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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], 0x0, &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() [ 1077.741596] FS-Cache: Duplicate cookie detected [ 1077.746575] FS-Cache: O-cookie c=00000000a5702c0a [p=0000000006530c1d fl=222 nc=0 na=1] [ 1077.755088] FS-Cache: O-cookie d= (null) n= (null) [ 1077.761732] FS-Cache: O-key=[10] '02000200000002000000' [ 1077.767406] FS-Cache: N-cookie c=000000002f5203fb [p=0000000006530c1d fl=2 nc=0 na=1] [ 1077.775973] FS-Cache: N-cookie d=000000005656d7eb n=00000000a791888e [ 1077.782726] FS-Cache: N-key=[10] '02000200000002000000' 15:17:13 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f0000000300)=0xc) sched_getparam(r1, &(0x7f0000000440)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r3, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r2) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000900)={&(0x7f0000000640)={0x48, r4, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x362}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000000c0)={0x80000000, 0x91ae, 0x1669, 0x9a, &(0x7f0000000380)=""/154, 0x4f, &(0x7f00000004c0)=""/79, 0xc1, &(0x7f0000000700)=""/193}) getpid() 15:17:13 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000380)={'mangle\x00'}, &(0x7f00000000c0)=0x54) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:13 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:13 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:13 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xfc00}}, 0x1c) [ 1078.141038] FS-Cache: Duplicate cookie detected [ 1078.145968] FS-Cache: O-cookie c=0000000037b8409d [p=0000000006530c1d fl=222 nc=0 na=1] [ 1078.154417] FS-Cache: O-cookie d= (null) n= (null) [ 1078.161189] FS-Cache: O-key=[10] '02000200000002000000' [ 1078.167308] FS-Cache: N-cookie c=000000006dec0bb4 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1078.175615] FS-Cache: N-cookie d=000000005656d7eb n=00000000af265c48 [ 1078.182541] FS-Cache: N-key=[10] '02000200000002000000' 15:17:13 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) wait4(r2, 0x0, 0x8, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r3, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000300)) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x16000, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() [ 1078.189191] FS-Cache: Duplicate cookie detected [ 1078.194033] FS-Cache: O-cookie c=0000000037b8409d [p=0000000006530c1d fl=212 nc=0 na=0] [ 1078.202537] FS-Cache: O-cookie d= (null) n= (null) [ 1078.209216] FS-Cache: O-key=[10] '02000200000002000000' [ 1078.215215] FS-Cache: N-cookie c=000000006194bf4e [p=0000000006530c1d fl=2 nc=0 na=1] [ 1078.223558] FS-Cache: N-cookie d=000000005656d7eb n=00000000a6ef3650 [ 1078.230276] FS-Cache: N-key=[10] '02000200000002000000' 15:17:13 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], 0x0, &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:13 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xfffffffe}}, 0x1c) 15:17:13 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:13 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f0000000300)=0xc) sched_getparam(r1, &(0x7f0000000440)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r3, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r2) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000900)={&(0x7f0000000640)={0x48, r4, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x362}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000000c0)={0x80000000, 0x91ae, 0x1669, 0x9a, &(0x7f0000000380)=""/154, 0x4f, &(0x7f00000004c0)=""/79, 0xc1, &(0x7f0000000700)=""/193}) getpid() 15:17:13 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:14 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x4) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:14 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:14 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x10}}, 0x1c) [ 1078.805665] FS-Cache: Duplicate cookie detected [ 1078.810675] FS-Cache: O-cookie c=00000000a495c0fc [p=0000000006530c1d fl=222 nc=0 na=1] [ 1078.819030] FS-Cache: O-cookie d= (null) n= (null) [ 1078.825658] FS-Cache: O-key=[10] '02000200000002000000' [ 1078.832006] FS-Cache: N-cookie c=00000000b865cc4a [p=0000000006530c1d fl=2 nc=0 na=1] [ 1078.840249] FS-Cache: N-cookie d=000000005656d7eb n=000000005f02d48a [ 1078.846905] FS-Cache: N-key=[10] '02000200000002000000' 15:17:14 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:14 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f00000004c0)) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000380)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) getpeername$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x10) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:14 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f0000000300)=0xc) sched_getparam(r1, &(0x7f0000000440)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r3, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r2) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000900)={&(0x7f0000000640)={0x48, r4, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x362}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000000c0)={0x80000000, 0x91ae, 0x1669, 0x9a, &(0x7f0000000380)=""/154, 0x4f, &(0x7f00000004c0)=""/79, 0xc1, &(0x7f0000000700)=""/193}) getpid() 15:17:14 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xff0f}}, 0x1c) 15:17:14 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:14 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() [ 1079.332462] FS-Cache: Duplicate cookie detected [ 1079.337434] FS-Cache: O-cookie c=0000000077863f10 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1079.345921] FS-Cache: O-cookie d=000000005656d7eb n=00000000761206b5 [ 1079.352875] FS-Cache: O-key=[10] '02000200000002000000' [ 1079.358968] FS-Cache: N-cookie c=00000000564e7a9b [p=0000000006530c1d fl=2 nc=0 na=1] [ 1079.367211] FS-Cache: N-cookie d=000000005656d7eb n=0000000089e52f0a [ 1079.374154] FS-Cache: N-key=[10] '02000200000002000000' 15:17:14 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xfec0}}, 0x1c) [ 1079.380371] FS-Cache: Duplicate cookie detected [ 1079.385391] FS-Cache: O-cookie c=0000000077863f10 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1079.393888] FS-Cache: O-cookie d=000000005656d7eb n=00000000761206b5 [ 1079.400864] FS-Cache: O-key=[10] '02000200000002000000' [ 1079.406612] FS-Cache: N-cookie c=000000002e490de0 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1079.414695] FS-Cache: N-cookie d=000000005656d7eb n=000000008725d1bf [ 1079.421412] FS-Cache: N-key=[10] '02000200000002000000' [ 1079.427178] FS-Cache: Duplicate cookie detected 15:17:14 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() [ 1079.431964] FS-Cache: O-cookie c=0000000077863f10 [p=0000000006530c1d fl=212 nc=0 na=0] [ 1079.440169] FS-Cache: O-cookie d= (null) n= (null) [ 1079.446707] FS-Cache: O-key=[10] '02000200000002000000' [ 1079.452153] FS-Cache: N-cookie c=000000001dbeca97 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1079.460171] FS-Cache: N-cookie d=000000005656d7eb n=00000000b1636a26 [ 1079.466673] FS-Cache: N-key=[10] '02000200000002000000' 15:17:15 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) r3 = memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f00000000c0)={0x0, 0x7fffffff, 0x3, 0x2, &(0x7f0000ffb000/0x4000)=nil, 0x80}) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) open$dir(&(0x7f0000000280)='./file0/file0\x00', 0x2, 0x60) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) io_setup(0x6, &(0x7f0000000300)=0x0) r5 = socket$packet(0x11, 0x2, 0x300) io_cancel(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x3f, r5, &(0x7f0000000380)="483aa8ccc08a37784d", 0x9, 0x1ff, 0x0, 0x1, r3}, &(0x7f0000000400)) getpid() 15:17:15 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd9044947dd1b67a6ba6b92ec8a63d33aef9edf36ef26ff29f1775f0b439f461daf7ee1b7f07e0becc399f984dd81be76fd0221e3b8e09708"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) r3 = memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0xc058534b, &(0x7f0000000380)={0x6, 0x3, 0xfffffffffffffffc, 0x7ff, 0x4, 0x8}) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:15 executing program 1: 15:17:15 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x5000000}}, 0x1c) 15:17:15 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:15 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:15 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:15 executing program 1: 15:17:15 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x3e8}}, 0x1c) 15:17:16 executing program 1: 15:17:16 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x34}}, 0x1c) 15:17:16 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:16 executing program 1: 15:17:16 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000380)) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:16 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:16 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x1802000000000000}}, 0x1c) 15:17:16 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:16 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1081.091195] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:16 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x300000000000000}}, 0x1c) 15:17:16 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000380)={'filter\x00'}, &(0x7f00000000c0)=0x54) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:16 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:16 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:16 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:16 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1081.409772] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:16 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x2}}, 0x1c) [ 1081.521384] FS-Cache: Duplicate cookie detected [ 1081.526274] FS-Cache: O-cookie c=0000000035676650 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1081.534859] FS-Cache: O-cookie d=000000005656d7eb n=000000000bdab30f [ 1081.541787] FS-Cache: O-key=[10] '02000200000002000000' [ 1081.547835] FS-Cache: N-cookie c=00000000e000966c [p=0000000006530c1d fl=2 nc=0 na=1] [ 1081.556252] FS-Cache: N-cookie d=000000005656d7eb n=00000000c8274956 [ 1081.563366] FS-Cache: N-key=[10] '02000200000002000000' 15:17:17 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1081.590545] FS-Cache: Duplicate cookie detected [ 1081.595367] FS-Cache: O-cookie c=0000000035676650 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1081.603935] FS-Cache: O-cookie d=000000005656d7eb n=000000000bdab30f [ 1081.610640] FS-Cache: O-key=[10] '02000200000002000000' [ 1081.616384] FS-Cache: N-cookie c=000000005c198cdc [p=0000000006530c1d fl=2 nc=0 na=1] [ 1081.624571] FS-Cache: N-cookie d=000000005656d7eb n=00000000fdac6d12 [ 1081.631731] FS-Cache: N-key=[10] '02000200000002000000' 15:17:17 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1081.674935] FS-Cache: Duplicate cookie detected [ 1081.679740] FS-Cache: O-cookie c=000000000e3a0153 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1081.687977] FS-Cache: O-cookie d=000000005656d7eb n=000000005b032cfb [ 1081.694481] FS-Cache: O-key=[10] '02000200000002000000' [ 1081.699964] FS-Cache: N-cookie c=000000009f86a812 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1081.708002] FS-Cache: N-cookie d=000000005656d7eb n=0000000058f99d0f [ 1081.714514] FS-Cache: N-key=[10] '02000200000002000000' 15:17:17 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:17 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet6_buf(r2, 0x29, 0x2a, &(0x7f0000000380)=""/108, &(0x7f00000000c0)=0x6c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:17 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xe8030000}}, 0x1c) 15:17:17 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:17 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:17 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:17 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83aef0ab000000"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000000c0)=0x1000) getpid() [ 1082.167421] FS-Cache: Duplicate cookie detected [ 1082.172522] FS-Cache: O-cookie c=000000006d4d2fab [p=0000000006530c1d fl=222 nc=0 na=1] [ 1082.181266] FS-Cache: O-cookie d=000000005656d7eb n=0000000048397b78 [ 1082.187921] FS-Cache: O-key=[10] '02000200000002000000' [ 1082.193491] FS-Cache: N-cookie c=00000000893e37c7 