c6ccccd45c43c37d9b49150df23cac3c76e43f8881d402d676c076533684662aca7e43f2afb1d", 0x51, 0x7fffffff}], 0x202000, &(0x7f0000001580)={[{@type={'type', 0x3d, "e8ca1120"}}, {@part={'part', 0x3d, 0x5}}, {@decompose='decompose'}], [{@subj_user={'subj_user', 0x3d, '&()::$-eth0bdev:security'}}]}) [ 643.787984][T26705] debugfs: File '26704' in directory 'proc' already present! [ 643.842787][T26705] binder: 26704:26705 unknown command -162021415 [ 643.870846][T26705] binder: 26704:26705 ioctl c0306201 20012000 returned -22 00:29:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:16 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') read$alg(0xffffffffffffffff, &(0x7f0000000000)=""/228, 0xe4) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) [ 643.889103][T26722] binder: 26704:26722 ioctl 40189206 20000180 returned -22 [ 643.910122][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 644.055489][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:16 executing program 4: r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:16 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4020565b, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:17 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') ioctl$DRM_IOCTL_MODE_GETRESOURCES(r4, 0xc04064a0, &(0x7f0000000200)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x4, 0x2, 0x5}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r6, r7, 0x0, 0x50000000000443) recvmmsg(r6, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet6_opts(r6, 0x29, 0x20, &(0x7f0000000300)=""/146, &(0x7f00000003c0)=0x92) sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000001280)=0x0) r9 = gettid() tkill(r9, 0x1000000000015) kcmp(r8, r9, 0x3, r1, r1) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r10, 0x0, 0x0, 0x0) r11 = fcntl$getown(r10, 0x9) sched_setparam(r11, &(0x7f00000002c0)=0xfff) 00:29:17 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 644.616098][T26744] debugfs: File '26743' in directory 'proc' already present! [ 644.625272][T26744] binder: 26743:26744 unknown command -162021415 [ 644.638181][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 644.684714][T26744] binder: 26743:26744 ioctl c0306201 20012000 returned -22 00:29:17 executing program 4: r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:17 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x8000) ioctl$VIDIOC_G_EDID(r3, 0xc0285628, &(0x7f00000001c0)={0x0, 0x3, 0x401, [], &(0x7f0000000180)=0x1}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r5, r6, 0x0, 0x50000000000443) recvmmsg(r5, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r8, r9, 0x0, 0x50000000000443) recvmmsg(r8, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r10, 0x84, 0x9, &(0x7f0000000000)={r11, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r11, 0x3a8e}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000200)={r11, 0xfff}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000280)={r12, 0xffffffffffff0001}, &(0x7f00000002c0)=0x8) [ 644.765735][T26756] binder: 26743:26756 ioctl 4020565b 20000180 returned -22 00:29:17 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 644.826374][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 644.843121][T26744] debugfs: File '26743' in directory 'proc' already present! [ 644.852611][T26756] binder: 26743:26756 unknown command -162021415 00:29:17 executing program 4: r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 644.880015][T26756] binder: 26743:26756 ioctl c0306201 20012000 returned -22 00:29:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:17 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4020940d, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:17 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:17 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:17 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 645.037067][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 645.063584][T26790] debugfs: File '26789' in directory 'proc' already present! [ 645.102165][T26790] binder: 26789:26790 unknown command -162021415 [ 645.108641][T26790] binder: 26789:26790 ioctl c0306201 20012000 returned -22 [ 645.136971][T26790] debugfs: File '26789' in directory 'proc' already present! 00:29:20 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4020ae46, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:20 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "0600001000", "442065238929350ade91900b51fc9534", "2fdbff00", "7ee51430da3f51b3"}, 0x28) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f00000001c0)=0xd07) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0x27ab559b6916af3e) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x30) bind$alg(r3, &(0x7f0000000300)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-aesni\x00'}, 0x58) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$PPPIOCCONNECT(r6, 0x4004743a, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r4) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000140)=0x6, 0x8e) [ 647.723046][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 647.726086][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 647.749412][T26813] debugfs: File '26811' in directory 'proc' already present! 00:29:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, @in6={0xa, 0x4e22, 0x3, @rand_addr="020fc84fd8e41eedfa5a96f37dea3335", 0x3}, @in6={0xa, 0x4e24, 0x1c, @local, 0x3}, @in6={0xa, 0x4e23, 0x7ff, @remote, 0x1}, @in6={0xa, 0x4e23, 0x3, @mcast1, 0xea1a}, @in6={0xa, 0x4e20, 0x100, @remote, 0x1}], 0x9c) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0, 0xff3b}}], 0xf85f73acad48c8b9, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffff2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002101400010000080e00", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r8, r9, 0x0, 0x50000000000443) recvmmsg(r8, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$SIOCAX25DELFWD(r8, 0x89eb, &(0x7f0000000980)={@null, @bcast}) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_GROUP={0x8}, @IFLA_IFNAME={0x14, 0x3, 'sit0\x00'}]}, 0x3c}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r13, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002101400010000080e00", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r14, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_GROUP={0x8}, @IFLA_IFNAME={0x14, 0x3, 'sit0\x00'}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @empty, @initdev}, &(0x7f00000007c0)=0xc) sendmsg$inet(r3, &(0x7f0000000940)={&(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10, &(0x7f0000000740)=[{&(0x7f00000002c0)="01680d6f241b4259ee25d56db65c10cf0fc324e98d83067930cb3fbd130a0300188cf4bac9c388a8ea4a99548ce40adcdc7b16389365e5ef747b4174124dbbe6bbc5ad4124d4d2be00424f5bb6376f64451ffa9be53e01bb8ef60f6fbbbe4fc412473f60aa5b77ff2ef9645c062ba50db0f000fde105cef8fc88782427d21e99d5fdec396db3d93c829405c7adc87b79075061ca497a9e331bc28ef0000e56bf4970f40ccab48b53dec53cdef70855af8f5fc28696939804a58d3e6111b68140971c6ea171e1412e21a7a55f108e20b91669f61a78d51058f843e6a17e8a5917cc8f81440cfa", 0xe6}, {&(0x7f00000003c0)="1d369ebb5c6a3846a576ba2e73ec5e871b6d25f3ee51f73b9b9676c4bd25bcc5b68b36662ba01fc0604e3b131684a679352eb401550715db2d588c3d078a6cdad1e0728530a3602108b3d062c61fecde0c4b3fd2c68b94f0466a6797849706f62cef6ac5599e3a5f34f48f17b729381c2101dc636fa35f1090c15f6e46a963bd736d7df20221b23e16eb2bee1938deef4481becd181bcec88a10004e39cddff1819b270dbf", 0xa5}, {&(0x7f0000000480)="4ad0ca62550740b48ddef277a9633aed285db29016087e59851c6cd38f111cf56a68767bb8cf771a97cd4f4b163f1cae04679360d986efabdb1a022ab3d3e6758a47cf24cf47433ee9f67d432f7c1a13ad5c7304ab0b045856228de5ba77697314200df7152863f4669631411d19ebf5d5556876", 0x74}, {&(0x7f0000000500)="f1fb3c9168b96913e35d9a78363796ee7fc2f0d303dc611b8fe06ee1c683b5327c400c1e6ff536ccfe66ca7f7cc685837dff102628d70935af03794518b2bab164851ed5587e9e8ad547c2455ae1c29f207dd8ad3fea40a0a26da319aa5a10175ef28fb839743fb222357a4ee375c0da2e", 0x71}, {&(0x7f0000000580)="88f5023a3f33d1b4ef77c1232989980da3d8f5f84adfc2a3663328425a32f5ae75c8a690a2228bf59f3414078303e99429e60ea859e7c442f092d1977568f5d82b2354236434cb12d2f3b8fd707ef3d37bf123f00daf0148982fd18378240042d4484ca8e462c3b483fd0cc9d744b1a346bea8846b7577a6eea3df27c6e64722", 0x80}, {&(0x7f0000000600)="c0da6820eac28268072931458d3a97cda84bb85becfc0f9769ff2f5c4e48e9fa002f52fe0b597766b795252101622395788585fae7b7d6dcad7562e28ba9c80d035b7fabd77a80f22aa1b39ecc8293104fda26bda8b9051142ccd2aa12c3aa75da256bbe86027f9e8855acb33ed9df090100f0a9b7302f0089", 0x79}, {&(0x7f0000000680)="910e40891bdf7ac1b8566ee19aac0e6eb6b12b562343f304347b0e63a03074c86ad32e6ce53eb5465a27fd3a1f6f499cbb08140305c597b1a3acc86d302884e04d04cc461f391a4733899af58f0ae2e5e8da4cd6923a4f60ba2b0bd1a742f23dc1ec96bfec7a1daf4f82660ec204144c0e02aa26c1f3b52c250a8a3ec057b636294ca9f895adc82708bcf62138ade3531bb2ac596f2b42de9ca391fa829ef68091a379b37cad", 0xa6}], 0x7, &(0x7f0000000800)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xffffffff}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@noop, @end, @timestamp={0x44, 0x2c, 0xb55, 0x3, 0x4, [{[], 0x2}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x1}, {[@remote], 0xf9}, {}, {[@loopback], 0x1824}, {[@multicast2], 0x6}]}, @lsrr={0x83, 0x7, 0xfffffffffffffffc, [@loopback]}, @rr={0x7, 0x23, 0x1, [@empty, @loopback, @multicast2, @loopback, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x21}, @empty]}, @generic={0x94, 0x4, "0627"}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @loopback, @empty}}}, @ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r15, @dev={0xac, 0x14, 0x14, 0x22}, @rand_addr=0x2}}}], 0x130}, 0x3ea003e7ad67b52d) 00:29:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 647.772264][T26813] binder: 26811:26813 unknown command -162021415 [ 647.809477][T26813] binder: 26811:26813 ioctl c0306201 20012000 returned -22 [ 647.846669][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 647.847999][T26813] binder: 26811:26813 ioctl 4020ae46 20000180 returned -22 [ 647.878253][T26813] debugfs: File '26811' in directory 'proc' already present! 00:29:20 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4080aea2, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 647.892747][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 647.955148][T26833] debugfs: File '26832' in directory 'proc' already present! [ 647.958834][T26836] A link change request failed with some changes committed already. Interface veth7 may have been left with an inconsistent configuration, please check. [ 647.986644][T26833] binder: 26832:26833 unknown command -162021415 [ 647.993473][T26833] binder: 26832:26833 ioctl c0306201 20012000 returned -22 [ 648.012031][T26833] binder: 26832:26833 ioctl 4080aea2 20000180 returned -22 [ 648.026657][T26833] debugfs: File '26832' in directory 'proc' already present! 00:29:20 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:20 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4090ae82, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 648.142294][T26848] debugfs: File '26847' in directory 'proc' already present! [ 648.164649][T26848] binder: 26847:26848 unknown command -162021415 [ 648.175373][T26848] binder: 26847:26848 ioctl c0306201 20012000 returned -22 [ 648.209785][T26848] binder: 26847:26848 ioctl 4090ae82 20000180 returned -22 [ 648.224998][T26848] debugfs: File '26847' in directory 'proc' already present! 00:29:20 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0xffffffff, 0x6400) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:21 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:21 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x40a85321, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 648.701997][T26877] debugfs: File '26875' in directory 'proc' already present! [ 648.729458][T26877] binder: 26875:26877 unknown command -162021415 [ 648.774403][T26877] binder: 26875:26877 ioctl c0306201 20012000 returned -22 [ 648.800529][T26877] binder: 26875:26877 ioctl 40a85321 20000180 returned -22 [ 648.826114][T26877] debugfs: File '26875' in directory 'proc' already present! 00:29:23 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 00:29:23 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:23 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x4138ae84, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:23 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, &(0x7f00000001c0)={{0x5, 0x1a3c000, 0x0, 0x100, 0x4, 0x8}, 0x0, 0x7, 0x1}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r6, r7, 0x0, 0x50000000000443) recvmmsg(r6, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) sendfile(r6, r4, 0x0, 0x1e8e) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "442065238929350ade91900b51fc9534", 'r]_7'}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 651.163508][ C1] net_ratelimit: 6 callbacks suppressed [ 651.163518][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 651.184594][T26903] debugfs: File '26901' in directory 'proc' already present! [ 651.196055][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 651.197800][T26903] binder: 26901:26903 unknown command -162021415 00:29:23 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 651.231005][T26903] binder: 26901:26903 ioctl c0306201 20012000 returned -22 [ 651.255939][T26903] binder: 26901:26903 ioctl 4138ae84 20000180 returned -22 00:29:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) [ 651.283795][T26903] debugfs: File '26901' in directory 'proc' already present! 00:29:23 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x80044325, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:23 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 651.323455][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 651.347401][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 651.495733][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 651.495751][T26933] debugfs: File '26929' in directory 'proc' already present! [ 651.523757][T26933] binder: 26929:26933 unknown command -162021415 [ 651.530121][T26933] binder: 26929:26933 ioctl c0306201 20012000 returned -22 [ 651.568971][T26933] binder: 26929:26933 ioctl 80044325 20000180 returned -22 [ 651.579417][T26933] debugfs: File '26929' in directory 'proc' already present! 00:29:26 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 00:29:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:26 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:26 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x80045300, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:26 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) write$P9_RXATTRCREATE(r4, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0x7) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:26 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 654.226214][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 654.243661][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 654.245806][T26950] debugfs: File '26949' in directory 'proc' already present! 00:29:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) [ 654.344966][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 654.347699][T26960] binder: 26949:26960 ioctl 80045300 20000180 returned -22 00:29:26 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 654.385960][T26950] debugfs: File '26949' in directory 'proc' already present! 00:29:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:26 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x80045430, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 654.435737][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 654.464231][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 654.557144][T26984] debugfs: File '26982' in directory 'proc' already present! [ 654.566529][T26984] binder: 26982:26984 unknown command -162021415 [ 654.573212][T26984] binder: 26982:26984 ioctl c0306201 20012000 returned -22 [ 654.598239][T26984] binder: 26982:26984 ioctl 80045430 20000180 returned -22 [ 654.615480][T26984] debugfs: File '26982' in directory 'proc' already present! 