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1082.201739] FS-Cache: N-cookie d=000000005656d7eb n=000000000bb49c3f [ 1082.208685] FS-Cache: N-key=[10] '02000200000002000000' 15:17:17 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x4002000000000000}}, 0x1c) [ 1082.433063] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:18 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:18 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x668e}}, 0x1c) 15:17:18 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:18 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) setsockopt(r0, 0xffffffffffffff76, 0x80, &(0x7f0000000380)="c9e3b48d71d5b0ae10fbf152ae8aaf3cd90e7ee9335928e3f2bae68b43d1b0e367a71d0a2af3b17cb7abb0512e8b7a9954264c282ee27618d8788b339f826d62f8fc05f7d16bf58fca5cb50730be9795549c49ae08c55f229f67c6b637dd25f269acd0ae40a4bfbcf0f943ffc3d4cccef4b2baac5b6b75fda1f6dbaa9841f6aa54a2e0c047bf924bdc9eacdcbcd0c863d9fc2efe935bd5204bd151f7468ced6fa40a410415ef9512bbf47e00eeafc84ed9d5416a79bc6b93614dd98b2915a0d88f25859d1ba88f303ea4bc6d504597235dccc50b1615ea388b97884575fe20a4ec1baa", 0xe3) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000680)=0x10, 0x4) getpid() rt_sigaction(0x12, &(0x7f0000000300)={&(0x7f00000000c0)="c40239a8c88f89509134cf2beff3ac67d218420fd5ea36f3420fe6d74099672a19c4826d9c5b08", {0x6}, 0x10000004, &(0x7f0000000280)="f04681a9dea0000008800000c42235ac060feda70d000000f040804f00420f613ac4017a2dc541d24299c4237140eb4fc44209ab25fb4c3c5fc441ec5738"}, &(0x7f00000005c0)={&(0x7f00000004c0)="44ffd40f184b08f281270600000064660f3806f2c422792ab00800000067f2afc403f915a6e774724515c481462a33c40169ecb31f5831edc423d1693cfd000000002d", {}, 0x0, &(0x7f0000000540)="47dfda65f0f69036233333c421c56c4203154f2e00000f0dbd000000009bde070fbaf4360f6f2bc4a2fdb8e9"}, 0x8, &(0x7f0000000640)) 15:17:18 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:18 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:18 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:18 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x7}}, 0x1c) 15:17:18 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:18 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) r3 = memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000280)='./file0\x00') getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:18 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1083.305840] FS-Cache: Duplicate cookie detected [ 1083.310762] FS-Cache: O-cookie c=00000000b2d146e7 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1083.319154] FS-Cache: O-cookie d=000000005656d7eb n=000000008389fd64 [ 1083.325765] FS-Cache: O-key=[10] '02000200000002000000' [ 1083.331853] FS-Cache: N-cookie c=0000000061e81394 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1083.340256] FS-Cache: N-cookie d=000000005656d7eb n=00000000fe7095ff [ 1083.346921] FS-Cache: N-key=[10] '02000200000002000000' 15:17:18 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:18 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:19 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x91ffffff00000000}}, 0x1c) [ 1083.707085] FS-Cache: Duplicate cookie detected [ 1083.712053] FS-Cache: O-cookie c=00000000a8ff48bc [p=0000000006530c1d fl=212 nc=0 na=0] [ 1083.720379] FS-Cache: O-cookie d= (null) n= (null) [ 1083.727140] FS-Cache: O-key=[10] '02000200000002000000' [ 1083.733547] FS-Cache: N-cookie c=000000000efc345e [p=0000000006530c1d fl=2 nc=0 na=1] [ 1083.741845] FS-Cache: N-cookie d=000000005656d7eb n=000000009a66f53e [ 1083.748626] FS-Cache: N-key=[10] '02000200000002000000' 15:17:19 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:19 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1083.839968] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:19 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:19 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xff00000000000000}}, 0x1c) 15:17:19 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x7f, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0608", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() [ 1084.467512] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:20 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:20 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:20 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:20 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xff0f000000000000}}, 0x1c) 15:17:20 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:20 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1085.101051] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:20 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:20 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000380)={'security\x00', 0xbf, "48f1cf45cd5a7c544a478e6dc9a4721a0a4f77d11560f49bd2300f38d133c9ef725e4a453d60c8bd73bdc68d06a0e8bb72399827814628d83e3f6c7092ce8491a508e4eedf0e37abd53dd0f38b6cca8825c9d5f0c472ba4b158259411becb1c988e5f14748b8d2f2406df740ad8606ae3c1cadf0e3483c95f1a03f8c89421efe288f61d391ae873062e6b3722833b9543c91211ee10758e9b36e848111c90a1777d906270fc12b681cfe6a8130bc62c4e5d939d8a6d17f63dbed0577dcce67"}, &(0x7f0000000300)=0xe3) openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:20 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xa00000000000000}}, 0x1c) 15:17:20 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:20 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x7f, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0608", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:20 executing program 0: mkdir(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1085.434551] FS-Cache: Duplicate cookie detected [ 1085.439595] FS-Cache: O-cookie c=00000000c1589f13 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1085.447859] FS-Cache: O-cookie d=000000005656d7eb n=00000000d7aa89b0 [ 1085.454497] FS-Cache: O-key=[10] '02000200000002000000' [ 1085.460204] FS-Cache: N-cookie c=000000005d4d2c9c [p=0000000006530c1d fl=2 nc=0 na=1] [ 1085.468676] FS-Cache: N-cookie d=000000005656d7eb n=0000000060c576c5 [ 1085.475266] FS-Cache: N-key=[10] '02000200000002000000' 15:17:20 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1085.579408] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:21 executing program 0: mkdir(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1085.680999] FS-Cache: Duplicate cookie detected [ 1085.685888] FS-Cache: O-cookie c=000000000f011f81 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1085.694271] FS-Cache: O-cookie d=000000005656d7eb n=000000002a9992db [ 1085.700865] FS-Cache: O-key=[10] '02000200000002000000' [ 1085.706520] FS-Cache: N-cookie c=0000000012cc3df4 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1085.714923] FS-Cache: N-cookie d=000000005656d7eb n=00000000293246a5 [ 1085.721809] FS-Cache: N-key=[10] '02000200000002000000' 15:17:21 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:21 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x600}}, 0x1c) 15:17:21 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000540)=0x0) fcntl$lock(r0, 0x0, &(0x7f00000005c0)={0x1, 0x1, 0x7ff, 0xdc8, r1}) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000900)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a226ff33fa2aaad2b836e01629f102f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab00000000"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000280)={'erspan0\x00', 0x6}) r4 = memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r3, 0x7005) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000000c0)=0x0) kcmp(r5, 0x0, 0x8000000000, 0xffffffffffffffff, r2) sendmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000700)="046179b94f575f225b0fb7eb10f682ce0e8ce739f262d6f15eb638230f8f7b37f6495e1076fca94f0726e2c680a4e1c6c0800e26e726241db19c072db6beae04907bd97451cc0263b4fbcdd1ba979aadc70839a21fa9a99f9a600414be539d5c19cfec3aa967715f0cdeb651b49a322572d8123f0c2ccd4aa448a7f408491fce77e9d4eac06abc9a0678cf05c134677370b11b12d0a04beaf4d931ed69a1a3a765039a52e80fced18eccac6240b37b27376a65c0f5339057e87417fc7d7f7ea3837ab5861732c9a80003d37b875fcb0302d329391756427eb86e540b28abefeb7334359d077f46480ef101f5f61e", 0xee}, {&(0x7f0000000300)="bbfa335b69ab6544bcc00cec410b6378374f56904684d41865164014f6593ae2cdf77e", 0x23}, {&(0x7f0000000400)="263b59abb5aa23d7d5042c7b23e6fe571ba4f15b5a02351a51efce795573896b4da9422eea33a0a66cc4438e0457aa6958efc612e30b8ca512ba2adaa1", 0x3d}], 0x3, &(0x7f00000004c0)=[@rights={0x18, 0x1, 0x1, [r4]}, @rights={0x18, 0x1, 0x1, [r3]}], 0x30, 0x4000040}, 0x800) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000640)={0x0, 0x3}, 0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:21 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:21 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:21 executing program 0: mkdir(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1086.079532] FS-Cache: Duplicate cookie detected [ 1086.084491] FS-Cache: O-cookie c=000000005eafab5d [p=0000000006530c1d fl=222 nc=0 na=1] [ 1086.092983] FS-Cache: O-cookie d=000000005656d7eb n=00000000ac0c7072 [ 1086.099775] FS-Cache: O-key=[10] '02000200000002000000' [ 1086.105306] FS-Cache: N-cookie c=0000000053a40c0a [p=0000000006530c1d fl=2 nc=0 na=1] [ 1086.113647] FS-Cache: N-cookie d=000000005656d7eb n=00000000eda484ea [ 1086.120320] FS-Cache: N-key=[10] '02000200000002000000' 15:17:21 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:21 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x3c00}}, 0x1c) 15:17:21 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:21 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:21 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b99ac8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) r3 = memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) name_to_handle_at(r3, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000dc0)={0x1008, 0x8, "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"}, &(0x7f0000000280), 0x1000) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:21 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:21 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:22 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x18000000}}, 0x1c) 15:17:22 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:22 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:22 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:22 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xcbff}}, 0x1c) 15:17:22 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:22 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b5cc405000000fc2124edcfd90449479d1b0400000092ec8a63d33aef9edf3495c3ff29f1b7f07e0becc399f984dd81be76070321e3b8e00861c90200ae6b47ddf0ab000000000000000000"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="06001b50c7e52677a3997925613fb88c81b7c1d63f9ccf9f21be1588917efb8186023ec0b3458f1a297df0aeab2fa9435314789b5a29cdf7703bcabbad709c2467d9aa07ad6610de16978b05e988949a4419be03e678b651c3b9d886a75a8abd89d0ab8effa8c7f60be2ea915183c6b4832b15d2fb805c92062e4250130b3e76393f1cab62099eabe66255006fe7ef9da179030062b02aa7d6c721392333a0f4e65c648f7bfc2f57bd6597294fb4ca2284c92d22602252947bb349f8f40a223a3d25fc96dd31a109d869ba54e10ec2a569b89fa7a479f38852", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000300)) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000000c0)='tunl0\x00') 15:17:22 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:22 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:22 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xd001020000000000}}, 0x1c) 15:17:22 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:22 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) unlink(&(0x7f00000000c0)='./file0\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r0, 0x7005) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() [ 1087.453222] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1087.467491] FS-Cache: Duplicate cookie detected [ 1087.472491] FS-Cache: O-cookie c=00000000292f2d90 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1087.481041] FS-Cache: O-cookie d=000000005656d7eb n=00000000ce814f34 [ 1087.487618] FS-Cache: O-key=[10] '02000200000002000000' [ 1087.493733] FS-Cache: N-cookie c=000000000e5948f5 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1087.502012] FS-Cache: N-cookie d=000000005656d7eb n=000000009d7cf91e [ 1087.508916] FS-Cache: N-key=[10] '02000200000002000000' 15:17:23 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() [ 1087.544811] FS-Cache: Duplicate cookie detected [ 1087.549734] FS-Cache: O-cookie c=00000000292f2d90 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1087.557965] FS-Cache: O-cookie d=000000005656d7eb n=00000000ce814f34 [ 1087.564471] FS-Cache: O-key=[10] '02000200000002000000' [ 1087.569943] FS-Cache: N-cookie c=00000000933ff134 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1087.577969] FS-Cache: N-cookie d=000000005656d7eb n=0000000040edd4ca [ 1087.584512] FS-Cache: N-key=[10] '02000200000002000000' 15:17:23 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:23 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:23 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xfeffffff00000000}}, 0x1c) 15:17:23 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = accept4(r0, &(0x7f0000000380), &(0x7f0000000280)=0x80, 0x80800) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f00000000c0)={0x8, 0x3}) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x1) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x1) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r3, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r2) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:23 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1087.807953] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:23 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) unlink(&(0x7f00000000c0)='./file0\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r0, 0x7005) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:23 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x20000000) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:23 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x2000000}}, 0x1c) 15:17:23 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:23 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x3c000000}}, 0x1c) [ 1088.235378] FS-Cache: Duplicate cookie detected [ 1088.240728] FS-Cache: O-cookie c=0000000059bf2649 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1088.249123] FS-Cache: O-cookie d=000000005656d7eb n=00000000fe77ce27 [ 1088.255780] FS-Cache: O-key=[10] '02000200000002000000' [ 1088.261646] FS-Cache: N-cookie c=000000007b6f97d9 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1088.270088] FS-Cache: N-cookie d=000000005656d7eb n=00000000965d9a60 [ 1088.276801] FS-Cache: N-key=[10] '02000200000002000000' 15:17:24 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000300), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="07ec80b874e8374e0f1153ed6ecf9544214640097b3d55d868666965afa432c01c0459fc3fcf827544a15d13b2fedd5b4f4d95c423b88f861efa93f07e507f404d647138b667477a9e02a3b589a59e880cc462139af4f6ef4b93bdd822781184fc5248032303019b02c089e2948bc89858ce6b4a0bfeb77604a7f58706202eca5dd2d348cb4941739b546113d80cb3ff0870d97deaa671945664dc1f9d", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:24 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:24 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:24 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:24 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xc0fe}}, 0x1c) 15:17:24 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x20000000) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:24 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:24 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x200000000000000}}, 0x1c) 15:17:24 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:24 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000dc0)=ANY=[@ANYBLOB="fc2124edcfd90449479def56b10df79e1b67a6ba6b92ec8a63d33aef9edf3495c382a9960000000000000029f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0aba29d3c074a741784864aea89f87c885c2151a787bb4453c323620fb5c6b24ebd94c1a338193f7a18609dfee2bc194c4b38e37bd00445637822615846eb4bc148b2a08d167758c223c0be972291a5286c5491ace74cb22c1a7e87e2357167545c56bf33e59a49406c2c67fdaf3088a388e34426a67969ea843bffd933aa38866266c900e0197bb724460b2402d2448ce48872ba7e73610815e808505307bcf896000044f2c56409b714e87e423d6188195dd2447cee70ed8bc422cb71d487813adff707e5d3eac7478d1f5c36e66c059217be39a4e313c7f3a660d016"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) r3 = memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000300)={0x0, 0xffffffffce3c118d}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r4, 0x5}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:24 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x20000000) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() [ 1089.129986] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:24 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:24 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:24 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xe803000000000000}}, 0x1c) [ 1089.318552] FS-Cache: Duplicate cookie detected [ 1089.323568] FS-Cache: O-cookie c=000000000c71423a [p=0000000006530c1d fl=222 nc=0 na=1] [ 1089.332076] FS-Cache: O-cookie d=000000005656d7eb n=00000000a2c3f944 [ 1089.338834] FS-Cache: O-key=[10] '02000200000002000000' [ 1089.344814] FS-Cache: N-cookie c=00000000bb30b08f [p=0000000006530c1d fl=2 nc=0 na=1] [ 1089.353163] FS-Cache: N-cookie d=000000005656d7eb n=00000000df216476 [ 1089.359856] FS-Cache: N-key=[10] '02000200000002000000' [ 1089.366742] FS-Cache: Duplicate cookie detected [ 1089.371538] FS-Cache: O-cookie c=000000000c71423a [p=0000000006530c1d fl=222 nc=0 na=1] [ 1089.379797] FS-Cache: O-cookie d=000000005656d7eb n=00000000a2c3f944 [ 1089.386308] FS-Cache: O-key=[10] '02000200000002000000' [ 1089.391851] FS-Cache: N-cookie c=000000003aed6108 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1089.399876] FS-Cache: N-cookie d=000000005656d7eb n=00000000a26bd1b8 [ 1089.406380] FS-Cache: N-key=[10] '02000200000002000000' [ 1089.498723] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:25 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x10000000}}, 0x1c) 15:17:25 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600"], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:25 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:25 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:25 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'bpq0\x00'}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:25 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xcbff0000}}, 0x1c) 15:17:25 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:25 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1090.111486] FS-Cache: Duplicate cookie detected [ 1090.116393] FS-Cache: O-cookie c=0000000043d9ac07 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1090.124781] FS-Cache: O-cookie d=000000005656d7eb n=000000002e13f9c1 [ 1090.131417] FS-Cache: O-key=[10] '02000200000002000000' [ 1090.137117] FS-Cache: N-cookie c=000000003d411b1e [p=0000000006530c1d fl=2 nc=0 na=1] [ 1090.145291] FS-Cache: N-cookie d=000000005656d7eb n=00000000d6dac2d0 [ 1090.151976] FS-Cache: N-key=[10] '02000200000002000000' 15:17:25 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x7f, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0608", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:25 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xfc}}, 0x1c) 15:17:25 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:25 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:26 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x7f, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0608", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:26 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600"], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:26 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:26 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x2000000000000000}}, 0x1c) 15:17:26 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:26 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1090.757261] FS-Cache: Duplicate cookie detected [ 1090.763181] FS-Cache: O-cookie c=00000000b17ae061 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1090.771616] FS-Cache: O-cookie d=000000005656d7eb n=00000000469be874 [ 1090.778282] FS-Cache: O-key=[10] '02000200000002000000' [ 1090.784212] FS-Cache: N-cookie c=00000000a2a73b2f [p=0000000006530c1d fl=2 nc=0 na=1] [ 1090.792564] FS-Cache: N-cookie d=000000005656d7eb n=0000000010d793b1 [ 1090.799280] FS-Cache: N-key=[10] '02000200000002000000' [ 1090.825281] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:26 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:26 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xfec00000}}, 0x1c) 15:17:26 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:26 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:26 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet6_buf(r2, 0x29, 0x2a, &(0x7f0000000380)=""/108, &(0x7f00000000c0)=0x6c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:26 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1091.236638] FS-Cache: Duplicate cookie detected [ 1091.241814] FS-Cache: O-cookie c=0000000058ccfb49 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1091.250208] FS-Cache: O-cookie d=000000005656d7eb n=00000000ed91c645 [ 1091.256911] FS-Cache: O-key=[10] '02000200000002000000' [ 1091.262522] FS-Cache: N-cookie c=00000000a5fb238f [p=0000000006530c1d fl=2 nc=0 na=1] [ 1091.270707] FS-Cache: N-cookie d=000000005656d7eb n=000000006e38e7eb [ 1091.277410] FS-Cache: N-key=[10] '02000200000002000000' 15:17:26 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x2000}}, 0x1c) 15:17:27 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600"], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:27 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1091.597039] FS-Cache: Duplicate cookie detected [ 1091.602134] FS-Cache: O-cookie c=0000000009e898b8 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1091.610914] FS-Cache: O-cookie d=000000005656d7eb n=000000002210ba09 [ 1091.617539] FS-Cache: O-key=[10] '02000200000002000000' [ 1091.623721] FS-Cache: N-cookie c=000000009a86f8f3 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1091.631965] FS-Cache: N-cookie d=000000005656d7eb n=00000000146ec964 [ 1091.638658] FS-Cache: N-key=[10] '02000200000002000000 [ 1091.639414] ' 15:17:27 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1091.694268] FS-Cache: Duplicate cookie detected [ 1091.699158] FS-Cache: O-cookie c=0000000009e898b8 [p=0000000006530c1d fl=212 nc=0 na=0] [ 1091.707423] FS-Cache: O-cookie d= (null) n= (null) [ 1091.714199] FS-Cache: O-key=[10] '02000200000002000000' [ 1091.720200] FS-Cache: N-cookie c=000000005b186896 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1091.728493] FS-Cache: N-cookie d=000000005656d7eb n=000000002668d43c [ 1091.735140] FS-Cache: N-key=[10] '02000200000002000000' 15:17:27 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:27 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:27 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xe17b846f}}, 0x1c) 15:17:27 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:27 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:27 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:27 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xf4010000}}, 0x1c) 15:17:27 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:27 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:27 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:27 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:28 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:28 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x50000}}, 0x1c) [ 1092.673095] FS-Cache: Duplicate cookie detected [ 1092.678127] FS-Cache: O-cookie c=000000002c36b127 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1092.686392] FS-Cache: O-cookie d=000000005656d7eb n=00000000d82991e0 [ 1092.693528] FS-Cache: O-key=[10] '02000200000002000000' [ 1092.699405] FS-Cache: N-cookie c=00000000e612e7c8 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1092.707484] FS-Cache: N-cookie d=000000005656d7eb n=0000000087c11ed1 [ 1092.714218] FS-Cache: N-key=[10] '02000200000002000000' [ 1092.730292] FS-Cache: Duplicate cookie detected [ 1092.735371] FS-Cache: O-cookie c=000000002c36b127 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1092.743735] FS-Cache: O-cookie d=000000005656d7eb n=00000000d82991e0 [ 1092.750544] FS-Cache: O-key=[10] '02000200000002000000' [ 1092.756471] FS-Cache: N-cookie c=000000009e4bb09d [p=0000000006530c1d fl=2 nc=0 na=1] [ 1092.764839] FS-Cache: N-cookie d=000000005656d7eb n=00000000401d97c2 [ 1092.771499] FS-Cache: N-key=[10] '02000200000002000000' 15:17:28 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:28 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x91ffffff}}, 0x1c) 15:17:28 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:28 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:28 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1093.097700] FS-Cache: Duplicate cookie detected [ 1093.103611] FS-Cache: O-cookie c=000000007c649d2d [p=0000000006530c1d fl=222 nc=0 na=1] [ 1093.112087] FS-Cache: O-cookie d=000000005656d7eb n=00000000a658a4dc [ 1093.118751] FS-Cache: O-key=[10] '02000200000002000000' [ 1093.124289] FS-Cache: N-cookie c=0000000088b2b070 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1093.132718] FS-Cache: N-cookie d=000000005656d7eb n=00000000052299ad [ 1093.139534] FS-Cache: N-key=[10] '02000200000002000000' 15:17:28 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x900000000000000}}, 0x1c) [ 1093.159981] FS-Cache: Duplicate cookie detected [ 1093.164931] FS-Cache: O-cookie c=000000007c649d2d [p=0000000006530c1d fl=222 nc=0 na=1] [ 1093.174229] FS-Cache: O-cookie d=000000005656d7eb n=00000000a658a4dc [ 1093.180914] FS-Cache: O-key=[10] '02000200000002000000' [ 1093.187016] FS-Cache: N-cookie c=00000000add87487 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1093.195598] FS-Cache: N-cookie d=000000005656d7eb n=00000000641733c0 [ 1093.202342] FS-Cache: N-key=[10] '02000200000002000000' 15:17:28 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:28 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:28 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:28 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1093.432719] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:29 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:29 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:29 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xfe800000}}, 0x1c) 15:17:29 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:29 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:29 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:29 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0bec"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1093.974133] FS-Cache: Duplicate cookie detected [ 1093.979215] FS-Cache: O-cookie c=00000000fca4c6eb [p=0000000006530c1d fl=222 nc=0 na=1] [ 1093.994281] FS-Cache: O-cookie d=000000005656d7eb n=00000000ba9e1779 [ 1094.001010] FS-Cache: O-key=[10] '02000200000002000000' [ 1094.007149] FS-Cache: N-cookie c=000000001c0abe47 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1094.015378] FS-Cache: N-cookie d=000000005656d7eb n=00000000d8f022be [ 1094.022068] FS-Cache: N-key=[10] '02000200000002000000' 15:17:29 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x8e660000}}, 0x1c) 15:17:29 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:29 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:29 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:29 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x7000000}}, 0x1c) [ 1094.366774] FS-Cache: Duplicate cookie detected [ 1094.371756] FS-Cache: O-cookie c=000000001be51aaf [p=0000000006530c1d fl=222 nc=0 na=1] [ 1094.380111] FS-Cache: O-cookie d=000000005656d7eb n=00000000e22a18b1 [ 1094.386768] FS-Cache: O-key=[10] '02000200000002000000' [ 1094.392949] FS-Cache: N-cookie c=00000000f72826b6 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1094.401202] FS-Cache: N-cookie d=000000005656d7eb n=00000000ffb07087 [ 1094.408388] FS-Cache: N-key=[10] '02000200000002000000' 15:17:29 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() [ 1094.508850] FS-Cache: Duplicate cookie detected [ 1094.513688] FS-Cache: O-cookie c=0000000002315051 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1094.522155] FS-Cache: O-cookie d=000000005656d7eb n=0000000011c991b4 [ 1094.528829] FS-Cache: O-key=[10] '02000200000002000000' [ 1094.534387] FS-Cache: N-cookie c=00000000b12ced85 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1094.542666] FS-Cache: N-cookie d=000000005656d7eb n=0000000010758e3f [ 1094.549772] FS-Cache: N-key=[10] '02000200000002000000' 15:17:30 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:30 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0bec"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:30 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:30 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xf401000000000000}}, 0x1c) 15:17:30 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:30 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:30 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) r3 = memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f00000000c0)={0x0, 0x7fffffff, 0x3, 0x2, &(0x7f0000ffb000/0x4000)=nil, 0x80}) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) open$dir(&(0x7f0000000280)='./file0/file0\x00', 0x2, 0x60) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) io_setup(0x6, &(0x7f0000000300)=0x0) r5 = socket$packet(0x11, 0x2, 0x300) io_cancel(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x3f, r5, &(0x7f0000000380)="483aa8ccc08a37784d", 0x9, 0x1ff, 0x0, 0x1, r3}, &(0x7f0000000400)) getpid() 15:17:30 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1094.991528] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1095.031727] FS-Cache: Duplicate cookie detected [ 1095.036509] FS-Cache: O-cookie c=00000000ca498dbd [p=0000000006530c1d fl=222 nc=0 na=1] [ 1095.044728] FS-Cache: O-cookie d=000000005656d7eb n=00000000d0dcec4a [ 1095.051315] FS-Cache: O-key=[10] '02000200000002000000' [ 1095.056736] FS-Cache: N-cookie c=00000000512c3ceb [p=0000000006530c1d fl=2 nc=0 na=1] [ 1095.064777] FS-Cache: N-cookie d=000000005656d7eb n=00000000e0f5d49b [ 1095.071364] FS-Cache: N-key=[10] '02000200000002000000' [ 1095.077023] FS-Cache: Duplicate cookie detected [ 1095.081983] FS-Cache: O-cookie c=00000000ca498dbd [p=0000000006530c1d fl=222 nc=0 na=1] [ 1095.090426] FS-Cache: O-cookie d=000000005656d7eb n=00000000d0dcec4a [ 1095.097058] FS-Cache: O-key=[10] '02000200000002000000' [ 1095.103719] FS-Cache: N-cookie c=00000000554a6ccc [p=0000000006530c1d fl=2 nc=0 na=1] [ 1095.112011] FS-Cache: N-cookie d=000000005656d7eb n=000000001df1e679 [ 1095.118855] FS-Cache: N-key=[10] '02000200000002000000' 15:17:30 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xff000000}}, 0x1c) 15:17:30 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) r3 = memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f00000000c0)={0x0, 0x7fffffff, 0x3, 0x2, &(0x7f0000ffb000/0x4000)=nil, 0x80}) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) open$dir(&(0x7f0000000280)='./file0/file0\x00', 0x2, 0x60) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) io_setup(0x6, &(0x7f0000000300)=0x0) r5 = socket$packet(0x11, 0x2, 0x300) io_cancel(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x3f, r5, &(0x7f0000000380)="483aa8ccc08a37784d", 0x9, 0x1ff, 0x0, 0x1, r3}, &(0x7f0000000400)) getpid() 15:17:30 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:31 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:31 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x201d0}}, 0x1c) 15:17:31 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:31 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:31 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:31 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() [ 1095.754947] FS-Cache: Duplicate cookie detected [ 1095.759813] FS-Cache: O-cookie c=00000000c97e7b83 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1095.768038] FS-Cache: O-cookie d=000000005656d7eb n=0000000058db8665 [ 1095.774683] FS-Cache: O-key=[10] '02000200000002000000' [ 1095.780165] FS-Cache: N-cookie c=0000000098fa77fd [p=0000000006530c1d fl=2 nc=0 na=1] [ 1095.788182] FS-Cache: N-cookie d=000000005656d7eb n=00000000cec3c712 [ 1095.794685] FS-Cache: N-key=[10] '02000200000002000000' [ 1095.803212] FS-Cache: Duplicate cookie detected [ 1095.808259] FS-Cache: O-cookie c=00000000c97e7b83 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1095.816582] FS-Cache: O-cookie d=000000005656d7eb n=0000000058db8665 [ 1095.824616] FS-Cache: O-key=[10] '02000200000002000000' [ 1095.830597] FS-Cache: N-cookie c=0000000060fa0102 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1095.838786] FS-Cache: N-cookie d=000000005656d7eb n=00000000388def4e [ 1095.845408] FS-Cache: N-key=[10] '02000200000002000000' 15:17:31 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:31 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1095.857072] FS-Cache: Duplicate cookie detected [ 1095.862063] FS-Cache: O-cookie c=00000000c97e7b83 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1095.870601] FS-Cache: O-cookie d=000000005656d7eb n=0000000058db8665 [ 1095.877291] FS-Cache: O-key=[10] '02000200000002000000' [ 1095.883262] FS-Cache: N-cookie c=00000000f6a2e97a [p=0000000006530c1d fl=2 nc=0 na=1] [ 1095.891346] FS-Cache: N-cookie d=000000005656d7eb n=00000000b8dfe89d [ 1095.897924] FS-Cache: N-key=[10] '02000200000002000000' 15:17:31 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x947a8c9a3a}}, 0x1c) 15:17:31 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:31 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1096.096843] FS-Cache: Duplicate cookie detected [ 1096.101625] FS-Cache: O-cookie c=000000001f8a4081 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1096.109871] FS-Cache: O-cookie d=000000005656d7eb n=0000000009ff314e [ 1096.116375] FS-Cache: O-key=[10] '02000200000002000000' [ 1096.121864] FS-Cache: N-cookie c=000000003ee61e15 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1096.129911] FS-Cache: N-cookie d=000000005656d7eb n=000000006129243c [ 1096.136431] FS-Cache: N-key=[10] '02000200000002000000' [ 1096.142292] FS-Cache: Duplicate cookie detected 15:17:31 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() [ 1096.147246] FS-Cache: O-cookie c=000000001f8a4081 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1096.155788] FS-Cache: O-cookie d=000000005656d7eb n=0000000009ff314e [ 1096.162410] FS-Cache: O-key=[10] '02000200000002000000' [ 1096.167918] FS-Cache: N-cookie c=0000000014cb5122 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1096.176029] FS-Cache: N-cookie d=000000005656d7eb n=00000000983989c8 [ 1096.183085] FS-Cache: N-key=[10] '02000200000002000000' [ 1096.298236] FS-Cache: Duplicate cookie detected [ 1096.303267] FS-Cache: O-cookie c=000000003e93f9b2 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1096.312448] FS-Cache: O-cookie d=000000005656d7eb n=00000000ef4cb8c5 [ 1096.319228] FS-Cache: O-key=[10] '02000200000002000000' [ 1096.324876] FS-Cache: N-cookie c=000000004d6a744e [p=0000000006530c1d fl=2 nc=0 na=1] [ 1096.333203] FS-Cache: N-cookie d=000000005656d7eb n=00000000e61b5077 [ 1096.340050] FS-Cache: N-key=[10] '02000200000002000000' 15:17:31 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x600000000000000}}, 0x1c) 15:17:31 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) 15:17:31 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1096.440278] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:31 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:31 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x3a9a8c7a94000000}}, 0x1c) 15:17:32 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) [ 1096.544596] FS-Cache: Duplicate cookie detected [ 1096.549519] FS-Cache: O-cookie c=00000000ca6b2b83 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1096.557782] FS-Cache: O-cookie d=000000005656d7eb n=00000000338a50cc [ 1096.564778] FS-Cache: O-key=[10] '02000200000002000000' [ 1096.570869] FS-Cache: N-cookie c=00000000966d8d70 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1096.579071] FS-Cache: N-cookie d=000000005656d7eb n=0000000094885747 [ 1096.585738] FS-Cache: N-key=[10] '02000200000002000000' [ 1096.613942] FS-Cache: Duplicate cookie detected [ 1096.618819] FS-Cache: O-cookie c=00000000ca6b2b83 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1096.626991] FS-Cache: O-cookie d=000000005656d7eb n=00000000338a50cc [ 1096.633568] FS-Cache: O-key=[10] '02000200000002000000' [ 1096.639084] FS-Cache: N-cookie c=00000000e3e6f1fb [p=0000000006530c1d fl=2 nc=0 na=1] [ 1096.647056] FS-Cache: N-cookie d=000000005656d7eb n=00000000467440d0 [ 1096.653610] FS-Cache: N-key=[10] '02000200000002000000' 15:17:32 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, &(0x7f00000006c0)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:32 