00:29:29 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) 00:29:29 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:29 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x800454d2, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:29 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x80000) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendto$inet6(r4, &(0x7f0000000140)="51a11da3b2f399d23ca1d105e93a166437f4e23a4fa8b3877c2133d60d671e4b27a0", 0xfffffffffffffd0a, 0x800, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) 00:29:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 657.307195][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 657.334635][T27001] debugfs: File '26993' in directory 'proc' already present! 00:29:29 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) [ 657.348582][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 657.375344][T27001] binder: 26993:27001 unknown command -162021415 [ 657.389799][T27001] binder: 26993:27001 ioctl c0306201 20012000 returned -22 [ 657.433587][T27001] binder: 26993:27001 ioctl 800454d2 20000180 returned -22 [ 657.462609][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:29 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 657.482533][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 657.520263][T27001] debugfs: File '26993' in directory 'proc' already present! [ 657.625814][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:32 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:32 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:32 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x80086301, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:32 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x80002, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 660.360639][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 660.379223][T27046] debugfs: File '27038' in directory 'proc' already present! [ 660.398043][T27046] binder: 27038:27046 unknown command -162021415 00:29:32 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 660.405570][T27046] binder: 27038:27046 ioctl c0306201 20012000 returned -22 [ 660.418483][T27046] binder: 27038:27046 ioctl 80086301 20000180 returned -22 00:29:32 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:32 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x80086601, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 660.475687][T27046] debugfs: File '27038' in directory 'proc' already present! [ 660.510468][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 660.634548][T27069] debugfs: File '27065' in directory 'proc' already present! [ 660.648751][T27069] binder: 27065:27069 unknown command -162021415 [ 660.655922][T27069] binder: 27065:27069 ioctl c0306201 20012000 returned -22 [ 660.678326][T27069] binder: 27065:27069 ioctl 80086601 20000180 returned -22 [ 660.695664][T27069] debugfs: File '27065' in directory 'proc' already present! 00:29:35 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:35 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:35 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x80087601, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:35 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = shmget(0x0, 0x3000, 0x100, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000140)=""/4096) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 663.432688][T27083] debugfs: File '27082' in directory 'proc' already present! [ 663.436878][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:35 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 663.477577][T27083] binder: 27082:27083 unknown command -162021415 00:29:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 663.523829][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 663.553439][T27083] binder: 27082:27083 ioctl c0306201 20012000 returned -22 00:29:35 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 663.585889][T27102] binder: 27082:27102 ioctl 80087601 20000180 returned -22 00:29:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 663.650497][T27083] debugfs: File '27082' in directory 'proc' already present! [ 663.660678][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:38 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:38 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:38 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x80285442, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:38 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000700)=@ipv6_newrule={0x3c, 0x20, 0x80d, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10015}, [@FRA_SRC={0x14, 0x2, @empty}, @FIB_RULE_POLICY=@FRA_IP_PROTO={0x8, 0x16, 0x2e}]}, 0x3c}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000040)=0x3f) 00:29:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:38 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x5000000000043f) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) accept$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 666.495501][T27131] debugfs: File '27128' in directory 'proc' already present! [ 666.516955][T27135] netlink: 'syz-executor.3': attribute type 22 has an invalid length. [ 666.528376][T27131] binder: 27128:27131 unknown command -162021415 00:29:38 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:38 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 666.548792][T27131] binder: 27128:27131 ioctl c0306201 20012000 returned -22 [ 666.576935][T27131] binder: 27128:27131 ioctl 80285442 20000180 returned -22 00:29:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x20001208104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='pipefs\x00', 0x0, 0x0) 00:29:39 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x8138ae83, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 666.622258][T27131] debugfs: File '27128' in directory 'proc' already present! [ 666.776554][T27162] debugfs: File '27160' in directory 'proc' already present! [ 666.803158][T27162] binder: 27160:27162 unknown command -162021415 [ 666.809756][T27162] binder: 27160:27162 ioctl c0306201 20012000 returned -22 [ 666.823626][T27162] binder: 27160:27162 ioctl 8138ae83 20000180 returned -22 [ 666.834085][T27162] debugfs: File '27160' in directory 'proc' already present! 00:29:41 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:41 executing program 3: 00:29:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:41 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:41 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0044308, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:41 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xfffffffffffffde3) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 669.545471][T27177] debugfs: File '27174' in directory 'proc' already present! 00:29:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:41 executing program 3: 00:29:41 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 669.588662][T27177] binder: 27174:27177 unknown command -162021415 00:29:42 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 669.658071][T27177] binder: 27174:27177 ioctl c0306201 20012000 returned -22 [ 669.678163][T27190] binder: 27174:27190 ioctl c0044308 20000180 returned -22 00:29:42 executing program 3: 00:29:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 669.717491][T27177] debugfs: File '27174' in directory 'proc' already present! 00:29:42 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0045878, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:42 executing program 3: 00:29:42 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 669.858613][T27208] debugfs: File '27207' in directory 'proc' already present! [ 669.868858][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 669.880316][T27208] binder: 27207:27208 unknown command -162021415 [ 669.891031][T27208] binder: 27207:27208 ioctl c0306201 20012000 returned -22 00:29:44 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:44 executing program 3: 00:29:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:44 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0045878, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:44 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:44 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f00000001c0)=0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr, 0xfffffffffffffffe}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r3 = socket$alg(0x26, 0x5, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r5, r6, 0x0, 0x50000000000443) bind$alg(r6, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-avx\x00'}, 0xfffffffffffffdd3) r7 = accept4(r3, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$BLKALIGNOFF(r8, 0x127a, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:45 executing program 3: 00:29:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 672.643256][T27229] debugfs: File '27227' in directory 'proc' already present! [ 672.649684][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 672.680475][T27229] binder: 27227:27229 unknown command -162021415 [ 672.724209][T27229] binder: 27227:27229 ioctl c0306201 20012000 returned -22 00:29:45 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:45 executing program 3: socket$inet(0x2, 0x3, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) r1 = socket(0x2, 0xc003, 0x0) connect$unix(r1, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], 0x10) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000080), 0x4) setsockopt$sock_int(r0, 0xffff, 0x800, &(0x7f0000000500)=0x6e, 0x4) writev(r1, &(0x7f0000000000)=[{0x0}], 0x1) 00:29:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 672.774062][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 672.781756][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:45 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0046209, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:45 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 672.988207][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 673.015420][T27268] debugfs: File '27263' in directory 'proc' already present! 00:29:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 673.057092][T27268] binder: 27263:27268 unknown command -162021415 [ 673.095262][T27268] binder: 27263:27268 ioctl c0306201 20012000 returned -22 00:29:45 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) write$FUSE_ATTR(r1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x1d4d29f1dfa97d20) 00:29:45 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:45 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc008ae05, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:45 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001280)={0x2, 0x1, 0x200, 0x9, 0x50, 0x0, 0x70bd2b, 0x25dfdbfc, [@sadb_x_sec_ctx={0x1a, 0x18, 0x18000, 0x0, 0xc3, "1cdf3735dc45ea24975ee45549471481cc6f65a44f456ef860cb5f9b077a688329771cbb6b529180940f21460e53ebc3ea4ecb6abcb5713db022ed7bf068e20007c48d9cab7c028fa888df1605ac3f2bb38539317eaaa8c23899098b40b3011261f973754296a16f1068046ea62f702eccf0241f27fabe40e5b50efe30a0e9d1584c7d414f684aeb9e590e4a77494783f41411fa881ea62f047af534c09bd6babf40de9c6d0437894f0857527626fa76234557207b06c725bf8063e154e6612b419083"}, @sadb_key={0x1b, 0x2, 0x678, 0x0, "b9ffc301b156aed0e93ddb84e90ab11dd575c5631b45793c0972d600aaf270c93cdfd5c4f649284b790d89a690a090da7493a73e5bab352d2cfd725b6c3b63feae6f74feac54119a44a4f1f8138977fb1fccf77372d8112b2b9f36e912ba56fe2f9bc2c639f88203bc5815d3d42e4805189474b76aa4c58d4074eaa018deb85229f3382800f7da1626b1f5d7558547d6a0f7486e49add4057bd8b44f305557733a3eda952084e9650e437829e9d2507c9fe1523cc37c6974a7ffe8aebbfce9ac98a7b9cfb735b571b8c1f91dcd34e1"}, @sadb_spirange={0x2, 0x10, 0x4d5, 0x4d2}, @sadb_x_nat_t_type={0x1, 0x14, 0xc000000000000}, @sadb_key={0x12, 0x9, 0x428, 0x0, "5342960cd54db6f28b8fea5114b2d55d1bbdf71e977ec301205f4e7ae5332150ae407d265a7b6895709ecb6ad0f62542b4c90c3d6e19a66f8fce9c9ea3da63fb7a8a6cb2b5ebb5bd059f36e481f41735c40cdc68187fe00bf7e951d6e5dfdef6b308622aa456698d3aa8d6a51cdaa2466df1fb6c57dece80b9041177dee1e733d756be5bfc"}, @sadb_lifetime={0x4, 0x2, 0x9, 0x6, 0x3}]}, 0x280}}, 0x40) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r1, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r5, r6, 0x0, 0x50000000000443) getsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r7, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:45 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 673.551290][T27298] debugfs: File '27297' in directory 'proc' already present! [ 673.558156][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 673.586901][T27298] binder: 27297:27298 unknown command -162021415 00:29:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 673.613932][T27298] binder: 27297:27298 ioctl c0306201 20012000 returned -22 [ 673.651937][T27315] binder: 27297:27315 ioctl c008ae05 20000180 returned -22 00:29:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0xcc, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0x9, 0x1, 'netem\x00'}, {0x4c, 0x2, {{}, [@TCA_NETEM_RATE64={0xc}, @TCA_NETEM_REORDER={0xc, 0x5, {0x10}}, @TCA_NETEM_JITTER64={0xc}, @TCA_NETEM_REORDER={0xc}]}}}, @qdisc_kind_options=@q_htb={{0x0, 0x1, 'htb\x00'}, {0x0, 0x2, [@TCA_HTB_DIRECT_QLEN, @TCA_HTB_DIRECT_QLEN, @TCA_HTB_INIT, @TCA_HTB_DIRECT_QLEN, @TCA_HTB_DIRECT_QLEN, @TCA_HTB_INIT, @TCA_HTB_DIRECT_QLEN, @TCA_HTB_INIT]}}]}, 0xcc}}, 0x0) 00:29:46 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 673.718347][T27298] debugfs: File '27297' in directory 'proc' already present! [ 673.719993][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:46 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc008ae09, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 673.844092][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 673.851428][T27332] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.3'. 00:29:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:46 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 673.991505][T27340] debugfs: File '27339' in directory 'proc' already present! [ 674.007187][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 674.013836][T27340] binder: 27339:27340 unknown command -162021415 [ 674.041944][T27340] binder: 27339:27340 ioctl c0306201 20012000 returned -22 [ 674.055033][T27340] binder: 27339:27340 ioctl c008ae09 20000180 returned -22 [ 674.111044][T27340] debugfs: File '27339' in directory 'proc' already present! 00:29:46 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x39, 0x2, 0x200, "0c99149722b1b83d7afe556d76205cdc", "f519c0b8b4ff87f9a2a9ef55c6324ecaa2a242965ab964988b093f39e496bb4605b205be"}, 0x39, 0x1) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffff7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) sched_setparam(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) sched_setattr(r0, &(0x7f0000000000)={0x30, 0x0, 0x1, 0x2, 0x7, 0x3ff, 0xfffffffffffff801, 0x3}, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$get_persistent(0xf, 0x0, 0x0) r3 = msgget$private(0x0, 0x40) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000540)=""/147) r4 = geteuid() setfsuid(r4) setfsuid(r4) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getegid() creat(&(0x7f0000000040)='./bus\x00', 0x0) 00:29:46 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:46 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0106426, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:46 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 674.473743][T27370] debugfs: File '27368' in directory 'proc' already present! [ 674.491568][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 674.503677][T27370] binder: 27368:27370 unknown command -162021415 00:29:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 674.529177][T27370] binder: 27368:27370 ioctl c0306201 20012000 returned -22 00:29:47 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:47 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0186202, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 674.587527][T27370] binder: 27368:27370 ioctl c0106426 20000180 returned -22 [ 674.608463][T27370] debugfs: File '27368' in directory 'proc' already present! [ 674.780526][T27399] debugfs: File '27396' in directory 'proc' already present! [ 674.807926][T27399] binder: 27396:27399 unknown command -162021415 [ 674.814583][T27399] binder: 27396:27399 ioctl c0306201 20012000 returned -22 [ 674.824441][T27399] binder: 27396:27399 ioctl c0186202 20000180 returned -22 [ 674.842506][T27399] debugfs: File '27396' in directory 'proc' already present! 00:29:47 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x3) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080)=0x800001, 0x4) 00:29:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:47 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:47 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0186203, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:47 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={r4, @in={{0x2, 0x0, @empty}}}, 0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r4, 0x3a8e}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000180)={r4, @in={{0x2, 0x4e21, @empty}}}, 0x84) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:47 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:47 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 675.443368][ C1] net_ratelimit: 1 callbacks suppressed [ 675.443378][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 675.443870][T27418] debugfs: File '27413' in directory 'proc' already present! 00:29:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 675.518156][T27421] binder: 27413:27421 ioctl c0186203 20000180 returned -22 [ 675.554442][T27418] debugfs: File '27413' in directory 'proc' already present! [ 675.568695][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:48 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0186204, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:48 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 675.685487][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 675.733817][T27441] debugfs: File '27439' in directory 'proc' already present! 00:29:48 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 675.803252][T27441] binder: 27439:27441 ioctl c0186204 20000180 returned -22 00:29:48 executing program 3 (fault-call:8 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:48 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 675.857076][T27441] debugfs: File '27439' in directory 'proc' already present! [ 675.890256][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 675.944836][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 675.965982][T27457] FAULT_INJECTION: forcing a failure. [ 675.965982][T27457] name failslab, interval 1, probability 0, space 0, times 0 [ 675.982849][T27457] CPU: 0 PID: 27457 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 675.990777][T27457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.000835][T27457] Call Trace: [ 676.005252][T27457] dump_stack+0x172/0x1f0 [ 676.005273][T27457] should_fail.cold+0xa/0x15 [ 676.005288][T27457] ? __bpf_address_lookup+0x310/0x310 [ 676.005301][T27457] ? fault_create_debugfs_attr+0x180/0x180 [ 676.005314][T27457] ? page_to_nid.part.0+0x20/0x20 [ 676.005327][T27457] ? ___might_sleep+0x163/0x280 [ 676.005342][T27457] __should_failslab+0x121/0x190 [ 676.005359][T27457] should_failslab+0x9/0x14 [ 676.044859][T27457] __kmalloc+0x2e0/0x770 [ 676.049102][T27457] ? lock_sock_nested+0x9a/0x120 [ 676.054213][T27457] ? trace_hardirqs_on+0x67/0x240 [ 676.059404][T27457] ? tls_get_rec+0xfe/0x590 [ 676.063890][T27457] tls_get_rec+0xfe/0x590 [ 676.068325][T27457] ? lock_sock_nested+0xe2/0x120 [ 676.073251][T27457] tls_sw_sendmsg+0xda5/0x17b0 [ 676.078465][T27457] ? tx_work_handler+0x180/0x180 [ 676.083394][T27457] ? ksys_dup3+0x327/0x3e0 [ 676.087859][T27457] ? get_pid_task+0xc9/0x190 [ 676.092440][T27457] ? __kasan_check_read+0x11/0x20 [ 676.097456][T27457] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 676.103861][T27457] inet6_sendmsg+0x9e/0xe0 [ 676.108287][T27457] ? inet6_ioctl+0x1c0/0x1c0 [ 676.112975][T27457] sock_sendmsg+0xd7/0x130 [ 676.117515][T27457] __sys_sendto+0x262/0x380 [ 676.122030][T27457] ? __ia32_sys_getpeername+0xb0/0xb0 [ 676.127398][T27457] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 676.132932][T27457] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 676.139153][T27457] ? fput_many+0x12c/0x1a0 [ 676.143553][T27457] ? fput+0x1b/0x20 [ 676.147347][T27457] ? ksys_write+0x1cf/0x290 [ 676.151839][T27457] ? __ia32_sys_read+0xb0/0xb0 [ 676.156750][T27457] ? switch_fpu_return+0x1fa/0x4f0 [ 676.161872][T27457] __x64_sys_sendto+0xe1/0x1a0 [ 676.166740][T27457] do_syscall_64+0xfd/0x6a0 [ 676.171335][T27457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.177237][T27457] RIP: 0033:0x4598e9 [ 676.181116][T27457] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 676.201094][T27457] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 676.209535][T27457] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 676.217491][T27457] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 676.225520][T27457] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 676.233473][T27457] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 676.241444][T27457] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 00:29:48 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x8, 0x1) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) recvmmsg(r3, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000001c0)={'bond_slave_0\x00', &(0x7f0000000180)=@ethtool_rxfh_indir={0x0, 0x7, [0x4, 0x135, 0xfffffffffffffff7, 0x20, 0x6, 0x200, 0xb8]}}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:48 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0186205, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:48 executing program 3 (fault-call:8 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 676.418577][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 676.435623][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 676.441954][T27476] debugfs: File '27473' in directory 'proc' already present! [ 676.455055][T27477] FAULT_INJECTION: forcing a failure. [ 676.455055][T27477] name failslab, interval 1, probability 0, space 0, times 0 00:29:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 676.465590][T27476] binder: 27473:27476 unknown command -162021415 [ 676.477708][T27476] binder: 27473:27476 ioctl c0306201 20012000 returned -22 [ 676.493609][T27476] binder: 27473:27476 ioctl c0186205 20000180 returned -22 [ 676.501559][T27477] CPU: 1 PID: 27477 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 676.509460][T27477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.519502][T27477] Call Trace: [ 676.519525][T27477] dump_stack+0x172/0x1f0 [ 676.519543][T27477] should_fail.cold+0xa/0x15 [ 676.519559][T27477] ? fault_create_debugfs_attr+0x180/0x180 [ 676.519571][T27477] ? page_to_nid.part.0+0x20/0x20 [ 676.519585][T27477] ? ___might_sleep+0x163/0x280 [ 676.519601][T27477] __should_failslab+0x121/0x190 [ 676.519616][T27477] should_failslab+0x9/0x14 [ 676.519626][T27477] __kmalloc+0x2e0/0x770 [ 676.519641][T27477] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 676.519656][T27477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.519669][T27477] ? tls_get_rec+0xfe/0x590 [ 676.519688][T27477] tls_get_rec+0xfe/0x590 [ 676.583494][T27477] tls_sw_sendmsg+0xda5/0x17b0 [ 676.588275][T27477] ? tx_work_handler+0x180/0x180 [ 676.593220][T27477] ? ksys_dup3+0x327/0x3e0 [ 676.597637][T27477] ? get_pid_task+0xc9/0x190 [ 676.602232][T27477] ? __kasan_check_read+0x11/0x20 [ 676.607266][T27477] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 676.613528][T27477] inet6_sendmsg+0x9e/0xe0 [ 676.618244][T27477] ? inet6_ioctl+0x1c0/0x1c0 [ 676.623095][T27477] sock_sendmsg+0xd7/0x130 [ 676.627614][T27477] __sys_sendto+0x262/0x380 [ 676.632134][T27477] ? __ia32_sys_getpeername+0xb0/0xb0 [ 676.637690][T27477] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 676.643254][T27477] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 676.650375][T27477] ? fput_many+0x12c/0x1a0 [ 676.654801][T27477] ? fput+0x1b/0x20 [ 676.658628][T27477] ? ksys_write+0x1cf/0x290 [ 676.663219][T27477] ? __ia32_sys_read+0xb0/0xb0 [ 676.667988][T27477] ? switch_fpu_return+0x1fa/0x4f0 [ 676.670773][T27476] debugfs: File '27473' in directory 'proc' already present! [ 676.673122][T27477] __x64_sys_sendto+0xe1/0x1a0 [ 676.673141][T27477] do_syscall_64+0xfd/0x6a0 [ 676.673159][T27477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.673168][T27477] RIP: 0033:0x4598e9 [ 676.673186][T27477] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:29:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 676.695664][T27477] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 676.719248][T27477] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 676.719254][T27477] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 676.719260][T27477] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 676.719267][T27477] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 676.719274][T27477] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 00:29:49 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0186206, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 676.743571][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 676.835766][T27500] debugfs: File '27498' in directory 'proc' already present! [ 676.847042][T27500] binder: 27498:27500 unknown command -162021415 [ 676.853774][T27500] binder: 27498:27500 ioctl c0306201 20012000 returned -22 [ 676.869854][T27500] binder: 27498:27500 ioctl c0186206 20000180 returned -22 [ 676.884266][T27500] debugfs: File '27498' in directory 'proc' already present! 00:29:51 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, 0xffffffffffffffff, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:51 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0186207, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:51 executing program 3 (fault-call:8 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:51 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x50000000000443) accept4$ax25(r3, 0x0, &(0x7f0000000140), 0x40000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r4, 0x0, 0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) mount$9p_rdma(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x200000, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@sq={'sq', 0x3d, 0x9}}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'posix_acl_accessmime_typewlan0'}}, {@subj_role={'subj_role', 0x3d, 'skcipher\x00'}}, {@fowner_lt={'fowner<', r5}}, {@audit='audit'}, {@measure='measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'tls\x00'}}, {@subj_type={'subj_type', 0x3d, 'user]^'}}]}}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 679.012753][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 679.028263][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 679.035513][T27523] debugfs: File '27514' in directory 'proc' already present! 00:29:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 679.057790][T27522] FAULT_INJECTION: forcing a failure. [ 679.057790][T27522] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 679.082038][T27523] binder: 27514:27523 unknown command -162021415 [ 679.099537][T27523] binder: 27514:27523 ioctl c0306201 20012000 returned -22 [ 679.104771][T27522] CPU: 0 PID: 27522 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 679.115465][T27522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.125380][T27523] binder: 27514:27523 ioctl c0186207 20000180 returned -22 [ 679.125534][T27522] Call Trace: [ 679.137259][T27522] dump_stack+0x172/0x1f0 [ 679.141603][T27522] should_fail.cold+0xa/0x15 [ 679.143617][T27523] debugfs: File '27514' in directory 'proc' already present! [ 679.146201][T27522] ? fault_create_debugfs_attr+0x180/0x180 00:29:51 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0186208, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 679.146222][T27522] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 679.164930][T27522] should_fail_alloc_page+0x50/0x60 [ 679.170145][T27522] __alloc_pages_nodemask+0x1a1/0x900 [ 679.175527][T27522] ? __alloc_pages_slowpath+0x2520/0x2520 [ 679.181263][T27522] ? fault_create_debugfs_attr+0x180/0x180 [ 679.187257][T27522] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 679.193511][T27522] alloc_pages_current+0x107/0x210 [ 679.198841][T27522] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 679.204684][T27522] skb_page_frag_refill+0x267/0x470 [ 679.209987][T27522] sk_page_frag_refill+0x55/0x1f0 [ 679.215094][T27522] sk_msg_alloc+0x10e/0x8d0 [ 679.219711][T27522] tls_sw_sendmsg+0x62e/0x17b0 [ 679.224497][T27522] ? tx_work_handler+0x180/0x180 [ 679.229481][T27522] ? ksys_dup3+0x327/0x3e0 [ 679.232762][T27537] debugfs: File '27536' in directory 'proc' already present! [ 679.233935][T27522] ? get_pid_task+0xc9/0x190 [ 679.233951][T27522] ? __kasan_check_read+0x11/0x20 [ 679.233973][T27522] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 679.257858][T27522] inet6_sendmsg+0x9e/0xe0 00:29:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 679.262291][T27522] ? inet6_ioctl+0x1c0/0x1c0 [ 679.263875][T27537] binder: 27536:27537 unknown command -162021415 [ 679.266886][T27522] sock_sendmsg+0xd7/0x130 [ 679.266902][T27522] __sys_sendto+0x262/0x380 [ 679.266925][T27522] ? __ia32_sys_getpeername+0xb0/0xb0 [ 679.283269][T27522] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 679.294146][T27522] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 679.294159][T27522] ? fput_many+0x12c/0x1a0 [ 679.294169][T27522] ? fput+0x1b/0x20 [ 679.294182][T27522] ? ksys_write+0x1cf/0x290 00:29:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 679.294198][T27522] ? __ia32_sys_read+0xb0/0xb0 [ 679.317839][T27522] ? switch_fpu_return+0x1fa/0x4f0 [ 679.322968][T27522] __x64_sys_sendto+0xe1/0x1a0 [ 679.324455][T27541] binder: 27536:27541 ioctl c0186208 20000180 returned -22 [ 679.327741][T27522] do_syscall_64+0xfd/0x6a0 [ 679.327763][T27522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.345495][T27522] RIP: 0033:0x4598e9 00:29:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 679.349424][T27522] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 679.349433][T27537] binder: 27536:27537 ioctl c0306201 20012000 returned -22 [ 679.361027][T27537] debugfs: File '27536' in directory 'proc' already present! [ 679.369086][T27522] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 679.369099][T27522] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 679.369107][T27522] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 00:29:51 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, 0xffffffffffffffff, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 679.369114][T27522] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 679.369121][T27522] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 679.369127][T27522] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 00:29:51 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0186209, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:51 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, 0xffffffffffffffff, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 679.637910][T27557] debugfs: File '27556' in directory 'proc' already present! [ 679.658364][T27557] binder: 27556:27557 unknown command -162021415 [ 679.670536][T27557] binder: 27556:27557 ioctl c0306201 20012000 returned -22 00:29:52 executing program 3 (fault-call:8 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 679.683014][T27557] binder: 27556:27557 ioctl c0186209 20000180 returned -22 [ 679.704483][T27557] debugfs: File '27556' in directory 'proc' already present! [ 679.774162][T27569] FAULT_INJECTION: forcing a failure. [ 679.774162][T27569] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 