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xff0f0000}}, 0x1c) 15:17:32 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:32 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) 15:17:32 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1096.872870] FS-Cache: Duplicate cookie detected [ 1096.877753] FS-Cache: O-cookie c=00000000a3fe1493 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1096.886118] FS-Cache: O-cookie d=000000005656d7eb n=0000000064404640 [ 1096.893113] FS-Cache: O-key=[10] '02000200000002000000' [ 1096.898979] FS-Cache: N-cookie c=00000000c1779355 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1096.907197] FS-Cache: N-cookie d=000000005656d7eb n=00000000caa9bb5a [ 1096.914081] FS-Cache: N-key=[10] '02000200000002000000' 15:17:32 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x1802}}, 0x1c) [ 1097.087472] FS-Cache: Duplicate cookie detected [ 1097.092523] FS-Cache: O-cookie c=00000000975ceb62 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1097.101223] FS-Cache: O-cookie d=000000005656d7eb n=000000000c22f0cc [ 1097.107809] FS-Cache: O-key=[10] '02000200000002000000' [ 1097.113743] FS-Cache: N-cookie c=00000000b0393a12 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1097.122111] FS-Cache: N-cookie d=000000005656d7eb n=000000008c36c37b [ 1097.128906] FS-Cache: N-key=[10] '02000200000002000000' 15:17:32 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:32 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) 15:17:32 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, &(0x7f00000006c0)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:32 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:32 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:32 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x1f4}}, 0x1c) 15:17:33 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1097.489893] FS-Cache: Duplicate cookie detected [ 1097.494782] FS-Cache: O-cookie c=00000000e902d792 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1097.503219] FS-Cache: O-cookie d=000000005656d7eb n=000000002fd77a78 [ 1097.510072] FS-Cache: O-key=[10] '02000200000002000000' [ 1097.515636] FS-Cache: N-cookie c=0000000094136fd3 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1097.523948] FS-Cache: N-cookie d=000000005656d7eb n=00000000e5dde89c [ 1097.530713] FS-Cache: N-key=[10] '02000200000002000000' 15:17:33 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:33 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:33 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x2602b35a}}, 0x1c) [ 1097.843612] FS-Cache: Duplicate cookie detected [ 1097.848412] FS-Cache: O-cookie c=0000000067b81b7d [p=0000000006530c1d fl=222 nc=0 na=1] [ 1097.856607] FS-Cache: O-cookie d=000000005656d7eb n=000000002e084885 [ 1097.863179] FS-Cache: O-key=[10] '02000200000002000000' [ 1097.868669] FS-Cache: N-cookie c=00000000bf0e2d17 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1097.876653] FS-Cache: N-cookie d=000000005656d7eb n=00000000daa1f6ef [ 1097.883229] FS-Cache: N-key=[10] '02000200000002000000' 15:17:33 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:33 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:33 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:33 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:33 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x2000000000000}}, 0x1c) 15:17:33 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:33 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1098.267588] FS-Cache: Duplicate cookie detected [ 1098.272487] FS-Cache: O-cookie c=00000000f3ff3d8b [p=0000000006530c1d fl=212 nc=0 na=0] [ 1098.280920] FS-Cache: O-cookie d= (null) n= (null) [ 1098.287428] FS-Cache: O-key=[10] '02000200000002000000' [ 1098.292906] FS-Cache: N-cookie c=00000000f16bbd95 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1098.300924] FS-Cache: N-cookie d=000000005656d7eb n=0000000093fb423a [ 1098.307438] FS-Cache: N-key=[10] '02000200000002000000' 15:17:33 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1098.429496] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:34 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:34 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:34 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xe17b846f00000000}}, 0x1c) 15:17:34 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:34 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:34 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:34 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1098.942565] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:34 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:34 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:34 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xa00}}, 0x1c) 15:17:34 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() [ 1099.385695] FS-Cache: Duplicate cookie detected [ 1099.390522] FS-Cache: O-cookie c=00000000465d607e [p=0000000006530c1d fl=212 nc=0 na=0] [ 1099.398803] FS-Cache: O-cookie d= (null) n= (null) [ 1099.405422] FS-Cache: O-key=[10] '02000200000002000000' [ 1099.411151] FS-Cache: N-cookie c=00000000cd5edea3 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1099.419316] FS-Cache: N-cookie d=000000005656d7eb n=00000000130f8ace [ 1099.426111] FS-Cache: N-key=[10] '02000200000002000000' 15:17:34 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xfc00000000000000}}, 0x1c) 15:17:34 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1099.434457] FS-Cache: Duplicate cookie detected [ 1099.439252] FS-Cache: O-cookie c=00000000465d607e [p=0000000006530c1d fl=212 nc=0 na=0] [ 1099.447408] FS-Cache: O-cookie d= (null) n= (null) [ 1099.454005] FS-Cache: O-key=[10] '02000200000002000000' [ 1099.459502] FS-Cache: N-cookie c=00000000583bf599 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1099.467481] FS-Cache: N-cookie d=000000005656d7eb n=00000000bd1d2a6a [ 1099.474026] FS-Cache: N-key=[10] '02000200000002000000' 15:17:35 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() [ 1099.617125] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:35 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:35 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:35 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) 15:17:35 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xfe80000000000000}}, 0x1c) 15:17:35 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:36 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:36 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:36 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:36 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:36 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() [ 1101.057150] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:36 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1101.141216] FS-Cache: Duplicate cookie detected [ 1101.145985] FS-Cache: O-cookie c=00000000e4c90625 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1101.154262] FS-Cache: O-cookie d=000000005656d7eb n=00000000a0d242d0 [ 1101.160847] FS-Cache: O-key=[10] '02000200000002000000' [ 1101.166273] FS-Cache: N-cookie c=00000000922d2bd1 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1101.174405] FS-Cache: N-cookie d=000000005656d7eb n=00000000b288f2c3 [ 1101.180962] FS-Cache: N-key=[10] '02000200000002000000' 15:17:36 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:36 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x18020000}}, 0x1c) 15:17:37 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:37 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:37 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:37 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) 15:17:37 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xf401}}, 0x1c) [ 1101.704870] FS-Cache: Duplicate cookie detected [ 1101.710665] FS-Cache: O-cookie c=00000000576cb9f6 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1101.719125] FS-Cache: O-cookie d=000000005656d7eb n=000000003431c95c [ 1101.725861] FS-Cache: O-key=[10] '02000200000002000000' [ 1101.732131] FS-Cache: N-cookie c=000000001fc35118 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1101.740274] FS-Cache: N-cookie d=000000005656d7eb n=00000000cc24d1a1 [ 1101.746908] FS-Cache: N-key=[10] '02000200000002000000' 15:17:37 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:37 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:37 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:37 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:37 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) 15:17:37 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0x4002}}, 0x1c) 15:17:37 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:37 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:37 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4={[], [], @rand_addr=0xe803}}, 0x1c) 15:17:37 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:38 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) getpid() 15:17:38 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(0x0, 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:39 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:39 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) getpid() 15:17:39 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:39 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) [ 1104.327145] FS-Cache: Duplicate cookie detected [ 1104.332039] FS-Cache: O-cookie c=00000000eb5af03a [p=0000000006530c1d fl=222 nc=0 na=1] [ 1104.340338] FS-Cache: O-cookie d=000000005656d7eb n=0000000027de8a06 [ 1104.346979] FS-Cache: O-key=[10] '02000200000002000000' [ 1104.352628] FS-Cache: N-cookie c=00000000faeeae86 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1104.360902] FS-Cache: N-cookie d=000000005656d7eb n=00000000ae38d344 [ 1104.367619] FS-Cache: N-key=[10] '02000200000002000000' 15:17:40 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:40 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) getpid() 15:17:40 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:40 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0x18}, 0x1c) 15:17:40 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) [ 1104.859185] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:40 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() [ 1105.052961] FS-Cache: Duplicate cookie detected [ 1105.058433] FS-Cache: O-cookie c=000000002f5203fb [p=0000000006530c1d fl=212 nc=0 na=0] [ 1105.066725] FS-Cache: O-cookie d= (null) n= (null) [ 1105.073752] FS-Cache: O-key=[10] '02000200000002000000' [ 1105.080003] FS-Cache: N-cookie c=000000003c1c3e05 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1105.088297] FS-Cache: N-cookie d=000000005656d7eb n=0000000095f3a0cf [ 1105.095002] FS-Cache: N-key=[10] '02000200000002000000' 15:17:40 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:41 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(0x0, 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:41 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0x2}, 0x1c) 15:17:41 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(0x0, 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev}}) getpid() 15:17:41 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) getpid() [ 1105.861282] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:41 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0x80fe}, 0x1c) 15:17:41 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(0x0, 0x6) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1106.071881] FS-Cache: Duplicate cookie detected [ 1106.076744] FS-Cache: O-cookie c=000000007a0e0ce9 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1106.085987] FS-Cache: O-cookie d=000000005656d7eb n=000000001b8db324 [ 1106.092692] FS-Cache: O-key=[10] '02000200000002000000' [ 1106.098604] FS-Cache: N-cookie c=000000006dec0bb4 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1106.106743] FS-Cache: N-cookie d=000000005656d7eb n=00000000bd1f4e5d [ 1106.113549] FS-Cache: N-key=[10] '02000200000002000000' [ 1106.187128] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:41 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0x2000000000000}, 0x1c) 15:17:41 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:41 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:41 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1106.428459] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1106.841493] syz-executor2 (1323) used greatest stack depth: 5464 bytes left 15:17:42 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:42 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:42 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0x34000000}, 0x1c) 15:17:42 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:42 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1107.215611] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1107.320594] FS-Cache: Duplicate cookie detected [ 1107.325924] FS-Cache: O-cookie c=0000000037ea977d [p=0000000006530c1d fl=222 nc=0 na=1] [ 1107.334561] FS-Cache: O-cookie d=000000005656d7eb n=0000000020a7a25f [ 1107.341497] FS-Cache: O-key=[10] '02000200000002000000' [ 1107.348098] FS-Cache: N-cookie c=000000001ed91463 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1107.356193] FS-Cache: N-cookie d=000000005656d7eb n=00000000c964bd2d [ 1107.362967] FS-Cache: N-key=[10] '02000200000002000000' 15:17:42 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0xfffffffe}, 0x1c) 15:17:42 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:42 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:43 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:43 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"9f934d12cf26649aef94d7259897bf3b964c9c970a0efedfc60f346eef4e4af5ac556e850f20f836adb639676eb2bf4068136e3552e77780d34caf4481379aeb619538594a4c8d77a270504e665b4b12156ce2fda7ecc94d8aa5370190cbd12b40967707d4cfb7e70412881d0f2b4addaf3256de13807ceae71556b894ab72dd57d0778e094fdd7c383753f981fe031d26d91974951651079cca617094710d14934fa1d707fe761a15b794778aed86266fe413d2f30ce71be35f6d482e1771f84ea8caa76857cef75a249b7345f02e58bd84a45e5f198265b06441f79c10dca0eaa54aa6435652055018604a409212c89a8602c15f59efc2b455db02f4d2177b7d9e791fa69b1af4b7504ba7a15c38008844d81e4bc707029ebddcfc41778aec71e131e27879dd4d34aed80d85b7ec5dd08f9b33a46f060437b5717bb5444f404603249fa53a2a0ab2771e26859076ba9d895a01a802cdb55de7436c09d82a243fd70d91a5d3b7373d8b0a91fc20a00ceab3c863b7be3de628db2781e73b605443f08d7195e7debd5ca80ce9ded0dafc71d46197acad26bcb4579b2042d0c407724ceea5e0d66397838714ba4f5d8799de73f55e8cf2734d84f5fa59679638e453a58e5a1acd782fad4eb9c47dd9cbb097a9213d6b27d8175ac7963a184a67d07ebeefa41efc2a37884e277e60911804f64ec8eef1f953466220f40c2d379515d07416f751427ed0b5cdf7a5085b496b1b35111b7a8404eb9171096bfab03fffbf7708b9251a2e1ef0894272520f62d2030285c885e21f70a0fa42298027ec4baf236e9adc37889d7b64e3569313ad0a1a3772365fedde74981ff6300b7efd164eea9b2a280d9cbc4a350ddb03c913c071dc6e189fa4b37d4771f9fadf46154d615839d784b0f5ea9d62439534a67cc968b225df590d67b2090bed8e2179bc3b92a92eabe43924c92d05a5027b8ee2da7355499691aa23ee3cbb89a5862089c82f557bc92d43da78600d120984b174e717a984a1da96b7604404074e6ff0b623800f372a8c49a4104eaec117381c678eaa973385bb6f04c602e9bebcef6da5ab549825cfed671369fdf6987ff9b45d04f9e3460a04395e622f231626bd7a549813e6dd7972497b5e0f2de54e5b2808fc8364d568d3a880df823180df822fb04c774da9c91fd7e87088014583bb92f087d1b1e5cdf3cbf93cf25766d728ab8f2ba8935719d279e296c5e4c7988d447f865b2608e6f12f0f3a7927314e538eb685a1a2bee7917cf1e72b1f7e7fb2cba4e5dcfd8cdd478bb52d9f0fddf8d984e7c3cc8c52cb1a84181a2a2732721e973359c4edabd7aeb2ef82b07071afdaa5b322b281e6ef6949e16079474c86c5272d737cf7b933886a2a0354878efa45e506b7d7a41b1a88b953130951ede61f4aec28f7e1a7e4d8b2065867eace04e8fd23da"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1108.858206] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:44 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0xe00}, 0x1c) [ 1109.149296] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:44 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0x240}, 0x1c) 15:17:45 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) 15:17:45 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000700)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) r3 = getegid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000004c0)=0x0) r5 = geteuid() r6 = getegid() r7 = getpid() lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000012c0)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000001280)='\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000001400)=0xe8) getgroups(0x2, &(0x7f0000001440)=[0x0, 0x0]) sendmmsg$unix(r0, &(0x7f00000014c0)=[{&(0x7f0000000380)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000280)=[{&(0x7f00000000c0)='{q', 0x2}], 0x1, &(0x7f0000000dc0)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}], 0xe0, 0x4}, {&(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000900)="31e67ba243f722089a1e3e367d78b357b63c12fbd9439f64bb3838b169ca40903de50d2de77a4d099328998380267f5b681f38a306d02b831770ec52f49bb37b87bf0780e9f40a5bf30e3c4a5d1ee073ef80baf3a75ee2a41bf3040eecaab7484fa51e2f61667b9dd58ea74c6e81cd3a6ae6110b3dc42fb3944ca2e1977b8f22d599454fccc93e6b8cfabda11d2f", 0x8e}, {&(0x7f0000000ec0)="361837bd93f261b38c33bba8e43721b39cce93864184431cce3833eebe1a436bd05eae04fc0c78d2d46781cdce5a273041189ce617414a0cc27d7d45ae50ceee80d662cc682d3f71dca00f2acc7697f014feadaa79b8340cc8b41a77f877a2405193f145bd022ddf27d92ac57e0c8b628237842cbbe9594bc4df96a808d104b899ffae12212c2f037042c7f0ac445e5274c1dacd3a136d8b69d0c43f71215c6253", 0xa1}], 0x2, &(0x7f0000000680)=[@cred={0x20, 0x1, 0x2, r7, r8, r9}], 0x20, 0x20040000}, {&(0x7f0000001080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001240)=[{&(0x7f0000001100)="69dfbc8a97e0a9b2c14f9d6bc23a6099b9c9fd071e03898e42cdce8291b7672d3678ee3bde555992842658de591897d6dcd5f060d9b57a3be2471f0d1af1d4727cb42a9408cf12bb5c99b50d85a3e627dbc1f9c8ca639245205f78d7ca32f575dc7e86c6c7c14b7b4971b8c1e6db1d2782d45922c08ab3dac055132923b1cc40820d173276c8b1bdb0f9f04afd3977a48557b9c6430df90d03f8ec", 0x9b}, {&(0x7f00000011c0)="271809ef467bb82f9c8c20905bb93e11ef222d96baa5c5ed55ca2555bcea53b710fc58da1ceef64cc145768d5d4e0a27efb492ae681abd4763d6d86c9f9ccd5e99d1", 0x42}], 0x2, &(0x7f0000001480)=[@cred={0x20, 0x1, 0x2, r10, r11, r12}], 0x20, 0x4000804}], 0x3, 0x381dc5b152da083f) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r13 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r14 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r14, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r13) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() 15:17:45 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:45 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() [ 1110.149755] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:45 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1110.464698] FS-Cache: Duplicate cookie detected [ 1110.469781] FS-Cache: O-cookie c=00000000a9777126 [p=0000000006530c1d fl=222 nc=0 na=1] [ 1110.478006] FS-Cache: O-cookie d=000000005656d7eb n=00000000cfd47edb [ 1110.484519] FS-Cache: O-key=[10] '02000200000002000000' [ 1110.489980] FS-Cache: N-cookie c=00000000563f2a43 [p=0000000006530c1d fl=2 nc=0 na=1] [ 1110.498008] FS-Cache: N-cookie d=000000005656d7eb n=000000009cf26932 [ 1110.504524] FS-Cache: N-key=[10] '02000200000002000000' 15:17:46 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) 15:17:46 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0xfec00000}, 0x1c) 15:17:46 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000700)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) r3 = getegid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000004c0)=0x0) r5 = geteuid() r6 = getegid() r7 = getpid() lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000012c0)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000001280)='\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000001400)=0xe8) getgroups(0x2, &(0x7f0000001440)=[0x0, 0x0]) sendmmsg$unix(r0, &(0x7f00000014c0)=[{&(0x7f0000000380)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000280)=[{&(0x7f00000000c0)='{q', 0x2}], 0x1, &(0x7f0000000dc0)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}], 0xe0, 0x4}, {&(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000900)="31e67ba243f722089a1e3e367d78b357b63c12fbd9439f64bb3838b169ca40903de50d2de77a4d099328998380267f5b681f38a306d02b831770ec52f49bb37b87bf0780e9f40a5bf30e3c4a5d1ee073ef80baf3a75ee2a41bf3040eecaab7484fa51e2f61667b9dd58ea74c6e81cd3a6ae6110b3dc42fb3944ca2e1977b8f22d599454fccc93e6b8cfabda11d2f", 0x8e}, {&(0x7f0000000ec0)="361837bd93f261b38c33bba8e43721b39cce93864184431cce3833eebe1a436bd05eae04fc0c78d2d46781cdce5a273041189ce617414a0cc27d7d45ae50ceee80d662cc682d3f71dca00f2acc7697f014feadaa79b8340cc8b41a77f877a2405193f145bd022ddf27d92ac57e0c8b628237842cbbe9594bc4df96a808d104b899ffae12212c2f037042c7f0ac445e5274c1dacd3a136d8b69d0c43f71215c6253", 0xa1}], 0x2, &(0x7f0000000680)=[@cred={0x20, 0x1, 0x2, r7, r8, r9}], 0x20, 0x20040000}, {&(0x7f0000001080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001240)=[{&(0x7f0000001100)="69dfbc8a97e0a9b2c14f9d6bc23a6099b9c9fd071e03898e42cdce8291b7672d3678ee3bde555992842658de591897d6dcd5f060d9b57a3be2471f0d1af1d4727cb42a9408cf12bb5c99b50d85a3e627dbc1f9c8ca639245205f78d7ca32f575dc7e86c6c7c14b7b4971b8c1e6db1d2782d45922c08ab3dac055132923b1cc40820d173276c8b1bdb0f9f04afd3977a48557b9c6430df90d03f8ec", 0x9b}, {&(0x7f00000011c0)="271809ef467bb82f9c8c20905bb93e11ef222d96baa5c5ed55ca2555bcea53b710fc58da1ceef64cc145768d5d4e0a27efb492ae681abd4763d6d86c9f9ccd5e99d1", 0x42}], 0x2, &(0x7f0000001480)=[@cred={0x20, 0x1, 0x2, r10, r11, r12}], 0x20, 0x4000804}], 0x3, 0x381dc5b152da083f) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r13 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r14 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r14, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r13) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() [ 1111.658603] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:47 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:47 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:47 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:47 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:47 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0xf401}, 0x1c) 15:17:47 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f984dd81be76070321e3b8e0970861c98d83ae6b47ddf0ab"], 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000700)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) r3 = getegid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000004c0)=0x0) r5 = geteuid() r6 = getegid() r7 = getpid() lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000012c0)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000001280)='\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000001400)=0xe8) getgroups(0x2, &(0x7f0000001440)=[0x0, 0x0]) sendmmsg$unix(r0, &(0x7f00000014c0)=[{&(0x7f0000000380)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000280)=[{&(0x7f00000000c0)='{q', 0x2}], 0x1, &(0x7f0000000dc0)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}], 0xe0, 0x4}, {&(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000900)="31e67ba243f722089a1e3e367d78b357b63c12fbd9439f64bb3838b169ca40903de50d2de77a4d099328998380267f5b681f38a306d02b831770ec52f49bb37b87bf0780e9f40a5bf30e3c4a5d1ee073ef80baf3a75ee2a41bf3040eecaab7484fa51e2f61667b9dd58ea74c6e81cd3a6ae6110b3dc42fb3944ca2e1977b8f22d599454fccc93e6b8cfabda11d2f", 0x8e}, {&(0x7f0000000ec0)="361837bd93f261b38c33bba8e43721b39cce93864184431cce3833eebe1a436bd05eae04fc0c78d2d46781cdce5a273041189ce617414a0cc27d7d45ae50ceee80d662cc682d3f71dca00f2acc7697f014feadaa79b8340cc8b41a77f877a2405193f145bd022ddf27d92ac57e0c8b628237842cbbe9594bc4df96a808d104b899ffae12212c2f037042c7f0ac445e5274c1dacd3a136d8b69d0c43f71215c6253", 0xa1}], 0x2, &(0x7f0000000680)=[@cred={0x20, 0x1, 0x2, r7, r8, r9}], 0x20, 0x20040000}, {&(0x7f0000001080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001240)=[{&(0x7f0000001100)="69dfbc8a97e0a9b2c14f9d6bc23a6099b9c9fd071e03898e42cdce8291b7672d3678ee3bde555992842658de591897d6dcd5f060d9b57a3be2471f0d1af1d4727cb42a9408cf12bb5c99b50d85a3e627dbc1f9c8ca639245205f78d7ca32f575dc7e86c6c7c14b7b4971b8c1e6db1d2782d45922c08ab3dac055132923b1cc40820d173276c8b1bdb0f9f04afd3977a48557b9c6430df90d03f8ec", 0x9b}, {&(0x7f00000011c0)="271809ef467bb82f9c8c20905bb93e11ef222d96baa5c5ed55ca2555bcea53b710fc58da1ceef64cc145768d5d4e0a27efb492ae681abd4763d6d86c9f9ccd5e99d1", 0x42}], 0x2, &(0x7f0000001480)=[@cred={0x20, 0x1, 0x2, r10, r11, r12}], 0x20, 0x4000804}], 0x3, 0x381dc5b152da083f) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r13 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) r14 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(r14, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r13) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) getpid() [ 