679.788337][T27569] CPU: 1 PID: 27569 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 679.796364][T27569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.806408][T27569] Call Trace: [ 679.809697][T27569] dump_stack+0x172/0x1f0 [ 679.814018][T27569] should_fail.cold+0xa/0x15 [ 679.818594][T27569] ? fault_create_debugfs_attr+0x180/0x180 [ 679.824393][T27569] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 679.829930][T27569] ? __kasan_check_read+0x11/0x20 [ 679.834949][T27569] should_fail_alloc_page+0x50/0x60 [ 679.840147][T27569] __alloc_pages_nodemask+0x1a1/0x900 [ 679.845534][T27569] ? __alloc_pages_slowpath+0x2520/0x2520 [ 679.851267][T27569] ? cache_grow_end+0x4d/0x190 [ 679.856448][T27569] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 679.862780][T27569] alloc_pages_current+0x107/0x210 [ 679.867870][T27569] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 679.873689][T27569] skb_page_frag_refill+0x267/0x470 [ 679.878881][T27569] sk_page_frag_refill+0x55/0x1f0 [ 679.883895][T27569] sk_msg_alloc+0x10e/0x8d0 [ 679.888392][T27569] tls_sw_sendmsg+0x62e/0x17b0 [ 679.893154][T27569] ? tx_work_handler+0x180/0x180 [ 679.898077][T27569] ? ksys_dup3+0x327/0x3e0 [ 679.902596][T27569] ? get_pid_task+0xc9/0x190 [ 679.907173][T27569] ? __kasan_check_read+0x11/0x20 [ 679.912198][T27569] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 679.918535][T27569] inet6_sendmsg+0x9e/0xe0 [ 679.922934][T27569] ? inet6_ioctl+0x1c0/0x1c0 [ 679.927596][T27569] sock_sendmsg+0xd7/0x130 [ 679.932009][T27569] __sys_sendto+0x262/0x380 [ 679.936491][T27569] ? __ia32_sys_getpeername+0xb0/0xb0 [ 679.941849][T27569] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 679.947378][T27569] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 679.953677][T27569] ? fput_many+0x12c/0x1a0 [ 679.958083][T27569] ? fput+0x1b/0x20 [ 679.961900][T27569] ? ksys_write+0x1cf/0x290 [ 679.966385][T27569] ? __ia32_sys_read+0xb0/0xb0 [ 679.971139][T27569] ? switch_fpu_return+0x1fa/0x4f0 [ 679.976237][T27569] __x64_sys_sendto+0xe1/0x1a0 [ 679.980993][T27569] do_syscall_64+0xfd/0x6a0 [ 679.985786][T27569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.991668][T27569] RIP: 0033:0x4598e9 [ 679.995553][T27569] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.015141][T27569] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 00:29:52 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000340)=[@in={0x2, 0x4e23, @local}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x1000, @local, 0xfffffffffffffffd}, @in6={0xa, 0x4e24, 0xffffffffffffffff, @mcast1, 0x4}, @in6={0xa, 0x4e22, 0x7ff, @rand_addr="11543ae46719fa2032b49706587842e1", 0x9}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @rand_addr=0x489}, 0x2}], 0xd0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:29:52 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:52 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620a, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 680.023533][T27569] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 680.031863][T27569] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 680.040557][T27569] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 680.048532][T27569] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 680.056489][T27569] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 00:29:52 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 680.129522][T27576] debugfs: File '27575' in directory 'proc' already present! 00:29:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 680.181607][T27576] binder: 27575:27576 unknown command -162021415 [ 680.187995][T27576] binder: 27575:27576 ioctl c0306201 20012000 returned -22 [ 680.230768][T27576] binder: 27575:27576 ioctl c018620a 20000180 returned -22 00:29:52 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:29:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:52 executing program 3 (fault-call:8 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 680.453876][ C0] net_ratelimit: 7 callbacks suppressed [ 680.453887][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 680.469480][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 680.516934][T27607] FAULT_INJECTION: forcing a failure. [ 680.516934][T27607] name failslab, interval 1, probability 0, space 0, times 0 [ 680.543483][T27607] CPU: 1 PID: 27607 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 680.551440][T27607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.561631][T27607] Call Trace: [ 680.565006][T27607] dump_stack+0x172/0x1f0 [ 680.569376][T27607] should_fail.cold+0xa/0x15 [ 680.574081][T27607] ? fault_create_debugfs_attr+0x180/0x180 [ 680.579872][T27607] ? page_to_nid.part.0+0x20/0x20 [ 680.584931][T27607] ? ___might_sleep+0x163/0x280 [ 680.589770][T27607] __should_failslab+0x121/0x190 [ 680.594717][T27607] should_failslab+0x9/0x14 [ 680.599218][T27607] __kmalloc+0x2e0/0x770 [ 680.603442][T27607] ? __sk_mem_schedule+0xac/0xe0 [ 680.608450][T27607] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 680.615629][T27607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.621867][T27607] ? tls_get_rec+0xfe/0x590 [ 680.626354][T27607] tls_get_rec+0xfe/0x590 [ 680.630666][T27607] tls_sw_sendmsg+0xda5/0x17b0 [ 680.635431][T27607] ? tx_work_handler+0x180/0x180 [ 680.640362][T27607] ? ksys_dup3+0x327/0x3e0 [ 680.644825][T27607] ? get_pid_task+0xc9/0x190 [ 680.649426][T27607] ? __kasan_check_read+0x11/0x20 [ 680.654450][T27607] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 680.660679][T27607] inet6_sendmsg+0x9e/0xe0 [ 680.665140][T27607] ? inet6_ioctl+0x1c0/0x1c0 [ 680.669935][T27607] sock_sendmsg+0xd7/0x130 [ 680.674372][T27607] __sys_sendto+0x262/0x380 [ 680.678881][T27607] ? __ia32_sys_getpeername+0xb0/0xb0 [ 680.684386][T27607] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 680.689933][T27607] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 680.696180][T27607] ? fput_many+0x12c/0x1a0 [ 680.700765][T27607] ? fput+0x1b/0x20 [ 680.704622][T27607] ? ksys_write+0x1cf/0x290 [ 680.709314][T27607] ? __ia32_sys_read+0xb0/0xb0 [ 680.714072][T27607] ? switch_fpu_return+0x1fa/0x4f0 [ 680.719528][T27607] __x64_sys_sendto+0xe1/0x1a0 [ 680.724287][T27607] do_syscall_64+0xfd/0x6a0 [ 680.728863][T27607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.734861][T27607] RIP: 0033:0x4598e9 [ 680.738741][T27607] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.758605][T27607] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 680.767126][T27607] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 680.775080][T27607] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 680.783160][T27607] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 680.791119][T27607] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 680.799082][T27607] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 00:29:53 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(0xffffffffffffffff, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:53 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620b, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:29:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:53 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x12e) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:53 executing program 3 (fault-call:8 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 681.061656][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 681.073948][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 681.089190][T27621] debugfs: File '27619' in directory 'proc' already present! [ 681.095620][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 681.099990][T27623] FAULT_INJECTION: forcing a failure. [ 681.099990][T27623] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 681.129566][T27621] binder: 27619:27621 unknown command -162021415 [ 681.150186][T27621] binder: 27619:27621 ioctl c0306201 20012000 returned -22 [ 681.161456][T27623] CPU: 1 PID: 27623 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 681.170253][T27623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.180400][T27623] Call Trace: [ 681.183795][T27623] dump_stack+0x172/0x1f0 [ 681.185128][T27621] debugfs: File '27619' in directory 'proc' already present! [ 681.188137][T27623] should_fail.cold+0xa/0x15 [ 681.188153][T27623] ? fault_create_debugfs_attr+0x180/0x180 [ 681.188172][T27623] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 681.211532][T27623] should_fail_alloc_page+0x50/0x60 [ 681.216738][T27623] __alloc_pages_nodemask+0x1a1/0x900 [ 681.222123][T27623] ? __alloc_pages_slowpath+0x2520/0x2520 [ 681.227964][T27623] ? fault_create_debugfs_attr+0x180/0x180 [ 681.233791][T27623] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 681.240039][T27623] alloc_pages_current+0x107/0x210 [ 681.245158][T27623] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 681.251183][T27623] skb_page_frag_refill+0x267/0x470 [ 681.256698][T27623] sk_page_frag_refill+0x55/0x1f0 [ 681.261845][T27623] sk_msg_alloc+0x10e/0x8d0 [ 681.266356][T27623] tls_sw_sendmsg+0x62e/0x17b0 [ 681.271134][T27623] ? tx_work_handler+0x180/0x180 [ 681.276087][T27623] ? ksys_dup3+0x327/0x3e0 [ 681.280514][T27623] ? get_pid_task+0xc9/0x190 [ 681.285120][T27623] ? __kasan_check_read+0x11/0x20 [ 681.290252][T27623] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 681.296507][T27623] inet6_sendmsg+0x9e/0xe0 [ 681.297319][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 681.300931][T27623] ? inet6_ioctl+0x1c0/0x1c0 [ 681.300947][T27623] sock_sendmsg+0xd7/0x130 [ 681.300961][T27623] __sys_sendto+0x262/0x380 [ 681.300979][T27623] ? __ia32_sys_getpeername+0xb0/0xb0 [ 681.316776][T27640] debugfs: File '27634' in directory 'proc' already present! [ 681.316806][T27623] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 681.341483][T27640] binder: 27634:27640 unknown command -162021415 [ 681.344505][T27623] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 681.344519][T27623] ? fput_many+0x12c/0x1a0 [ 681.344535][T27623] ? fput+0x1b/0x20 [ 681.365359][T27623] ? ksys_write+0x1cf/0x290 [ 681.365471][T27640] binder: 27634:27640 ioctl c0306201 20012000 returned -22 [ 681.369865][T27623] ? __ia32_sys_read+0xb0/0xb0 [ 681.369879][T27623] ? switch_fpu_return+0x1fa/0x4f0 [ 681.369901][T27623] __x64_sys_sendto+0xe1/0x1a0 [ 681.391715][T27623] do_syscall_64+0xfd/0x6a0 [ 681.396309][T27623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.402194][T27623] RIP: 0033:0x4598e9 00:29:53 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(0xffffffffffffffff, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:53 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0186210, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:53 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e02, 0xfffffffffffffffe, @rand_addr, 0x83f}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 00:29:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 00:29:53 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(0xffffffffffffffff, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 681.406101][T27623] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.409170][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 681.425707][T27623] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 681.425720][T27623] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 681.425728][T27623] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 681.425735][T27623] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 681.425742][T27623] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 681.425748][T27623] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 [ 681.459558][T27647] binder: 27634:27647 ioctl c0186210 20000180 returned -22 00:29:53 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) [ 681.503637][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 681.563810][T27635] debugfs: File '27634' in directory 'proc' already present! 00:29:54 executing program 3 (fault-call:8 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:54 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0186250, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 681.676214][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 681.695278][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x0, 0x0, 0x0) 00:29:54 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 681.798335][T27669] FAULT_INJECTION: forcing a failure. [ 681.798335][T27669] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:29:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 681.839043][T27674] debugfs: File '27671' in directory 'proc' already present! [ 681.858716][T27669] CPU: 0 PID: 27669 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 681.866643][T27669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.876701][T27669] Call Trace: [ 681.880086][T27669] dump_stack+0x172/0x1f0 [ 681.882347][T27674] binder: 27671:27674 unknown command -162021415 [ 681.884435][T27669] should_fail.cold+0xa/0x15 [ 681.884457][T27669] ? fault_create_debugfs_attr+0x180/0x180 [ 681.890941][T27674] binder: 27671:27674 ioctl c0306201 20012000 returned -22 [ 681.895467][T27669] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 681.895481][T27669] ? __kasan_check_read+0x11/0x20 [ 681.895497][T27669] should_fail_alloc_page+0x50/0x60 [ 681.895512][T27669] __alloc_pages_nodemask+0x1a1/0x900 [ 681.895525][T27669] ? __alloc_pages_slowpath+0x2520/0x2520 [ 681.895537][T27669] ? cache_grow_end+0x4d/0x190 [ 681.895554][T27669] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 681.895573][T27669] alloc_pages_current+0x107/0x210 [ 681.895584][T27669] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 681.895597][T27669] skb_page_frag_refill+0x267/0x470 [ 681.895610][T27669] sk_page_frag_refill+0x55/0x1f0 [ 681.895621][T27669] sk_msg_alloc+0x10e/0x8d0 [ 681.895642][T27669] tls_sw_sendmsg+0x62e/0x17b0 [ 681.930515][T27680] binder: 27671:27680 ioctl c0186250 20000180 returned -22 [ 681.935562][T27669] ? tx_work_handler+0x180/0x180 [ 681.935576][T27669] ? ksys_dup3+0x327/0x3e0 [ 681.935586][T27669] ? get_pid_task+0xc9/0x190 [ 681.935599][T27669] ? __kasan_check_read+0x11/0x20 [ 681.935617][T27669] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 681.935631][T27669] inet6_sendmsg+0x9e/0xe0 [ 681.935648][T27669] ? inet6_ioctl+0x1c0/0x1c0 [ 681.947166][T27674] debugfs: File '27671' in directory 'proc' already present! [ 681.951719][T27669] sock_sendmsg+0xd7/0x130 [ 681.951736][T27669] __sys_sendto+0x262/0x380 [ 681.951752][T27669] ? __ia32_sys_getpeername+0xb0/0xb0 [ 681.951765][T27669] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 681.951787][T27669] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 681.951799][T27669] ? fput_many+0x12c/0x1a0 [ 681.951816][T27669] ? fput+0x1b/0x20 [ 682.031124][T27669] ? ksys_write+0x1cf/0x290 [ 682.031138][T27669] ? __ia32_sys_read+0xb0/0xb0 [ 682.031152][T27669] ? switch_fpu_return+0x1fa/0x4f0 [ 682.031168][T27669] __x64_sys_sendto+0xe1/0x1a0 [ 682.031185][T27669] do_syscall_64+0xfd/0x6a0 [ 682.031208][T27669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.041040][T27669] RIP: 0033:0x4598e9 [ 682.041055][T27669] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 682.041062][T27669] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 682.041073][T27669] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 682.041084][T27669] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 682.041091][T27669] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 682.041098][T27669] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 682.041105][T27669] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 00:29:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:54 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0189436, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:54 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x0, 0x0, 0x0) 00:29:54 executing program 3 (fault-call:8 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:54 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x304}, "0b2911a324a5ae65", "7a27c182735a2506b8405a1b83bcacb88fffe34f5e6b3bd9bea1d43b5ec201e6", "ed5bf9a6", "f99e1ad465b758ca"}, 0x25) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$inet_opts(r4, 0x0, 0xf, &(0x7f00000001c0)=""/166, &(0x7f0000000100)=0xa6) [ 682.378229][T27697] FAULT_INJECTION: forcing a failure. [ 682.378229][T27697] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 682.391473][T27697] CPU: 1 PID: 27697 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 682.394455][T27702] debugfs: File '27694' in directory 'proc' already present! [ 682.399370][T27697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.408377][T27702] binder: 27694:27702 unknown command -162021415 [ 682.416774][T27697] Call Trace: 00:29:54 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480), 0x0, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 682.416796][T27697] dump_stack+0x172/0x1f0 [ 682.416815][T27697] should_fail.cold+0xa/0x15 [ 682.416828][T27697] ? fault_create_debugfs_attr+0x180/0x180 [ 682.416851][T27697] should_fail_alloc_page+0x50/0x60 [ 682.416863][T27697] __alloc_pages_nodemask+0x1a1/0x900 [ 682.416883][T27697] ? __alloc_pages_slowpath+0x2520/0x2520 [ 682.424071][T27702] binder: 27694:27702 ioctl c0306201 20012000 returned -22 [ 682.426477][T27697] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 682.426492][T27697] ? __kasan_check_read+0x11/0x20 [ 682.426510][T27697] ? fault_create_debugfs_attr+0x180/0x180 [ 682.426530][T27697] cache_grow_begin+0x90/0xd20 [ 682.460193][T27702] debugfs: File '27694' in directory 'proc' already present! [ 682.465251][T27697] ? tls_get_rec+0xfe/0x590 [ 682.465270][T27697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.465283][T27697] __kmalloc+0x6b2/0x770 [ 682.465296][T27697] ? __sk_mem_schedule+0xac/0xe0 [ 682.465309][T27697] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 682.465321][T27697] ? tls_get_rec+0xfe/0x590 00:29:54 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018aa3f, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 682.465342][T27697] tls_get_rec+0xfe/0x590 [ 682.476273][T27697] tls_sw_sendmsg+0xda5/0x17b0 [ 682.494180][T27697] ? tx_work_handler+0x180/0x180 [ 682.494193][T27697] ? ksys_dup3+0x327/0x3e0 [ 682.494203][T27697] ? get_pid_task+0xc9/0x190 [ 682.494222][T27697] ? __kasan_check_read+0x11/0x20 [ 682.553790][T27697] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 682.560038][T27697] inet6_sendmsg+0x9e/0xe0 [ 682.564468][T27697] ? inet6_ioctl+0x1c0/0x1c0 [ 682.564482][T27697] sock_sendmsg+0xd7/0x130 [ 682.564495][T27697] __sys_sendto+0x262/0x380 00:29:54 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480), 0x0, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 682.564513][T27697] ? __ia32_sys_getpeername+0xb0/0xb0 [ 682.583433][T27697] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 682.588997][T27697] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 682.595249][T27697] ? fput_many+0x12c/0x1a0 [ 682.599769][T27697] ? fput+0x1b/0x20 [ 682.603584][T27697] ? ksys_write+0x1cf/0x290 [ 682.608103][T27697] ? __ia32_sys_read+0xb0/0xb0 [ 682.612876][T27697] __x64_sys_sendto+0xe1/0x1a0 [ 682.617643][T27697] do_syscall_64+0xfd/0x6a0 [ 682.622136][T27697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.622146][T27697] RIP: 0033:0x4598e9 [ 682.622158][T27697] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 682.622169][T27697] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 682.645341][T27716] debugfs: File '27715' in directory 'proc' already present! [ 682.651507][T27697] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 00:29:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) [ 682.651515][T27697] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 682.651522][T27697] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 682.651529][T27697] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 682.651537][T27697] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 00:29:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 00:29:55 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480), 0x0, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:55 executing program 3 (fault-call:8 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 682.789640][T27716] binder: 27715:27716 unknown command -162021415 [ 682.815339][T27716] binder: 27715:27716 ioctl c0306201 20012000 returned -22 [ 682.869960][T27716] binder: 27715:27716 ioctl c018aa3f 20000180 returned -22 00:29:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) [ 682.985596][T27727] debugfs: File '27715' in directory 'proc' already present! [ 682.986483][T27739] FAULT_INJECTION: forcing a failure. [ 682.986483][T27739] name failslab, interval 1, probability 0, space 0, times 0 [ 683.036974][T27739] CPU: 1 PID: 27739 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 683.044906][T27739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.055656][T27739] Call Trace: [ 683.058953][T27739] dump_stack+0x172/0x1f0 [ 683.063471][T27739] should_fail.cold+0xa/0x15 [ 683.068068][T27739] ? fault_create_debugfs_attr+0x180/0x180 [ 683.073892][T27739] ? page_to_nid.part.0+0x20/0x20 [ 683.078927][T27739] ? ___might_sleep+0x163/0x280 [ 683.083813][T27739] __should_failslab+0x121/0x190 [ 683.088764][T27739] should_failslab+0x9/0x14 [ 683.093261][T27739] __kmalloc+0x2e0/0x770 [ 683.093274][T27739] ? __sk_mem_schedule+0xac/0xe0 [ 683.093288][T27739] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 683.093306][T27739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.114902][T27739] ? tls_get_rec+0xfe/0x590 [ 683.114917][T27739] tls_get_rec+0xfe/0x590 [ 683.114932][T27739] tls_sw_sendmsg+0xda5/0x17b0 [ 683.114958][T27739] ? tx_work_handler+0x180/0x180 [ 683.133422][T27739] ? ksys_dup3+0x327/0x3e0 [ 683.137931][T27739] ? get_pid_task+0xc9/0x190 [ 683.142538][T27739] ? __kasan_check_read+0x11/0x20 [ 683.147570][T27739] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 683.153823][T27739] inet6_sendmsg+0x9e/0xe0 [ 683.158248][T27739] ? inet6_ioctl+0x1c0/0x1c0 [ 683.162846][T27739] sock_sendmsg+0xd7/0x130 [ 683.167277][T27739] __sys_sendto+0x262/0x380 [ 683.171793][T27739] ? __ia32_sys_getpeername+0xb0/0xb0 [ 683.177421][T27739] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 683.182981][T27739] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 683.189234][T27739] ? fput_many+0x12c/0x1a0 [ 683.193650][T27739] ? fput+0x1b/0x20 [ 683.193663][T27739] ? ksys_write+0x1cf/0x290 [ 683.193679][T27739] ? __ia32_sys_read+0xb0/0xb0 [ 683.206711][T27739] ? switch_fpu_return+0x1fa/0x4f0 [ 683.211835][T27739] __x64_sys_sendto+0xe1/0x1a0 [ 683.216597][T27739] do_syscall_64+0xfd/0x6a0 [ 683.221279][T27739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.227266][T27739] RIP: 0033:0x4598e9 [ 683.231156][T27739] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.250993][T27739] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 683.259410][T27739] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 683.267487][T27739] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 683.275459][T27739] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b 00:29:55 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:55 executing program 1 (fault-call:7 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x0, 0x0, 0x0) [ 683.283424][T27739] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 683.291413][T27739] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 00:29:55 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:55 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:55 executing program 3 (fault-call:8 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 683.378171][T27763] debugfs: File '27762' in directory 'proc' already present! [ 683.399858][T27761] FAULT_INJECTION: forcing a failure. [ 683.399858][T27761] name failslab, interval 1, probability 0, space 0, times 0 [ 683.417662][T27763] binder: 27762:27763 unknown command -162021415 [ 683.461684][T27761] CPU: 1 PID: 27761 Comm: syz-executor.1 Not tainted 5.3.0-rc8+ #0 [ 683.469608][T27761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.480269][T27761] Call Trace: [ 683.483562][T27761] dump_stack+0x172/0x1f0 [ 683.487880][T27761] should_fail.cold+0xa/0x15 [ 683.492458][T27761] ? __bpf_address_lookup+0x310/0x310 [ 683.497907][T27761] ? fault_create_debugfs_attr+0x180/0x180 [ 683.503782][T27761] ? page_to_nid.part.0+0x20/0x20 [ 683.508786][T27761] ? ___might_sleep+0x163/0x280 [ 683.513628][T27761] __should_failslab+0x121/0x190 [ 683.518549][T27761] should_failslab+0x9/0x14 [ 683.523040][T27761] __kmalloc+0x2e0/0x770 [ 683.527265][T27761] ? lock_sock_nested+0x9a/0x120 [ 683.532182][T27761] ? trace_hardirqs_on+0x67/0x240 [ 683.537186][T27761] ? tls_get_rec+0xfe/0x590 [ 683.541678][T27761] tls_get_rec+0xfe/0x590 [ 683.545988][T27761] ? lock_sock_nested+0xe2/0x120 [ 683.550907][T27761] tls_sw_sendmsg+0xda5/0x17b0 [ 683.555656][T27761] ? tx_work_handler+0x180/0x180 [ 683.560659][T27761] ? ksys_dup3+0x327/0x3e0 [ 683.565060][T27761] ? get_pid_task+0xc9/0x190 [ 683.569633][T27761] ? __kasan_check_read+0x11/0x20 [ 683.574738][T27761] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 683.580967][T27761] inet6_sendmsg+0x9e/0xe0 [ 683.585364][T27761] ? inet6_ioctl+0x1c0/0x1c0 [ 683.589943][T27761] sock_sendmsg+0xd7/0x130 [ 683.594359][T27761] __sys_sendto+0x262/0x380 [ 683.598951][T27761] ? __ia32_sys_getpeername+0xb0/0xb0 [ 683.604308][T27761] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 683.609848][T27761] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 683.616075][T27761] ? fput_many+0x12c/0x1a0 [ 683.620478][T27761] ? fput+0x1b/0x20 [ 683.624270][T27761] ? ksys_write+0x1cf/0x290 [ 683.628763][T27761] ? __ia32_sys_read+0xb0/0xb0 [ 683.633513][T27761] __x64_sys_sendto+0xe1/0x1a0 [ 683.638271][T27761] do_syscall_64+0xfd/0x6a0 [ 683.642756][T27761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.648625][T27761] RIP: 0033:0x4598e9 [ 683.652502][T27761] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.672098][T27761] RSP: 002b:00007f337418bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 683.680577][T27761] RAX: ffffffffffffffda RBX: 00007f337418bc90 RCX: 00000000004598e9 [ 683.688544][T27761] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 683.696495][T27761] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 683.704497][T27761] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f337418c6d4 00:29:56 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 683.712459][T27761] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000005 [ 683.720759][T27763] binder: 27762:27763 ioctl c0306201 20012000 returned -22 [ 683.761895][T27763] debugfs: File '27762' in directory 'proc' already present! 00:29:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:56 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc020aa00, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 683.815955][T27771] FAULT_INJECTION: forcing a failure. [ 683.815955][T27771] name failslab, interval 1, probability 0, space 0, times 0 [ 683.829389][T27771] CPU: 0 PID: 27771 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 683.837305][T27771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.847362][T27771] Call Trace: [ 683.847386][T27771] dump_stack+0x172/0x1f0 [ 683.847406][T27771] should_fail.cold+0xa/0x15 [ 683.847428][T27771] ? fault_create_debugfs_attr+0x180/0x180 [ 683.865512][T27771] ? page_to_nid.part.0+0x20/0x20 [ 683.865527][T27771] ? ___might_sleep+0x163/0x280 [ 683.865547][T27771] __should_failslab+0x121/0x190 [ 683.875401][T27771] should_failslab+0x9/0x14 [ 683.875419][T27771] __kmalloc+0x2e0/0x770 [ 683.884839][T27771] ? __sk_mem_schedule+0xac/0xe0 [ 683.884860][T27771] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 683.900372][T27771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.906643][T27771] ? tls_get_rec+0xfe/0x590 [ 683.911257][T27771] tls_get_rec+0xfe/0x590 [ 683.915615][T27771] tls_sw_sendmsg+0xda5/0x17b0 [ 683.920501][T27771] ? tx_work_handler+0x180/0x180 [ 683.922571][T27787] debugfs: File '27786' in directory 'proc' already present! [ 683.925438][T27771] ? ksys_dup3+0x327/0x3e0 [ 683.925451][T27771] ? get_pid_task+0xc9/0x190 [ 683.925463][T27771] ? __kasan_check_read+0x11/0x20 [ 683.925484][T27771] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 683.934348][T27787] binder: 27786:27787 unknown command -162021415 [ 683.937243][T27771] inet6_sendmsg+0x9e/0xe0 00:29:56 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc020aa04, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 683.937256][T27771] ? inet6_ioctl+0x1c0/0x1c0 [ 683.937276][T27771] sock_sendmsg+0xd7/0x130 [ 683.941964][T27787] binder: 27786:27787 ioctl c0306201 20012000 returned -22 [ 683.946859][T27771] __sys_sendto+0x262/0x380 [ 683.946876][T27771] ? __ia32_sys_getpeername+0xb0/0xb0 [ 683.946895][T27771] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 683.955745][T27787] binder: 27786:27787 ioctl c020aa00 20000180 returned -22 [ 683.959432][T27771] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 683.959445][T27771] ? fput_many+0x12c/0x1a0 [ 683.959463][T27771] ? fput+0x1b/0x20 [ 683.967088][T27787] debugfs: File '27786' in directory 'proc' already present! [ 683.968434][T27771] ? ksys_write+0x1cf/0x290 [ 683.968449][T27771] ? __ia32_sys_read+0xb0/0xb0 [ 683.968468][T27771] ? switch_fpu_return+0x1fa/0x4f0 [ 684.024766][T27771] __x64_sys_sendto+0xe1/0x1a0 [ 684.024783][T27771] do_syscall_64+0xfd/0x6a0 [ 684.024816][T27771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.039148][T27771] RIP: 0033:0x4598e9 00:29:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 684.058279][T27771] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 684.077893][T27771] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 684.086411][T27771] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 684.089742][T27795] debugfs: File '27793' in directory 'proc' already present! [ 684.094411][T27771] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 00:29:56 executing program 1 (fault-call:7 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x0, 0x0, 0x0) [ 684.094419][T27771] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 684.094426][T27771] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 684.094433][T27771] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 00:29:56 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 684.178982][T27800] FAULT_INJECTION: forcing a failure. [ 684.178982][T27800] name failslab, interval 1, probability 0, space 0, times 0 [ 684.184666][T27795] binder: 27793:27795 ioctl c020aa04 20000180 returned -22 [ 684.215920][T27795] debugfs: File '27793' in directory 'proc' already present! [ 684.246663][T27800] CPU: 0 PID: 27800 Comm: syz-executor.1 Not tainted 5.3.0-rc8+ #0 [ 684.254597][T27800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.265008][T27800] Call Trace: [ 684.268410][T27800] dump_stack+0x172/0x1f0 [ 684.272762][T27800] should_fail.cold+0xa/0x15 [ 684.277457][T27800] ? fault_create_debugfs_attr+0x180/0x180 [ 684.283273][T27800] ? page_to_nid.part.0+0x20/0x20 [ 684.288317][T27800] ? ___might_sleep+0x163/0x280 [ 684.293227][T27800] __should_failslab+0x121/0x190 [ 684.298293][T27800] should_failslab+0x9/0x14 [ 684.302799][T27800] kmem_cache_alloc_node+0x268/0x740 [ 684.308087][T27800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.314333][T27800] ? tcp_established_options+0x29d/0x4d0 [ 684.320077][T27800] __alloc_skb+0xd5/0x5e0 [ 684.324490][T27800] ? netdev_alloc_frag+0x1b0/0x1b0 [ 684.324502][T27800] ? kmem_cache_alloc_node+0x92/0x740 [ 684.324517][T27800] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 684.324531][T27800] sk_stream_alloc_skb+0x2d2/0xc60 00:29:56 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000140)={{0x6, 0x372}, 'port0\x00', 0x1, 0x4, 0x4, 0x1, 0x10001, 0x8, 0x9576, 0x0, 0x9, 0x3}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x42, 0x0, 0x30a) [ 684.324548][T27800] do_tcp_sendpages+0xb19/0x1cf0 [ 684.335005][T27800] ? lock_downgrade+0x920/0x920 [ 684.335025][T27800] ? sk_stream_alloc_skb+0xc60/0xc60 [ 684.335038][T27800] ? del_timer+0xd2/0x120 [ 684.335055][T27800] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 684.335070][T27800] tls_push_sg+0x1de/0x670 [ 684.335088][T27800] tls_tx_records+0x3b7/0x740 [ 684.335102][T27800] tls_sw_sendmsg+0x7d2/0x17b0 [ 684.335123][T27800] ? tx_work_handler+0x180/0x180 [ 684.390134][T27800] ? ksys_dup3+0x327/0x3e0 00:29:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:29:56 executing program 3 (fault-call:8 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 684.394556][T27800] ? get_pid_task+0xc9/0x190 [ 684.399160][T27800] ? __kasan_check_read+0x11/0x20 [ 684.404200][T27800] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 684.410520][T27800] inet6_sendmsg+0x9e/0xe0 [ 684.415036][T27800] ? inet6_ioctl+0x1c0/0x1c0 [ 684.419636][T27800] sock_sendmsg+0xd7/0x130 [ 684.424067][T27800] __sys_sendto+0x262/0x380 [ 684.428608][T27800] ? __ia32_sys_getpeername+0xb0/0xb0 [ 684.434046][T27800] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 684.439613][T27800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 00:29:56 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 684.445955][T27800] ? fput_many+0x12c/0x1a0 [ 684.450381][T27800] ? fput+0x1b/0x20 [ 684.454196][T27800] ? ksys_write+0x1cf/0x290 [ 684.458706][T27800] ? __ia32_sys_read+0xb0/0xb0 [ 684.463478][T27800] ? switch_fpu_return+0x1fa/0x4f0 [ 684.468614][T27800] __x64_sys_sendto+0xe1/0x1a0 [ 684.473389][T27800] do_syscall_64+0xfd/0x6a0 [ 684.477909][T27800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.483802][T27800] RIP: 0033:0x4598e9 00:29:56 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0306201, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 684.487693][T27800] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 684.507286][T27800] RSP: 002b:00007f337418bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 684.507298][T27800] RAX: ffffffffffffffda RBX: 00007f337418bc90 RCX: 00000000004598e9 [ 684.507304][T27800] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 684.507311][T27800] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 684.507318][T27800] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f337418c6d4 00:29:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 684.507324][T27800] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000005 [ 684.534354][T27818] FAULT_INJECTION: forcing a failure. [ 684.534354][T27818] name failslab, interval 1, probability 0, space 0, times 0 [ 684.574135][T27818] CPU: 0 PID: 27818 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 684.582065][T27818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.592121][T27818] Call Trace: 00:29:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) [ 684.595422][T27818] dump_stack+0x172/0x1f0 [ 684.599775][T27818] should_fail.cold+0xa/0x15 [ 684.604380][T27818] ? fault_create_debugfs_attr+0x180/0x180 [ 684.610197][T27818] ? page_to_nid.part.0+0x20/0x20 [ 684.615228][T27818] ? ___might_sleep+0x163/0x280 [ 684.620115][T27818] __should_failslab+0x121/0x190 [ 684.625060][T27818] should_failslab+0x9/0x14 [ 684.629572][T27818] __kmalloc+0x2e0/0x770 [ 684.633850][T27818] ? __sk_mem_schedule+0xac/0xe0 [ 684.638809][T27818] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 684.638824][T27818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.638845][T27818] ? tls_get_rec+0xfe/0x590 [ 684.646753][T27826] debugfs: File '27821' in directory 'proc' already present! [ 684.651385][T27818] tls_get_rec+0xfe/0x590 [ 684.651402][T27818] tls_sw_sendmsg+0xda5/0x17b0 [ 684.651422][T27818] ? tx_work_handler+0x180/0x180 [ 684.651435][T27818] ? ksys_dup3+0x327/0x3e0 [ 684.651446][T27818] ? get_pid_task+0xc9/0x190 [ 684.651458][T27818] ? __kasan_check_read+0x11/0x20 [ 684.651476][T27818] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 00:29:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) [ 684.651499][T27818] inet6_sendmsg+0x9e/0xe0 [ 684.667996][T27818] ? inet6_ioctl+0x1c0/0x1c0 [ 684.680101][T27826] binder: 27821:27826 unknown command -162021415 [ 684.682025][T27818] sock_sendmsg+0xd7/0x130 [ 684.682040][T27818] __sys_sendto+0x262/0x380 [ 684.682055][T27818] ? __ia32_sys_getpeername+0xb0/0xb0 [ 684.682070][T27818] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 684.682090][T27818] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 684.682110][T27818] ? fput_many+0x12c/0x1a0 [ 684.698034][T27818] ? fput+0x1b/0x20 [ 684.698048][T27818] ? ksys_write+0x1cf/0x290 [ 684.698060][T27818] ? __ia32_sys_read+0xb0/0xb0 [ 684.698084][T27818] __x64_sys_sendto+0xe1/0x1a0 [ 684.713655][T27818] do_syscall_64+0xfd/0x6a0 [ 684.713674][T27818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.713683][T27818] RIP: 0033:0x4598e9 [ 684.713698][T27818] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:29:57 executing program 1 (fault-call:7 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x0, 0x0, 0x0) [ 684.713703][T27818] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 684.713715][T27818] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 684.713721][T27818] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 684.713728][T27818] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 684.713741][T27818] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 684.736287][T27826] binder: 27821:27826 ioctl c0306201 20012000 returned -22 00:29:57 executing program 3 (fault-call:8 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:57 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 684.739987][T27818] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 00:29:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x0, 0x0, 0x0) [ 684.880960][T27838] FAULT_INJECTION: forcing a failure. [ 684.880960][T27838] name failslab, interval 1, probability 0, space 0, times 0 [ 684.906438][T27838] CPU: 1 PID: 27838 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 684.914374][T27838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.924616][T27838] Call Trace: [ 684.927912][T27838] dump_stack+0x172/0x1f0 [ 684.932251][T27838] should_fail.cold+0xa/0x15 [ 684.932273][T27838] ? fault_create_debugfs_attr+0x180/0x180 [ 684.942659][T27838] ? page_to_nid.part.0+0x20/0x20 [ 684.942675][T27838] ? ___might_sleep+0x163/0x280 [ 684.942693][T27838] __should_failslab+0x121/0x190 [ 684.942712][T27838] should_failslab+0x9/0x14 [ 684.962084][T27838] __kmalloc+0x2e0/0x770 [ 684.962110][T27838] ? __sk_mem_schedule+0xac/0xe0 [ 684.962138][T27838] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 684.971305][T27838] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 684.971320][T27838] ? tls_get_rec+0xfe/0x590 [ 684.971336][T27838] tls_get_rec+0xfe/0x590 [ 684.971350][T27838] tls_sw_sendmsg+0xda5/0x17b0 [ 684.971378][T27838] ? tx_work_handler+0x180/0x180 [ 684.988343][T27838] ? ksys_dup3+0x327/0x3e0 [ 684.988361][T27838] ? get_pid_task+0xc9/0x190 [ 684.988374][T27838] ? __kasan_check_read+0x11/0x20 [ 684.988394][T27838] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 685.002479][T27838] inet6_sendmsg+0x9e/0xe0 [ 685.002492][T27838] ? inet6_ioctl+0x1c0/0x1c0 [ 685.002507][T27838] sock_sendmsg+0xd7/0x130 [ 685.002524][T27838] __sys_sendto+0x262/0x380 [ 685.011504][T27838] ? __ia32_sys_getpeername+0xb0/0xb0 [ 685.011519][T27838] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 685.011544][T27838] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 685.022866][T27838] ? fput_many+0x12c/0x1a0 [ 685.022880][T27838] ? fput+0x1b/0x20 [ 685.022893][T27838] ? ksys_write+0x1cf/0x290 [ 685.022905][T27838] ? __ia32_sys_read+0xb0/0xb0 [ 685.022918][T27838] ? switch_fpu_return+0x1fa/0x4f0 [ 685.022939][T27838] __x64_sys_sendto+0xe1/0x1a0 [ 685.036250][T27823] debugfs: File '27821' in directory 'proc' already present! [ 685.036799][T27838] do_syscall_64+0xfd/0x6a0 [ 685.093172][T27838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.093183][T27838] RIP: 0033:0x4598e9 [ 685.093201][T27838] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 685.103551][T27838] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 685.103570][T27838] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 685.135526][T27838] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 685.135534][T27838] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 685.135542][T27838] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 685.135547][T27838] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 00:29:57 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0385650, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 00:29:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x2, 0x0, 0x0, 0x0) 00:29:57 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:57 executing program 3 (fault-call:8 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:57 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0xffd1) socket$pppoe(0x18, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @dev={0xfe, 0x80, [], 0x1ff}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "8c28d58178be2133", "868496a1c89825d28d157adfcb7d3ce2", "f1fb6b33", "0985aa588de1b3a5"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 685.337243][T27868] debugfs: File '27859' in directory 'proc' already present! [ 685.355296][T27865] FAULT_INJECTION: forcing a failure. [ 685.355296][T27865] name failslab, interval 1, probability 0, space 0, times 0 [ 685.367793][T27868] binder: 27859:27868 unknown command -162021415 [ 685.370188][T27865] CPU: 1 PID: 27865 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 00:29:57 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0405519, &(0x7f0000000180)={0x0, 0x100000000000000}) [ 685.380879][T27868] binder: 27859:27868 ioctl c0306201 20012000 returned -22 [ 685.382214][T27865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.382218][T27865] Call Trace: [ 685.382237][T27865] dump_stack+0x172/0x1f0 [ 685.382257][T27865] should_fail.cold+0xa/0x15 [ 685.382272][T27865] ? fault_create_debugfs_attr+0x180/0x180 [ 685.382295][T27865] ? page_to_nid.part.0+0x20/0x20 [ 685.391803][T27868] binder: 27859:27868 ioctl c0385650 20000180 returned -22 [ 685.399898][T27865] ? ___might_sleep+0x163/0x280 [ 685.399917][T27865] __should_failslab+0x121/0x190 [ 685.399937][T27865] should_failslab+0x9/0x14 [ 685.406981][T27868] debugfs: File '27859' in directory 'proc' already present! [ 685.407540][T27865] __kmalloc+0x2e0/0x770 [ 685.440292][T27865] ? __sk_mem_schedule+0xac/0xe0 [ 685.452363][T27865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 685.452378][T27865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.452391][T27865] ? tls_get_rec+0xfe/0x590 [ 685.452409][T27865] tls_get_rec+0xfe/0x590 [ 685.480735][T27878] debugfs: File '27876' in directory 'proc' already present! [ 685.483764][T27865] tls_sw_sendmsg+0xda5/0x17b0 [ 685.483792][T27865] ? tx_work_handler+0x180/0x180 [ 685.483804][T27865] ? ksys_dup3+0x327/0x3e0 [ 685.483822][T27865] ? get_pid_task+0xc9/0x190 [ 685.505027][T27878] binder: 27876:27878 unknown command -162021415 [ 685.505443][T27865] ? __kasan_check_read+0x11/0x20 [ 685.510129][T27878] binder: 27876:27878 ioctl c0306201 20012000 returned -22 [ 685.516329][T27865] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 00:29:57 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0a85320, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) [ 685.516346][T27865] inet6_sendmsg+0x9e/0xe0 [ 685.516362][T27865] ? inet6_ioctl+0x1c0/0x1c0 [ 685.516375][T27865] sock_sendmsg+0xd7/0x130 [ 685.516393][T27865] __sys_sendto+0x262/0x380 [ 685.524365][T27878] binder: 27876:27878 ioctl c0405519 20000180 returned -22 [ 685.528611][T27865] ? __ia32_sys_getpeername+0xb0/0xb0 [ 685.528626][T27865] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 685.528648][T27865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 685.538829][T27878] debugfs: File '27876' in directory 'proc' already present! [ 685.539467][T27865] ? fput_many+0x12c/0x1a0 [ 685.539480][T27865] ? fput+0x1b/0x20 [ 685.539497][T27865] ? ksys_write+0x1cf/0x290 [ 685.584936][T27865] ? __ia32_sys_read+0xb0/0xb0 [ 685.584962][T27865] __x64_sys_sendto+0xe1/0x1a0 [ 685.602513][T27865] do_syscall_64+0xfd/0x6a0 [ 685.611754][T27865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.617664][T27865] RIP: 0033:0x4598e9 [ 685.622009][T27865] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 685.641695][T27865] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 685.641707][T27865] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 685.641715][T27865] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 685.641723][T27865] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 685.641730][T27865] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 00:29:58 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x3, 0x0, 0x0, 0x0) [ 685.641743][T27865] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 [ 685.651939][T27883] debugfs: File '27881' in directory 'proc' already present! 00:29:58 executing program 3 (fault-call:8 fault-nth:13): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:58 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000001340)=0xffffffffffffffff, 0x4) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @rand_addr="dae410a0425f44e41313ada1abcacbd1"}, 0x1c) lsetxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f00000012c0)='trusted.overlay.origin\x00', &(0x7f0000001300)='y\x00', 0x2, 0x3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x40, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x800, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r6, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) close(0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r8 = accept4(r5, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r8, r9, 0x0, 0x50000000000443) recvmmsg(r8, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x100000000, @mcast2, 0x3fc}}, 0x69b, 0xba58}, 0x40e) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000001280)=@ccm_128={{0x185}, "02cfffff97d02300", "93258b81240411a0f37a41dd84f39746", "d1931812", "6e45701a9f5ad2cf"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 685.744203][ C0] net_ratelimit: 31 callbacks suppressed [ 685.744212][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 685.757209][T27883] binder: 27881:27883 unknown command -162021415 00:29:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) [ 685.793693][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 685.815945][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 685.857945][T27901] binder: 27881:27901 ioctl c0a85320 20000180 returned -22 [ 685.893679][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:58 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) [ 685.903861][T27883] binder: 27881:27883 ioctl c0306201 20012000 returned -22 [ 685.925525][ T26] audit: type=1400 audit(1568593798.276:75): avc: denied { write } for pid=27895 comm="syz-executor.0" name="net" dev="proc" ino=92256 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 00:29:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x4, 0x0, 0x0, 0x0) [ 685.953870][T27898] FAULT_INJECTION: forcing a failure. [ 685.953870][T27898] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 685.980739][T27883] debugfs: File '27881' in directory 'proc' already present! [ 685.992116][T27898] CPU: 0 PID: 27898 Comm: syz-executor.3 Not tainted 5.3.0-rc8+ #0 [ 685.999840][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 686.000297][T27898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.000303][T27898] Call Trace: [ 686.000331][T27898] dump_stack+0x172/0x1f0 [ 686.029635][T27898] should_fail.cold+0xa/0x15 [ 686.034302][T27898] ? fault_create_debugfs_attr+0x180/0x180 [ 686.040107][T27898] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 686.045679][T27898] should_fail_alloc_page+0x50/0x60 [ 686.050947][T27898] __alloc_pages_nodemask+0x1a1/0x900 [ 686.056391][T27898] ? __alloc_pages_slowpath+0x2520/0x2520 [ 686.062112][T27898] ? fault_create_debugfs_attr+0x180/0x180 [ 686.067903][T27898] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 686.074131][T27898] alloc_pages_current+0x107/0x210 [ 686.079233][T27898] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 686.085065][T27898] skb_page_frag_refill+0x267/0x470 [ 686.090247][T27898] sk_page_frag_refill+0x55/0x1f0 [ 686.095260][T27898] sk_msg_alloc+0x10e/0x8d0 [ 686.099753][T27898] tls_sw_sendmsg+0x62e/0x17b0 [ 686.104632][T27898] ? tx_work_handler+0x180/0x180 [ 686.109552][T27898] ? ksys_dup3+0x327/0x3e0 [ 686.113959][T27898] ? get_pid_task+0xc9/0x190 [ 686.118539][T27898] ? __kasan_check_read+0x11/0x20 [ 686.123561][T27898] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 686.129789][T27898] inet6_sendmsg+0x9e/0xe0 [ 686.134194][T27898] ? inet6_ioctl+0x1c0/0x1c0 [ 686.138789][T27898] sock_sendmsg+0xd7/0x130 [ 686.143193][T27898] __sys_sendto+0x262/0x380 [ 686.147701][T27898] ? __ia32_sys_getpeername+0xb0/0xb0 [ 686.153765][T27898] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 686.159315][T27898] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 686.165539][T27898] ? fput_many+0x12c/0x1a0 [ 686.169937][T27898] ? fput+0x1b/0x20 [ 686.173816][T27898] ? ksys_write+0x1cf/0x290 [ 686.178316][T27898] ? __ia32_sys_read+0xb0/0xb0 [ 686.183073][T27898] __x64_sys_sendto+0xe1/0x1a0 [ 686.187911][T27898] do_syscall_64+0xfd/0x6a0 [ 686.192415][T27898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.198288][T27898] RIP: 0033:0x4598e9 [ 686.202170][T27898] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 686.221758][T27898] RSP: 002b:00007f0463302c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 686.230148][T27898] RAX: ffffffffffffffda RBX: 00007f0463302c90 RCX: 00000000004598e9 [ 686.238106][T27898] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 [ 686.246058][T27898] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 686.254145][T27898] R10: 0000000000000040 R11: 0000000000000246 R12: 00007f04633036d4 [ 686.262199][T27898] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000006 [ 686.285121][ T26] audit: type=1400 audit(1568593798.286:76): avc: denied { add_name } for pid=27895 comm="syz-executor.0" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 686.321601][ T26] audit: type=1400 audit(1568593798.286:77): avc: denied { create } for pid=27895 comm="syz-executor.0" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 [ 686.323870][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:58 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0cc5615, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:58 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x1000000000014) 00:29:58 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r3, r4, 0x0, 0x50000000000443) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, 0xffffffffffffffff) listen(r1, 0x0) r5 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x80000) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000200)={0x0, @local, @rand_addr=0xfffffffffffffff8}, 0xc) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 686.384502][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) 00:29:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x7, 0x0, 0x0, 0x0) [ 686.454413][T27920] debugfs: File '27919' in directory 'proc' already present! [ 686.487218][T27920] binder: 27919:27920 unknown command -162021415 00:29:58 executing program 4: gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(0x0, 0x1000000000014) [ 686.544687][T27920] binder: 27919:27920 ioctl c0306201 20012000 returned -22 [ 686.566462][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 686.569469][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x40, 0x0, 0x0) [ 686.605278][T27935] binder: 27919:27935 ioctl c0cc5615 20000180 returned -22 [ 686.614699][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:29:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:59 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc0e85667, &(0x7f0000000180)={0x0, 0x100000000000000}) 00:29:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0xa, 0x0, 0x0, 0x0) 00:29:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) [ 686.775842][T27950] debugfs: File '27947' in directory 'proc' already present! [ 686.814937][T27950] binder: 27947:27950 unknown command -162021415 00:29:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0xc, 0x0, 0x0, 0x0) 00:29:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) [ 686.848583][T27950] binder: 27947:27950 ioctl c0306201 20012000 returned -22 [ 686.896950][T27950] binder: 27947:27950 ioctl c0e85667 20000180 returned -22 00:29:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) 00:29:59 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x2, 0x100000000000000}) 00:29:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x10, 0x0, 0x0, 0x0) 00:29:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a130", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:29:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x0, 0x0, 0x0) 00:29:59 executing program 4: gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(0x0, 0x1000000000014) 00:29:59 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x40101, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, 0x0, 0xa01, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x99}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xad4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x800}, 0x1080) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:30:00 executing program 5 (fault-call:7 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x0, 0x0, 0x0) [ 687.598869][T27982] debugfs: File '27981' in directory 'proc' already present! 00:30:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x11, 0x0, 0x0, 0x0) [ 687.679735][T27982] binder: 27981:27982 ioctl c018620c 20000180 returned -22 00:30:00 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x3, 0x100000000000000}) [ 687.756583][T27999] FAULT_INJECTION: forcing a failure. [ 687.756583][T27999] name failslab, interval 1, probability 0, space 0, times 0 [ 687.788749][T27999] CPU: 1 PID: 27999 Comm: syz-executor.5 Not tainted 5.3.0-rc8+ #0 [ 687.796689][T27999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.806747][T27999] Call Trace: [ 687.810048][T27999] dump_stack+0x172/0x1f0 [ 687.814397][T27999] should_fail.cold+0xa/0x15 [ 687.819094][T27999] ? __bpf_address_lookup+0x310/0x310 [ 687.824600][T27999] ? fault_create_debugfs_attr+0x180/0x180 [ 687.830938][T27999] ? page_to_nid.part.0+0x20/0x20 [ 687.835965][T27999] ? ___might_sleep+0x163/0x280 [ 687.840818][T27999] __should_failslab+0x121/0x190 [ 687.840832][T27999] should_failslab+0x9/0x14 [ 687.840847][T27999] __kmalloc+0x2e0/0x770 [ 687.855120][T27999] ? lock_sock_nested+0x9a/0x120 [ 687.860073][T27999] ? trace_hardirqs_on+0x67/0x240 [ 687.865107][T27999] ? tls_get_rec+0xfe/0x590 [ 687.869627][T27999] tls_get_rec+0xfe/0x590 [ 687.873969][T27999] ? lock_sock_nested+0xe2/0x120 [ 687.878924][T27999] tls_sw_sendmsg+0xda5/0x17b0 [ 687.883709][T27999] ? tx_work_handler+0x180/0x180 [ 687.888651][T27999] ? ksys_dup3+0x327/0x3e0 [ 687.890772][T28007] debugfs: File '28006' in directory 'proc' already present! [ 687.893068][T27999] ? get_pid_task+0xc9/0x190 [ 687.893083][T27999] ? __kasan_check_read+0x11/0x20 [ 687.893099][T27999] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 687.893117][T27999] inet6_sendmsg+0x9e/0xe0 [ 687.893130][T27999] ? inet6_ioctl+0x1c0/0x1c0 [ 687.893144][T27999] sock_sendmsg+0xd7/0x130 [ 687.893157][T27999] __sys_sendto+0x262/0x380 [ 687.893175][T27999] ? __ia32_sys_getpeername+0xb0/0xb0 [ 687.916793][T28007] binder: 28006:28007 unknown command -162021415 [ 687.920792][T27999] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 687.920814][T27999] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 00:30:00 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x4, 0x100000000000000}) [ 687.920832][T27999] ? fput_many+0x12c/0x1a0 [ 687.927909][T28007] binder: 28006:28007 ioctl c0306201 20012000 returned -22 [ 687.929819][T27999] ? fput+0x1b/0x20 [ 687.929833][T27999] ? ksys_write+0x1cf/0x290 [ 687.929853][T27999] ? __ia32_sys_read+0xb0/0xb0 [ 687.936899][T28007] binder: 28006:28007 ioctl c018620c 20000180 returned -22 [ 687.939691][T27999] ? switch_fpu_return+0x1fa/0x4f0 [ 687.939712][T27999] __x64_sys_sendto+0xe1/0x1a0 [ 687.939731][T27999] do_syscall_64+0xfd/0x6a0 [ 687.951884][T28007] debugfs: File '28006' in directory 'proc' already present! [ 687.957829][T27999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.957839][T27999] RIP: 0033:0x4598e9 [ 687.957853][T27999] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 687.957859][T27999] RSP: 002b:00007feca7bbbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 688.033330][T28014] debugfs: File '28013' in directory 'proc' already present! 00:30:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x300, 0x0, 0x0, 0x0) 00:30:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1e7", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 688.040751][T27999] RAX: ffffffffffffffda RBX: 00007feca7bbbc90 RCX: 00000000004598e9 [ 688.040758][T27999] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 688.040765][T27999] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 688.040773][T27999] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feca7bbc6d4 [ 688.040780][T27999] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000005 [ 688.088925][T28015] binder: 28013:28015 ioctl c018620c 20000180 returned -22 [ 688.113736][T28014] debugfs: File '28013' in directory 'proc' already present! 00:30:00 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x5, 0x100000000000000}) 00:30:00 executing program 5 (fault-call:7 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x0, 0x0, 0x0) 00:30:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x51f, 0x0, 0x0, 0x0) [ 688.285147][T28028] debugfs: File '28027' in directory 'proc' already present! [ 688.311723][T28028] binder: 28027:28028 unknown command -162021415 [ 688.318356][T28032] FAULT_INJECTION: forcing a failure. [ 688.318356][T28032] name failslab, interval 1, probability 0, space 0, times 0 [ 688.332842][T28028] binder: 28027:28028 ioctl c0306201 20012000 returned -22 [ 688.340935][T28032] CPU: 1 PID: 28032 Comm: syz-executor.5 Not tainted 5.3.0-rc8+ #0 [ 688.348846][T28032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.358908][T28032] Call Trace: [ 688.362305][T28032] dump_stack+0x172/0x1f0 [ 688.366671][T28032] should_fail.cold+0xa/0x15 [ 688.371288][T28032] ? fault_create_debugfs_attr+0x180/0x180 [ 688.377113][T28032] ? page_to_nid.part.0+0x20/0x20 00:30:00 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x6, 0x100000000000000}) [ 688.380594][T28028] binder: 28027:28028 ioctl c018620c 20000180 returned -22 [ 688.382198][T28032] ? ___might_sleep+0x163/0x280 [ 688.382216][T28032] __should_failslab+0x121/0x190 [ 688.382232][T28032] should_failslab+0x9/0x14 [ 688.382243][T28032] kmem_cache_alloc_node+0x268/0x740 [ 688.382264][T28032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.395829][T28028] debugfs: File '28027' in directory 'proc' already present! [ 688.399294][T28032] ? tcp_established_options+0x29d/0x4d0 [ 688.399316][T28032] __alloc_skb+0xd5/0x5e0 [ 688.428271][T28032] ? netdev_alloc_frag+0x1b0/0x1b0 [ 688.437675][T28032] ? kmem_cache_alloc_node+0x92/0x740 [ 688.437692][T28032] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 688.437710][T28032] sk_stream_alloc_skb+0x2d2/0xc60 [ 688.453961][T28032] do_tcp_sendpages+0xb19/0x1cf0 [ 688.458287][T28038] debugfs: File '28037' in directory 'proc' already present! [ 688.458906][T28032] ? lock_downgrade+0x920/0x920 [ 688.458935][T28032] ? sk_stream_alloc_skb+0xc60/0xc60 [ 688.470514][T28038] binder: 28037:28038 unknown command -162021415 [ 688.471124][T28032] ? del_timer+0xd2/0x120 [ 688.471143][T28032] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 688.471160][T28032] tls_push_sg+0x1de/0x670 [ 688.471178][T28032] tls_tx_records+0x3b7/0x740 [ 688.471193][T28032] tls_sw_sendmsg+0x7d2/0x17b0 [ 688.471214][T28032] ? tx_work_handler+0x180/0x180 [ 688.479157][T28038] binder: 28037:28038 ioctl c0306201 20012000 returned -22 [ 688.482821][T28032] ? ksys_dup3+0x327/0x3e0 [ 688.482833][T28032] ? get_pid_task+0xc9/0x190 [ 688.482845][T28032] ? __kasan_check_read+0x11/0x20 [ 688.482862][T28032] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 688.482877][T28032] inet6_sendmsg+0x9e/0xe0 [ 688.482896][T28032] ? inet6_ioctl+0x1c0/0x1c0 [ 688.489732][T28038] binder: 28037:28038 ioctl c018620c 20000180 returned -22 [ 688.493005][T28032] sock_sendmsg+0xd7/0x130 [ 688.493019][T28032] __sys_sendto+0x262/0x380 [ 688.493034][T28032] ? __ia32_sys_getpeername+0xb0/0xb0 [ 688.493049][T28032] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 688.493070][T28032] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 688.493083][T28032] ? fput_many+0x12c/0x1a0 [ 688.493101][T28032] ? fput+0x1b/0x20 [ 688.503293][T28038] debugfs: File '28037' in directory 'proc' already present! [ 688.506962][T28032] ? ksys_write+0x1cf/0x290 [ 688.506975][T28032] ? __ia32_sys_read+0xb0/0xb0 [ 688.506996][T28032] ? switch_fpu_return+0x1fa/0x4f0 [ 688.614217][T28032] __x64_sys_sendto+0xe1/0x1a0 [ 688.618974][T28032] do_syscall_64+0xfd/0x6a0 [ 688.623469][T28032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.629466][T28032] RIP: 0033:0x4598e9 [ 688.633373][T28032] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 688.653328][T28032] RSP: 002b:00007feca7bbbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 688.661744][T28032] RAX: ffffffffffffffda RBX: 00007feca7bbbc90 RCX: 00000000004598e9 [ 688.669715][T28032] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 688.677686][T28032] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 688.686105][T28032] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feca7bbc6d4 [ 688.694134][T28032] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000005 00:30:01 executing program 4: gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(0x0, 0x1000000000014) 00:30:01 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x7, 0x100000000000000}) 00:30:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x4000, 0x0, 0x0, 0x0) 00:30:01 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:30:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a100", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 688.806722][T28050] debugfs: File '28048' in directory 'proc' already present! [ 688.835714][T28050] binder: 28048:28050 unknown command -162021415 00:30:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x100000, 0x0, 0x0, 0x0) 00:30:01 executing program 5 (fault-call:7 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x0, 0x0, 0x0) [ 688.850289][T28050] binder: 28048:28050 ioctl c0306201 20012000 returned -22 [ 688.870364][T28050] binder: 28048:28050 ioctl c018620c 20000180 returned -22 00:30:01 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x8, 0x100000000000000}) [ 688.976842][T28071] FAULT_INJECTION: forcing a failure. [ 688.976842][T28071] name failslab, interval 1, probability 0, space 0, times 0 [ 689.007382][T28071] CPU: 1 PID: 28071 Comm: syz-executor.5 Not tainted 5.3.0-rc8+ #0 [ 689.015333][T28071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.025514][T28071] Call Trace: [ 689.028830][T28071] dump_stack+0x172/0x1f0 [ 689.033183][T28071] should_fail.cold+0xa/0x15 [ 689.037795][T28071] ? fault_create_debugfs_attr+0x180/0x180 [ 689.040424][T28076] debugfs: File '28074' in directory 'proc' already present! [ 689.043613][T28071] ? page_to_nid.part.0+0x20/0x20 [ 689.043630][T28071] ? ___might_sleep+0x163/0x280 [ 689.043649][T28071] __should_failslab+0x121/0x190 [ 689.043663][T28071] should_failslab+0x9/0x14 [ 689.043674][T28071] kmem_cache_alloc_node_trace+0x274/0x750 [ 689.043693][T28071] ? kasan_unpoison_shadow+0x35/0x50 [ 689.057131][T28076] binder: 28074:28076 unknown command -162021415 [ 689.061090][T28071] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 689.061106][T28071] __kmalloc_node_track_caller+0x3d/0x70 [ 689.061122][T28071] __kmalloc_reserve.isra.0+0x40/0xf0 [ 689.061135][T28071] __alloc_skb+0x10b/0x5e0 [ 689.061152][T28071] ? netdev_alloc_frag+0x1b0/0x1b0 [ 689.066952][T28076] binder: 28074:28076 ioctl c0306201 20012000 returned -22 [ 689.070783][T28071] ? kmem_cache_alloc_node+0x92/0x740 00:30:01 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x48, 0x100000000000000}) [ 689.070802][T28071] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 689.070823][T28071] sk_stream_alloc_skb+0x2d2/0xc60 [ 689.082164][T28076] binder: 28074:28076 ioctl c018620c 20000180 returned -22 [ 689.088437][T28071] do_tcp_sendpages+0xb19/0x1cf0 [ 689.088454][T28071] ? lock_downgrade+0x920/0x920 [ 689.088480][T28071] ? sk_stream_alloc_skb+0xc60/0xc60 [ 689.100493][T28076] debugfs: File '28074' in directory 'proc' already present! [ 689.105435][T28071] ? del_timer+0xd2/0x120 [ 689.105455][T28071] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 689.105473][T28071] tls_push_sg+0x1de/0x670 [ 689.105492][T28071] tls_tx_records+0x3b7/0x740 [ 689.105512][T28071] tls_sw_sendmsg+0x7d2/0x17b0 [ 689.158942][T28080] debugfs: File '28079' in directory 'proc' already present! [ 689.161376][T28071] ? tx_work_handler+0x180/0x180 [ 689.161390][T28071] ? ksys_dup3+0x327/0x3e0 [ 689.161400][T28071] ? get_pid_task+0xc9/0x190 [ 689.161422][T28071] ? __kasan_check_read+0x11/0x20 [ 689.170200][T28080] binder: 28079:28080 unknown command -162021415 00:30:01 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x4c, 0x100000000000000}) [ 689.173122][T28071] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 689.173140][T28071] inet6_sendmsg+0x9e/0xe0 [ 689.173152][T28071] ? inet6_ioctl+0x1c0/0x1c0 [ 689.173166][T28071] sock_sendmsg+0xd7/0x130 [ 689.173180][T28071] __sys_sendto+0x262/0x380 [ 689.173195][T28071] ? __ia32_sys_getpeername+0xb0/0xb0 [ 689.173208][T28071] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 689.173232][T28071] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 689.181746][T28080] binder: 28079:28080 ioctl c0306201 20012000 returned -22 [ 689.183369][T28071] ? fput_many+0x12c/0x1a0 [ 689.183387][T28071] ? fput+0x1b/0x20 [ 689.190550][T28080] binder: 28079:28080 ioctl c018620c 20000180 returned -22 [ 689.192798][T28071] ? ksys_write+0x1cf/0x290 [ 689.192811][T28071] ? __ia32_sys_read+0xb0/0xb0 [ 689.192827][T28071] ? switch_fpu_return+0x1fa/0x4f0 [ 689.192846][T28071] __x64_sys_sendto+0xe1/0x1a0 [ 689.192863][T28071] do_syscall_64+0xfd/0x6a0 [ 689.192878][T28071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.192892][T28071] RIP: 0033:0x4598e9 [ 689.207867][T28080] debugfs: File '28079' in directory 'proc' already present! [ 689.209701][T28071] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.209709][T28071] RSP: 002b:00007feca7bbbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 689.209728][T28071] RAX: ffffffffffffffda RBX: 00007feca7bbbc90 RCX: 00000000004598e9 [ 689.231949][T28071] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 00:30:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x20000081, 0x0, 0x0, 0x0) [ 689.240935][T28071] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 689.278321][T28085] debugfs: File '28084' in directory 'proc' already present! [ 689.278724][T28071] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feca7bbc6d4 [ 689.285701][T28085] binder: 28084:28085 unknown command -162021415 [ 689.289693][T28071] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000005 [ 689.352960][T28086] binder: 28084:28086 ioctl c018620c 20000180 returned -22 [ 689.418797][T28085] binder: 28084:28085 ioctl c0306201 20012000 returned -22 00:30:01 executing program 5 (fault-call:7 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x0, 0x0, 0x0) [ 689.469016][T28087] debugfs: File '28084' in directory 'proc' already present! [ 689.536548][T28096] FAULT_INJECTION: forcing a failure. [ 689.536548][T28096] name failslab, interval 1, probability 0, space 0, times 0 [ 689.567642][T28096] CPU: 0 PID: 28096 Comm: syz-executor.5 Not tainted 5.3.0-rc8+ #0 [ 689.575595][T28096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.585778][T28096] Call Trace: [ 689.589083][T28096] dump_stack+0x172/0x1f0 [ 689.593428][T28096] should_fail.cold+0xa/0x15 [ 689.598152][T28096] ? fault_create_debugfs_attr+0x180/0x180 [ 689.603947][T28096] ? page_to_nid.part.0+0x20/0x20 [ 689.608958][T28096] ? ___might_sleep+0x163/0x280 [ 689.613808][T28096] __should_failslab+0x121/0x190 [ 689.618732][T28096] should_failslab+0x9/0x14 [ 689.623566][T28096] kmem_cache_alloc_node_trace+0x274/0x750 [ 689.629387][T28096] ? kasan_unpoison_shadow+0x35/0x50 [ 689.634845][T28096] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 689.640640][T28096] __kmalloc_node_track_caller+0x3d/0x70 [ 689.646263][T28096] __kmalloc_reserve.isra.0+0x40/0xf0 [ 689.651619][T28096] __alloc_skb+0x10b/0x5e0 [ 689.656110][T28096] ? netdev_alloc_frag+0x1b0/0x1b0 [ 689.661226][T28096] ? kmem_cache_alloc_node+0x92/0x740 [ 689.666595][T28096] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 689.672481][T28096] sk_stream_alloc_skb+0x2d2/0xc60 [ 689.677596][T28096] do_tcp_sendpages+0xb19/0x1cf0 [ 689.682558][T28096] ? lock_downgrade+0x920/0x920 [ 689.687400][T28096] ? sk_stream_alloc_skb+0xc60/0xc60 [ 689.692667][T28096] ? del_timer+0xd2/0x120 [ 689.697003][T28096] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 689.702710][T28096] tls_push_sg+0x1de/0x670 [ 689.707120][T28096] tls_tx_records+0x3b7/0x740 [ 689.711785][T28096] tls_sw_sendmsg+0x7d2/0x17b0 [ 689.716676][T28096] ? tx_work_handler+0x180/0x180 [ 689.721612][T28096] ? ksys_dup3+0x327/0x3e0 [ 689.726017][T28096] ? get_pid_task+0xc9/0x190 [ 689.730593][T28096] ? __kasan_check_read+0x11/0x20 [ 689.735644][T28096] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 689.742268][T28096] inet6_sendmsg+0x9e/0xe0 [ 689.746685][T28096] ? inet6_ioctl+0x1c0/0x1c0 [ 689.751284][T28096] sock_sendmsg+0xd7/0x130 [ 689.755746][T28096] __sys_sendto+0x262/0x380 [ 689.760320][T28096] ? __ia32_sys_getpeername+0xb0/0xb0 [ 689.765682][T28096] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 689.771216][T28096] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 689.777446][T28096] ? fput_many+0x12c/0x1a0 [ 689.781944][T28096] ? fput+0x1b/0x20 [ 689.785731][T28096] ? ksys_write+0x1cf/0x290 [ 689.790215][T28096] ? __ia32_sys_read+0xb0/0xb0 [ 689.794976][T28096] ? switch_fpu_return+0x1fa/0x4f0 [ 689.800070][T28096] __x64_sys_sendto+0xe1/0x1a0 [ 689.804818][T28096] do_syscall_64+0xfd/0x6a0 [ 689.809462][T28096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.815480][T28096] RIP: 0033:0x4598e9 [ 689.819359][T28096] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.839588][T28096] RSP: 002b:00007feca7bbbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 689.847986][T28096] RAX: ffffffffffffffda RBX: 00007feca7bbbc90 RCX: 00000000004598e9 [ 689.855946][T28096] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 689.863917][T28096] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 689.871872][T28096] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feca7bbc6d4 [ 689.880253][T28096] R13: 00000000004c7880 R14: 00000000004dd188 R15: 0000000000000005 00:30:02 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvmmsg(r2, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0xfffffe40}], 0x1}}], 0x1, 0x0, 0x0) tkill(r0, 0x0) 00:30:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x2, 0x0, 0xfffffffffffffe5b) 00:30:02 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x60, 0x100000000000000}) 00:30:02 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00\xa6\x04^R\"\xc8\x19\xa0[\x16\x8f\a\x8a\x86\x15\xb2\xc1i(&\x7f\xbc1\xde\xef\xa0\x04\xdf\x13\xb9\xc6z\x16\xdad\xa9\xf5\xb1G\x1f\xb2\x11i\xe3 \x00\x8a_\x8c\xa1E\x84\xdd\xca\xf3b\xaeU%#I\xc8w\xee1\x06\xc7\x0e\x82P\x83j\xe7a\x01\x00\x00\x80w\xfa\xf9\xcf\x1f\xa1h\x8f\xd1eo2\xd1\xc6\xeaV\x87\x1f\x9b\xbdr\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(r1, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000140)={0xd9c0d746c0912404, @loopback, 0x4e21, 0x1, 'lblcr\x00', 0x11, 0x3d9, 0x42}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e24}, 0x1c) socket$pppoe(0x18, 0x1, 0x0) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r3, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:30:02 executing program 5 (fault-call:7 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x0, 0x0, 0x0) [ 689.975353][T28100] debugfs: File '28099' in directory 'proc' already present! 00:30:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x3, 0x0, 0xfffffffffffffe5b) [ 690.022016][T28100] binder: 28099:28100 unknown command -162021415 [ 690.042512][T28100] binder: 28099:28100 ioctl c0306201 20012000 returned -22 [ 690.061284][T28100] binder: 28099:28100 ioctl c018620c 20000180 returned -22 00:30:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x1, 0x0, 0x0, 0x0) 00:30:02 executing program 2: getpid() openat$full(0xffffffffffffff9c, 0x0, 0x40340, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x54, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d9bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a0892bd8c04060040d"], 0x0, 0x0, 0x0}) dup3(r1, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x68, 0x100000000000000}) [ 690.082362][T28100] debugfs: File '28099' in directory 'proc' already present! 00:30:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x4, 0x0, 0xfffffffffffffe5b) 00:30:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='9', 0x2, 0x0, 0x0, 0x0) [ 690.199971][T28130] debugfs: File '28124' in directory 'proc' already present! [ 690.219975][T28130] binder: 28124:28130 unknown command -162021415 [ 690.238794][T28130] binder: 28124:28130 ioctl c0306201 20012000 returned -22 [ 690.269846][T28130] binder: 28124:28130 ioctl c018620c 20000180 returned -22 [ 846.251333][ T1057] INFO: task syz-executor.1:28090 blocked for more than 143 seconds. [ 846.259449][ T1057] Not tainted 5.3.0-rc8+ #0 [ 846.264924][ T1057] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 846.273809][ T1057] syz-executor.1 D28384 28090 10414 0x00000004 [ 846.280396][ T1057] Call Trace: [ 846.283744][ T1057] __schedule+0x755/0x1580 [ 846.288170][ T1057] ? __sched_text_start+0x8/0x8 [ 846.293064][ T1057] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 846.298799][ T1057] ? ext4_mark_iloc_dirty+0x196f/0x2de0 [ 846.304693][ T1057] schedule+0xd9/0x260 [ 846.308776][ T1057] schedule_timeout+0x717/0xc50 [ 846.313648][ T1057] ? usleep_range+0x170/0x170 [ 846.318324][ T1057] ? __kasan_check_write+0x14/0x20 [ 846.323474][ T1057] ? lock_downgrade+0x920/0x920 [ 846.328321][ T1057] ? rwlock_bug.part.0+0x90/0x90 [ 846.333281][ T1057] ? wait_for_completion+0x9e/0x440 [ 846.338479][ T1057] ? trace_hardirqs_on+0x67/0x240 [ 846.343546][ T1057] ? __kasan_check_read+0x11/0x20 [ 846.348567][ T1057] wait_for_completion+0x29c/0x440 [ 846.354580][ T1057] ? wait_for_completion_interruptible+0x470/0x470 [ 846.361138][ T1057] ? lock_downgrade+0x920/0x920 [ 846.365983][ T1057] ? wake_up_q+0xf0/0xf0 [ 846.370652][ T1057] ? trace_hardirqs_on+0x67/0x240 [ 846.375706][ T1057] ? __kasan_check_read+0x11/0x20 [ 846.380904][ T1057] __flush_work+0x508/0xa50 [ 846.385509][ T1057] ? alloc_unbound_pwq+0xcb0/0xcb0 [ 846.390699][ T1057] ? init_pwq+0x360/0x360 [ 846.395062][ T1057] ? __cancel_work_timer+0xc4/0x540 [ 846.400400][ T1057] ? trace_hardirqs_off+0x62/0x240 [ 846.405723][ T1057] ? trace_hardirqs_on+0x67/0x240 [ 846.410836][ T1057] __cancel_work_timer+0x3d9/0x540 [ 846.416005][ T1057] ? mod_delayed_work_on+0x200/0x200 [ 846.421970][ T1057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.428909][ T1057] ? balance_dirty_pages_ratelimited+0x168/0x1f00 [ 846.435903][ T1057] ? __set_page_dirty_buffers+0x302/0x640 [ 846.441987][ T1057] ? mark_held_locks+0xf0/0xf0 [ 846.446855][ T1057] cancel_delayed_work_sync+0x1b/0x20 [ 846.452266][ T1057] tls_sw_cancel_work_tx+0x68/0x80 [ 846.457461][ T1057] tls_sk_proto_close+0x4ac/0x990 [ 846.462549][ T1057] ? lock_acquire+0x190/0x410 [ 846.467270][ T1057] ? wait_on_pending_writer+0x420/0x420 [ 846.472918][ T1057] ? ip_mc_drop_socket+0x211/0x270 [ 846.478037][ T1057] ? down_write+0xdf/0x150 [ 846.482521][ T1057] inet_release+0xed/0x200 [ 846.486949][ T1057] inet6_release+0x53/0x80 [ 846.491427][ T1057] __sock_release+0xce/0x280 [ 846.496012][ T1057] sock_close+0x1e/0x30 [ 846.500165][ T1057] __fput+0x2ff/0x890 [ 846.504198][ T1057] ? __sock_release+0x280/0x280 [ 846.509061][ T1057] ____fput+0x16/0x20 [ 846.513069][ T1057] task_work_run+0x145/0x1c0 [ 846.517667][ T1057] exit_to_usermode_loop+0x316/0x380 [ 846.523017][ T1057] do_syscall_64+0x5a9/0x6a0 [ 846.527637][ T1057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.533566][ T1057] RIP: 0033:0x4135d1 [ 846.537476][ T1057] Code: 49 89 c9 48 85 d2 0f 84 e3 02 00 00 44 0f b6 32 48 ff c2 b9 08 00 00 00 49 39 f5 0f 85 9c 02 00 00 48 8b 73 08 48 c1 ee 03 48 <85> f6 0f 84 fc 03 00 00 48 83 fe 02 0f 83 79 02 00 00 bb 02 00 00 [ 846.557350][ T1057] RSP: 002b:00007ffc6e7c7510 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 846.566006][ T1057] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004135d1 [ 846.574154][ T1057] RDX: 0000001b2e920000 RSI: 0000000000000000 RDI: 0000000000000003 [ 846.582310][ T1057] RBP: 0000000000000001 R08: 000000002331f1a9 R09: 000000002331f1ad [ 846.590282][ T1057] R10: 00007ffc6e7c75f0 R11: 0000000000000293 R12: 000000000075c9a0 [ 846.598297][ T1057] R13: 000000000075c9a0 R14: 0000000000760778 R15: ffffffffffffffff [ 846.606307][ T1057] INFO: lockdep is turned off. [ 846.611052][ T1057] NMI backtrace for cpu 1 [ 846.615426][ T1057] CPU: 1 PID: 1057 Comm: khungtaskd Not tainted 5.3.0-rc8+ #0 [ 846.622881][ T1057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.632924][ T1057] Call Trace: [ 846.636226][ T1057] dump_stack+0x172/0x1f0 [ 846.640538][ T1057] nmi_cpu_backtrace.cold+0x70/0xb2 [ 846.645724][ T1057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.651954][ T1057] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 846.657599][ T1057] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 846.663739][ T1057] arch_trigger_cpumask_backtrace+0x14/0x20 [ 846.669624][ T1057] watchdog+0x9d0/0xef0 [ 846.673792][ T1057] kthread+0x361/0x430 [ 846.677844][ T1057] ? reset_hung_task_detector+0x30/0x30 [ 846.683529][ T1057] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 846.689760][ T1057] ret_from_fork+0x24/0x30 [ 846.694292][ T1057] Sending NMI from CPU 1 to CPUs 0: [ 846.699555][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 [ 846.701391][ T1057] Kernel panic - not syncing: hung_task: blocked tasks [ 846.714976][ T1057] CPU: 1 PID: 1057 Comm: khungtaskd Not tainted 5.3.0-rc8+ #0 [ 846.722451][ T1057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.732530][ T1057] Call Trace: [ 846.735910][ T1057] dump_stack+0x172/0x1f0 [ 846.740285][ T1057] panic+0x2dc/0x755 [ 846.744317][ T1057] ? add_taint.cold+0x16/0x16 [ 846.748980][ T1057] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 846.754603][ T1057] ? ___preempt_schedule+0x16/0x20 [ 846.759697][ T1057] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 846.765845][ T1057] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 846.772006][ T1057] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 846.778160][ T1057] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 846.784319][ T1057] watchdog+0x9e1/0xef0 [ 846.788478][ T1057] kthread+0x361/0x430 [ 846.792537][ T1057] ? reset_hung_task_detector+0x30/0x30 [ 846.798059][ T1057] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 846.804281][ T1057] ret_from_fork+0x24/0x30 [ 846.810322][ T1057] Kernel Offset: disabled [ 846.814657][ T1057] Rebooting in 86400 seconds..