1112.267419] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:47 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:47 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:17:47 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:47 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0xffffff91}, 0x1c) [ 1112.667240] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:48 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0xfc}, 0x1c) 15:17:48 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1113.099456] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:48 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0xa00000000000000}, 0x1c) [ 1113.427489] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:49 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0x6000000}, 0x1c) 15:17:49 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1113.758933] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:17:49 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:49 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0xfe80}, 0x1c) 15:17:50 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) [ 1115.798668] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1115.901583] syz-executor5 (1510) used greatest stack depth: 2552 bytes left 15:17:51 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:52 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000880)=ANY=[@ANYBLOB="fc2124edcfd90449479d1b67a6ba6b92ec8a63d33aef9edf3495c382a910a2dc1536ef26ff29f1b7f07e0becc399f9"], 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) 15:17:52 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x1, &(0x7f0000000080)=0x8, 0x4) connect$inet6(r2, &(0x7f00001cd000)={0xa, 0x8000000004e22, 0x0, @ipv4, 0x3e8}, 0x1c) 15:17:52 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:52 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000009c0)={"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"}) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) memfd_create(&(0x7f00000001c0)='\x00', 0x6) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0600", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() 15:17:52 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x101, 0x2, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000800)={0x0, 0x73e}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x6) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="06", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000002c0), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1118.096717] Kernel panic - not syncing: corrupted stack end detected inside scheduler [ 1118.106241] CPU: 0 PID: 11627 Comm: kworker/u4:8 Not tainted 4.20.0-rc6-next-20181214+ #171 [ 1118.114739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.124107] Workqueue: writeback wb_workfn (flush-8:0) [ 1118.129387] Call Trace: [ 1118.131988] dump_stack+0x244/0x39d [ 1118.135652] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1118.140847] panic+0x2ad/0x632 [ 1118.144054] ? add_taint.cold.5+0x16/0x16 [ 1118.148208] ? debug_smp_processor_id+0x1c/0x20 [ 1118.152876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.158416] ? check_preemption_disabled+0x48/0x280 [ 1118.163423] ? check_preemption_disabled+0x3a/0x280 [ 1118.168445] __schedule+0x21d7/0x21e0 [ 1118.172237] ? find_held_lock+0x36/0x1c0 [ 1118.176310] ? __sched_text_start+0x8/0x8 [ 1118.180471] ? graph_lock+0x270/0x270 [ 1118.184291] ? print_usage_bug+0xc0/0xc0 [ 1118.188397] ? find_held_lock+0x36/0x1c0 [ 1118.192462] ? mark_held_locks+0xc7/0x130 [ 1118.196600] schedule+0xef/0x370 [ 1118.199956] ? __schedule+0x21e0/0x21e0 [ 1118.203924] ? rwsem_down_read_failed+0x342/0x710 [ 1118.208775] ? trace_hardirqs_off_caller+0x310/0x310 [ 1118.213881] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 1118.218907] rwsem_down_read_failed+0x371/0x710 [ 1118.223593] ? rwsem_down_write_failed_killable+0x10/0x10 [ 1118.229146] ? count_shadow_nodes+0x670/0x670 [ 1118.233632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.239174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.244711] ? check_preemption_disabled+0x48/0x280 [ 1118.249723] ? __lock_is_held+0xb5/0x140 [ 1118.253789] ? lock_acquire+0x1ed/0x520 [ 1118.257764] ? rmap_walk_file+0xa7e/0x1190 [ 1118.262009] ? lock_release+0xa00/0xa00 [ 1118.265984] ? perf_trace_sched_process_exec+0x860/0x860 [ 1118.271462] call_rwsem_down_read_failed+0x18/0x30 [ 1118.276414] down_read+0x9b/0x120 [ 1118.279865] ? rmap_walk_file+0xa7e/0x1190 [ 1118.284112] ? __down_interruptible+0x700/0x700 [ 1118.288797] ? find_held_lock+0x36/0x1c0 [ 1118.292853] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1118.298384] rmap_walk_file+0xa7e/0x1190 [ 1118.302441] ? __lock_acquire+0x62f/0x4c20 [ 1118.306684] ? rmap_walk_anon+0xf70/0xf70 [ 1118.310833] ? trace_hardirqs_on+0xbd/0x310 [ 1118.315146] ? kasan_check_read+0x11/0x20 [ 1118.319282] ? __remove_mapping+0x932/0x1af0 [ 1118.323692] ? trace_hardirqs_off_caller+0x310/0x310 [ 1118.328806] ? mark_held_locks+0x130/0x130 [ 1118.333043] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1118.338134] ? __remove_mapping+0xb19/0x1af0 [ 1118.342532] ? kasan_check_read+0x11/0x20 [ 1118.346677] ? total_mapcount+0x2c8/0x940 [ 1118.350843] ? vma_adjust_trans_huge+0x310/0x310 [ 1118.355603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.361136] ? page_mapped+0x366/0x810 [ 1118.365029] ? mark_held_locks+0xc7/0x130 [ 1118.369188] ? page_mapping+0xa50/0xa50 [ 1118.373171] ? free_unref_page_list+0xd1b/0x11e0 [ 1118.377933] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1118.382516] ? rmap_walk+0x231/0x350 [ 1118.386219] ? graph_lock+0x270/0x270 [ 1118.390028] rmap_walk+0x22c/0x350 [ 1118.393587] ? page_get_anon_vma+0x6d0/0x6d0 [ 1118.398001] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1118.403527] ? page_rmapping+0xd9/0x160 [ 1118.407490] ? vm_mmap+0xc0/0xc0 [ 1118.410864] page_referenced+0x7d1/0xaa0 [ 1118.414920] ? rmap_walk+0x350/0x350 [ 1118.418620] ? kasan_check_read+0x11/0x20 [ 1118.422773] ? rcu_read_unlock_special+0x370/0x370 [ 1118.427710] ? page_mapcount_is_zero+0x30/0x30 [ 1118.432281] ? __anon_vma_prepare+0x6c0/0x6c0 [ 1118.436780] ? page_evictable+0x305/0x540 [ 1118.440928] ? kswapd_stop+0x100/0x100 [ 1118.444815] ? perf_trace_sched_process_exec+0x860/0x860 [ 1118.450323] ? __remove_mapping+0x1f/0x1af0 [ 1118.454673] shrink_page_list+0x32b2/0xcb50 [ 1118.459000] ? page_evictable+0x540/0x540 [ 1118.463147] ? rb_erase_cached+0xc78/0x3720 [ 1118.467462] ? rb_next+0x140/0x140 [ 1118.471053] ? rb_erase_cached+0xc78/0x3720 [ 1118.475383] ? rb_erase_cached+0xc78/0x3720 [ 1118.479695] ? rb_erase_cached+0xc78/0x3720 [ 1118.484003] ? rb_next+0x140/0x140 [ 1118.487546] ? rb_next+0x140/0x140 [ 1118.491087] ? rb_next+0x140/0x140 [ 1118.494635] ? rb_erase_cached+0xc78/0x3720 [ 1118.498961] ? rb_next+0x140/0x140 [ 1118.502525] ? rb_erase_cached+0xc78/0x3720 [ 1118.506864] ? rb_erase_cached+0xc78/0x3720 [ 1118.511207] ? rb_next+0x140/0x140 [ 1118.514759] ? graph_lock+0x270/0x270 [ 1118.518570] ? graph_lock+0x270/0x270 [ 1118.522375] ? graph_lock+0x270/0x270 [ 1118.526177] ? __update_load_avg_blocked_se+0x690/0x690 [ 1118.531541] ? __update_load_avg_blocked_se+0x690/0x690 [ 1118.536891] ? graph_lock+0x270/0x270 [ 1118.540701] ? __update_load_avg_se+0xae0/0xae0 [ 1118.545370] ? __lock_is_held+0xb5/0x140 [ 1118.549426] ? graph_lock+0x270/0x270 [ 1118.553251] ? update_load_avg+0x387/0x2470 [ 1118.557569] ? __update_load_avg_blocked_se+0x690/0x690 [ 1118.562936] ? attach_entity_load_avg+0x860/0x860 [ 1118.567796] ? update_load_avg+0x387/0x2470 [ 1118.572117] ? attach_entity_load_avg+0x860/0x860 [ 1118.576948] ? attach_entity_load_avg+0x860/0x860 [ 1118.581787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.587345] ? attach_entity_load_avg+0x860/0x860 [ 1118.592200] ? __update_load_avg_se+0xae0/0xae0 [ 1118.596865] ? graph_lock+0x270/0x270 [ 1118.600657] ? rb_erase+0x3710/0x3710 [ 1118.604466] ? rb_erase+0x3710/0x3710 [ 1118.608276] ? attach_entity_load_avg+0x860/0x860 [ 1118.613130] ? update_load_avg+0x387/0x2470 [ 1118.617445] ? graph_lock+0x270/0x270 [ 1118.621236] ? print_usage_bug+0xc0/0xc0 [ 1118.625286] ? graph_lock+0x270/0x270 [ 1118.629085] ? print_usage_bug+0xc0/0xc0 [ 1118.633144] ? graph_lock+0x270/0x270 [ 1118.636945] ? graph_lock+0x270/0x270 [ 1118.640759] ? __lock_is_held+0xb5/0x140 [ 1118.644821] ? graph_lock+0x270/0x270 [ 1118.648623] ? __lock_is_held+0xb5/0x140 [ 1118.652684] ? __lock_acquire+0x62f/0x4c20 [ 1118.656921] ? __lock_is_held+0xb5/0x140 [ 1118.660984] ? mark_held_locks+0x130/0x130 [ 1118.665211] ? set_next_entity+0x493/0xc70 [ 1118.669435] ? __lock_acquire+0x62f/0x4c20 [ 1118.673664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.679204] ? update_load_avg+0x2470/0x2470 [ 1118.683612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.689150] ? check_preemption_disabled+0x48/0x280 [ 1118.694196] ? check_preemption_disabled+0x48/0x280 [ 1118.699214] ? debug_smp_processor_id+0x1c/0x20 [ 1118.703878] ? perf_trace_lock+0x14d/0x7a0 [ 1118.708103] ? __perf_event_task_sched_out+0x33a/0x1ca0 [ 1118.713474] ? lock_is_held_type+0x210/0x210 [ 1118.717889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.723432] ? print_usage_bug+0xc0/0xc0 [ 1118.727481] ? print_usage_bug+0xc0/0xc0 [ 1118.731535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.737075] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 1118.742305] ? find_held_lock+0x36/0x1c0 [ 1118.746393] ? __lock_acquire+0x62f/0x4c20 [ 1118.750618] ? mark_held_locks+0xc7/0x130 [ 1118.754760] ? _raw_spin_unlock_irq+0x27/0x80 [ 1118.759242] ? _raw_spin_unlock_irq+0x27/0x80 [ 1118.763750] ? mark_held_locks+0x130/0x130 [ 1118.767989] ? compat_start_thread+0x80/0x80 [ 1118.772403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.777961] ? _raw_spin_unlock_irq+0x60/0x80 [ 1118.782471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.788027] ? check_preemption_disabled+0x48/0x280 [ 1118.793047] ? __switch_to_asm+0x34/0x70 [ 1118.797109] ? debug_smp_processor_id+0x1c/0x20 [ 1118.801778] ? rb_erase_cached+0xc78/0x3720 [ 1118.806111] ? rb_next+0x140/0x140 [ 1118.809658] ? __schedule+0xa49/0x21e0 [ 1118.813560] ? retint_kernel+0x2d/0x2d [ 1118.817449] ? graph_lock+0x270/0x270 [ 1118.821253] ? rb_erase_cached+0xc78/0x3720 [ 1118.825592] ? rb_next+0x140/0x140 [ 1118.829162] ? find_held_lock+0x36/0x1c0 [ 1118.833237] ? page_vma_mapped_walk+0x2ec/0x27c0 [ 1118.837993] ? lock_downgrade+0x900/0x900 [ 1118.842179] ? kasan_check_read+0x11/0x20 [ 1118.846344] ? do_raw_spin_unlock+0xa7/0x330 [ 1118.850741] ? do_raw_spin_trylock+0x270/0x270 [ 1118.855349] ? print_usage_bug+0xc0/0xc0 [ 1118.859425] ? rb_erase_cached+0xc78/0x3720 [ 1118.863740] ? rb_next+0x140/0x140 [ 1118.867278] ? __lock_acquire+0x62f/0x4c20 [ 1118.871510] ? graph_lock+0x270/0x270 [ 1118.875347] ? mark_held_locks+0xc7/0x130 [ 1118.879498] ? graph_lock+0x270/0x270 [ 1118.883299] ? __update_load_avg_blocked_se+0x690/0x690 [ 1118.888663] ? __update_load_avg_se+0xae0/0xae0 [ 1118.893341] ? graph_lock+0x270/0x270 [ 1118.897153] ? update_load_avg+0x387/0x2470 [ 1118.901485] ? attach_entity_load_avg+0x860/0x860 [ 1118.906363] ? update_load_avg+0x387/0x2470 [ 1118.910725] ? debug_smp_processor_id+0x1c/0x20 [ 1118.915397] ? perf_trace_lock+0x14d/0x7a0 [ 1118.919616] ? update_load_avg+0x387/0x2470 [ 1118.923936] ? attach_entity_load_avg+0x860/0x860 [ 1118.928800] ? __lock_acquire+0x62f/0x4c20 [ 1118.933052] ? graph_lock+0x270/0x270 [ 1118.936866] ? rb_erase+0x3710/0x3710 [ 1118.940665] ? find_held_lock+0x36/0x1c0 [ 1118.944724] ? __update_load_avg_blocked_se+0x690/0x690 [ 1118.950077] ? __update_load_avg_se+0xae0/0xae0 [ 1118.954731] ? graph_lock+0x270/0x270 [ 1118.958528] ? update_load_avg+0x387/0x2470 [ 1118.962854] ? attach_entity_load_avg+0x860/0x860 [ 1118.967703] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1118.973265] ? __isolate_lru_page+0xd05/0x1540 [ 1118.977863] ? putback_lru_page+0x280/0x280 [ 1118.982187] ? attach_entity_load_avg+0x860/0x860 [ 1118.987028] ? __lock_acquire+0x62f/0x4c20 [ 1118.991272] ? __lock_is_held+0xb5/0x140 [ 1118.995354] ? __account_cfs_rq_runtime+0x790/0x790 [ 1119.000366] ? rb_erase+0x3710/0x3710 [ 1119.004161] ? __lock_acquire+0x62f/0x4c20 [ 1119.008383] ? __lock_acquire+0x62f/0x4c20 [ 1119.012609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.018135] ? update_load_avg+0x2470/0x2470 [ 1119.022542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.028101] ? mark_held_locks+0x130/0x130 [ 1119.032351] ? __perf_event_task_sched_out+0x33a/0x1ca0 [ 1119.037718] ? graph_lock+0x270/0x270 [ 1119.041529] ? graph_lock+0x270/0x270 [ 1119.045362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.050936] ? check_preemption_disabled+0x48/0x280 [ 1119.055955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.061488] ? check_preemption_disabled+0x48/0x280 [ 1119.066494] ? __lock_is_held+0xb5/0x140 [ 1119.070549] ? __this_cpu_preempt_check+0x1c/0x20 [ 1119.075399] ? __mod_zone_page_state+0x8a/0xf0 [ 1119.079983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.085517] ? isolate_lru_pages.isra.57+0xc7d/0x19e0 [ 1119.090720] ? __isolate_lru_page+0x1540/0x1540 [ 1119.095386] ? __lock_acquire+0x62f/0x4c20 [ 1119.099639] ? mark_held_locks+0x130/0x130 [ 1119.103892] ? mark_held_locks+0x130/0x130 [ 1119.108135] ? print_usage_bug+0xc0/0xc0 [ 1119.112204] ? print_usage_bug+0xc0/0xc0 [ 1119.116269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.121795] ? check_preemption_disabled+0x48/0x280 [ 1119.126840] ? debug_smp_processor_id+0x1c/0x20 [ 1119.131512] ? perf_trace_lock+0x14d/0x7a0 [ 1119.135746] ? perf_trace_lock+0x14d/0x7a0 [ 1119.139982] ? lock_is_held_type+0x210/0x210 [ 1119.144389] ? __lock_acquire+0x62f/0x4c20 [ 1119.148622] ? mark_held_locks+0x130/0x130 [ 1119.152856] ? perf_trace_lock+0x14d/0x7a0 [ 1119.157101] ? graph_lock+0x270/0x270 [ 1119.160902] ? __lock_acquire+0x62f/0x4c20 [ 1119.165168] ? graph_lock+0x270/0x270 [ 1119.168996] ? print_usage_bug+0xc0/0xc0 [ 1119.173057] ? mark_held_locks+0x130/0x130 [ 1119.177282] ? check_preemption_disabled+0x48/0x280 [ 1119.182326] ? find_held_lock+0x36/0x1c0 [ 1119.186414] ? mark_held_locks+0xc7/0x130 [ 1119.190567] ? _raw_spin_unlock_irq+0x27/0x80 [ 1119.195052] ? _raw_spin_unlock_irq+0x27/0x80 [ 1119.199535] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1119.204106] ? trace_hardirqs_on+0xbd/0x310 [ 1119.208426] ? kasan_check_read+0x11/0x20 [ 1119.212575] ? trace_hardirqs_off_caller+0x310/0x310 [ 1119.217679] ? trace_hardirqs_on+0x310/0x310 [ 1119.222080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.227617] ? check_preemption_disabled+0x48/0x280 [ 1119.232640] shrink_inactive_list+0x77b/0x1c60 [ 1119.237239] ? putback_inactive_pages+0x27e0/0x27e0 [ 1119.242260] ? lruvec_lru_size+0x2ef/0x540 [ 1119.246573] ? blk_lld_busy+0xa0/0xa0 [ 1119.250368] ? kasan_check_read+0x11/0x20 [ 1119.254510] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1119.259778] ? rcu_read_unlock_special+0x370/0x370 [ 1119.264702] shrink_node_memcg+0x7a8/0x19a0 [ 1119.269020] ? shrink_active_list+0x22b0/0x22b0 [ 1119.273679] ? mem_cgroup_protected+0xdb/0xa60 [ 1119.278258] ? shrink_slab+0xfa/0x8c0 [ 1119.282063] ? mem_cgroup_from_id+0x30/0x30 [ 1119.286379] ? unregister_memcg_shrinker.isra.42+0x50/0x50 [ 1119.291993] ? lock_is_held_type+0x210/0x210 [ 1119.296415] ? graph_lock+0x270/0x270 [ 1119.300217] ? print_usage_bug+0xc0/0xc0 [ 1119.304277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.309831] shrink_node+0x3e1/0x17f0 [ 1119.313642] ? shrink_node_memcg+0x19a0/0x19a0 [ 1119.318214] ? __delayacct_freepages_start+0x41/0x80 [ 1119.323308] ? trace_hardirqs_off_caller+0x310/0x310 [ 1119.328420] ? kvm_clock_read+0x18/0x30 [ 1119.332407] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1119.337427] ? ktime_get+0x2c1/0x400 [ 1119.341133] ? ktime_get_raw_ts64+0x4d0/0x4d0 [ 1119.345638] ? debug_smp_processor_id+0x1c/0x20 [ 1119.350308] ? perf_trace_lock+0x14d/0x7a0 [ 1119.354558] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1119.360107] ? __cpuset_node_allowed+0x19b/0x660 [ 1119.364877] ? cpuset_nodemask_valid_mems_allowed+0x90/0x90 [ 1119.370599] ? debug_smp_processor_id+0x1c/0x20 [ 1119.375276] do_try_to_free_pages+0x3e7/0x12a0 [ 1119.379846] ? graph_lock+0x270/0x270 [ 1119.383663] ? shrink_node+0x17f0/0x17f0 [ 1119.387727] ? __lock_is_held+0xb5/0x140 [ 1119.391806] try_to_free_pages+0x4d0/0xb90 [ 1119.396060] ? do_try_to_free_pages+0x12a0/0x12a0 [ 1119.400897] ? kasan_check_read+0x11/0x20 [ 1119.405041] ? psi_memstall_enter+0x24f/0x2c0 [ 1119.409525] ? trace_hardirqs_off_caller+0x310/0x310 [ 1119.414620] ? lock_pin_lock+0x350/0x350 [ 1119.418697] ? _raw_spin_unlock_irq+0x60/0x80 [ 1119.423194] ? psi_memstall_enter+0x24f/0x2c0 [ 1119.427701] ? psi_memstall_tick+0x230/0x230 [ 1119.432102] ? trace_hardirqs_off+0xb8/0x310 [ 1119.436517] __alloc_pages_slowpath+0xa5a/0x2dc0 [ 1119.441281] ? __alloc_pages_slowpath+0x2629/0x2dc0 [ 1119.446329] ? warn_alloc+0x120/0x120 [ 1119.450149] ? warn_alloc+0x120/0x120 [ 1119.453952] ? print_usage_bug+0xc0/0xc0 [ 1119.458014] ? warn_alloc+0x120/0x120 [ 1119.461802] ? print_usage_bug+0xc0/0xc0 [ 1119.465857] ? print_usage_bug+0xc0/0xc0 [ 1119.469910] ? __lock_acquire+0x62f/0x4c20 [ 1119.474143] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1119.479671] ? should_fail+0x22d/0xd01 [ 1119.483552] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1119.488645] ? __lock_acquire+0x62f/0x4c20 [ 1119.492885] ? graph_lock+0x270/0x270 [ 1119.496690] ? mark_held_locks+0x130/0x130 [ 1119.500917] ? __lock_is_held+0xb5/0x140 [ 1119.504982] ? graph_lock+0x270/0x270 [ 1119.508807] ? perf_trace_sched_process_exec+0x860/0x860 [ 1119.514247] ? check_preemption_disabled+0x48/0x280 [ 1119.519275] ? __might_sleep+0x95/0x190 [ 1119.523260] __alloc_pages_nodemask+0xaed/0xec0 [ 1119.527940] ? graph_lock+0x270/0x270 [ 1119.531755] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 1119.536771] ? mark_held_locks+0xc7/0x130 [ 1119.540928] ? cache_grow_begin+0x65/0x8c0 [ 1119.545169] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1119.549749] ? trace_hardirqs_on+0xbd/0x310 [ 1119.554072] ? fallback_alloc+0x204/0x2e0 [ 1119.558220] ? trace_hardirqs_off_caller+0x310/0x310 [ 1119.563342] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1119.568874] cache_grow_begin+0xa5/0x8c0 [ 1119.572937] ? do_raw_spin_unlock+0xa7/0x330 [ 1119.577357] fallback_alloc+0x204/0x2e0 [ 1119.581353] ____cache_alloc_node+0x1c7/0x1e0 [ 1119.585854] kmem_cache_alloc+0x1f6/0x730 [ 1119.590008] ? mempool_free+0x370/0x370 [ 1119.593990] mempool_alloc_slab+0x44/0x60 [ 1119.598139] mempool_alloc+0x193/0x4a0 [ 1119.602035] ? mempool_destroy+0x30/0x30 [ 1119.606108] ? kasan_check_write+0x14/0x20 [ 1119.610361] ? bio_init+0x139/0x260 [ 1119.613980] ? bio_add_page+0x120/0x120 [ 1119.617954] ? kasan_check_read+0x11/0x20 [ 1119.622105] bvec_alloc+0x12a/0x2d0 [ 1119.625736] bio_alloc_bioset+0x46e/0x6f0 [ 1119.629886] ? bvec_alloc+0x2d0/0x2d0 [ 1119.633683] ? balance_dirty_pages_ratelimited+0x23c0/0x23c0 [ 1119.639526] ext4_bio_write_page+0x1316/0x1c4d [ 1119.644123] ? ext4_io_submit_init+0x90/0x90 [ 1119.648546] ? graph_lock+0x270/0x270 [ 1119.652370] ? __read_once_size_nocheck.constprop.8+0x10/0x10 [ 1119.658252] ? __lock_acquire+0x62f/0x4c20 [ 1119.662501] ? __lock_is_held+0xb5/0x140 [ 1119.666568] ? ping_get_first.isra.14+0x358/0x3d0 [ 1119.671465] mpage_submit_page+0x15e/0x270 [ 1119.675697] mpage_process_page_bufs+0x50a/0x600 [ 1119.680467] mpage_prepare_extent_to_map+0xea5/0x19c0 [ 1119.685681] ? ext4_block_write_begin+0x1880/0x1880 [ 1119.690704] ? save_stack+0x43/0xd0 [ 1119.694348] ? kasan_slab_alloc+0x12/0x20 [ 1119.698506] ? kmem_cache_alloc+0x130/0x730 [ 1119.702826] ? ext4_init_io_end+0x96/0x220 [ 1119.707059] ? ext4_writepages+0x13e0/0x41b0 [ 1119.711455] ? do_writepages+0x9a/0x1a0 [ 1119.715421] ? __writeback_single_inode+0x20a/0x1660 [ 1119.720512] ? writeback_sb_inodes+0x71f/0x1210 [ 1119.725169] ? wb_writeback+0xa73/0xfc0 [ 1119.729128] ? wb_workfn+0xee9/0x1790 [ 1119.732928] ? process_one_work+0xc90/0x1c40 [ 1119.737362] ? worker_thread+0x17f/0x1390 [ 1119.741520] ? kthread+0x35a/0x440 [ 1119.745060] ? ret_from_fork+0x3a/0x50 [ 1119.748969] ? find_held_lock+0x36/0x1c0 [ 1119.753057] ? graph_lock+0x270/0x270 [ 1119.756853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.762389] ? check_preemption_disabled+0x48/0x280 [ 1119.767434] ? ext4_init_io_end+0x96/0x220 [ 1119.771859] ? __lock_is_held+0xb5/0x140 [ 1119.775914] ? ext4_init_io_end+0x96/0x220 [ 1119.780142] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1119.785150] ? kmem_cache_alloc+0x33f/0x730 [ 1119.789480] ? ext4_release_io_end+0x1b1/0x250 [ 1119.794077] ? kmem_cache_free+0x24f/0x290 [ 1119.798332] ? ext4_put_io_end+0x97/0x2e0 [ 1119.802478] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1119.808022] ext4_writepages+0x1413/0x41b0 [ 1119.812258] ? __might_sleep+0x95/0x190 [ 1119.816252] ? ext4_mark_inode_dirty+0xb20/0xb20 [ 1119.821007] ? print_usage_bug+0xc0/0xc0 [ 1119.825059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.830613] ? check_preemption_disabled+0x48/0x280 [ 1119.835683] ? __lock_acquire+0x62f/0x4c20 [ 1119.839912] ? print_usage_bug+0xc0/0xc0 [ 1119.843961] ? perf_trace_lock+0x14d/0x7a0 [ 1119.848200] ? __lock_acquire+0x62f/0x4c20 [ 1119.852422] ? mark_held_locks+0x130/0x130 [ 1119.856644] ? __ext4_get_inode_loc+0x470/0x1330 [ 1119.861408] ? mark_held_locks+0x130/0x130 [ 1119.865641] ? check_preemption_disabled+0x48/0x280 [ 1119.870645] ? graph_lock+0x270/0x270 [ 1119.874436] ? debug_smp_processor_id+0x1c/0x20 [ 1119.879095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.884631] ? check_preemption_disabled+0x48/0x280 [ 1119.889647] ? ext4_mark_inode_dirty+0xb20/0xb20 [ 1119.894392] do_writepages+0x9a/0x1a0 [ 1119.898181] ? ext4_mark_inode_dirty+0xb20/0xb20 [ 1119.902948] ? do_writepages+0x9a/0x1a0 [ 1119.906926] __writeback_single_inode+0x20a/0x1660 [ 1119.911847] ? __mark_inode_dirty+0x1510/0x1510 [ 1119.916509] ? lock_is_held_type+0x210/0x210 [ 1119.920915] ? find_held_lock+0x36/0x1c0 [ 1119.924971] ? wbc_attach_and_unlock_inode+0x5c0/0xa30 [ 1119.930270] ? lock_downgrade+0x900/0x900 [ 1119.934408] ? find_held_lock+0x13f/0x1c0 [ 1119.938563] ? kasan_check_read+0x11/0x20 [ 1119.942712] ? do_raw_spin_unlock+0xa7/0x330 [ 1119.947116] ? do_raw_spin_trylock+0x270/0x270 [ 1119.951691] ? __lock_is_held+0xb5/0x140 [ 1119.955756] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1119.961296] ? wbc_attach_and_unlock_inode+0x675/0xa30 [ 1119.966585] ? __writeback_single_inode+0x1660/0x1660 [ 1119.971783] writeback_sb_inodes+0x71f/0x1210 [ 1119.976306] ? wbc_detach_inode+0x960/0x960 [ 1119.980641] ? lock_release+0xa00/0xa00 [ 1119.984616] ? down_read_trylock+0xda/0x140 [ 1119.988940] ? trylock_super+0x22/0x110 [ 1119.992914] ? downgrade_write+0x270/0x270 [ 1119.997136] ? up_read_non_owner+0x100/0x100 [ 1120.001540] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1120.007088] __writeback_inodes_wb+0x1b9/0x340 [ 1120.011720] ? writeback_sb_inodes+0x1210/0x1210 [ 1120.016478] ? __lock_is_held+0xb5/0x140 [ 1120.020538] wb_writeback+0xa73/0xfc0 [ 1120.024359] ? writeback_inodes_wb.constprop.50+0x330/0x330 [ 1120.030061] ? lock_is_held_type+0x210/0x210 [ 1120.034477] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1120.039670] ? print_usage_bug+0xc0/0xc0 [ 1120.043719] ? string+0x225/0x2d0 [ 1120.047176] ? widen_string+0x2e0/0x2e0 [ 1120.051153] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1120.056158] ? find_next_bit+0x104/0x130 [ 1120.060209] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1120.065220] ? find_next_bit+0x104/0x130 [ 1120.069306] ? cpumask_next+0x41/0x50 [ 1120.073148] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1120.078154] ? get_nr_dirty_inodes+0xd6/0x130 [ 1120.082644] ? __local_bh_enable_ip+0x160/0x260 [ 1120.087325] ? get_nr_dirty_pages+0x17c/0x1f0 [ 1120.091820] ? _raw_spin_unlock_bh+0x30/0x40 [ 1120.096232] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1120.101244] ? wb_split_bdi_pages.isra.33+0x134/0x1b0 [ 1120.106440] ? wb_wait_for_completion+0x2d0/0x2d0 [ 1120.111269] ? wb_workfn+0x521/0x1790 [ 1120.115056] ? __local_bh_enable_ip+0x160/0x260 [ 1120.119712] wb_workfn+0xee9/0x1790 [ 1120.123341] ? __lock_acquire+0x62f/0x4c20 [ 1120.127602] ? inode_wait_for_writeback+0x40/0x40 [ 1120.132466] ? mark_held_locks+0x130/0x130 [ 1120.136702] ? perf_trace_lock+0x14d/0x7a0 [ 1120.140946] ? lock_is_held_type+0x210/0x210 [ 1120.145348] ? mark_held_locks+0x130/0x130 [ 1120.149570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1120.155111] ? check_preemption_disabled+0x48/0x280 [ 1120.160139] ? lock_is_held_type+0x210/0x210 [ 1120.164561] ? perf_trace_lock+0x14d/0x7a0 [ 1120.168801] ? lock_downgrade+0x900/0x900 [ 1120.172983] ? find_held_lock+0x36/0x1c0 [ 1120.177048] ? graph_lock+0x270/0x270 [ 1120.180857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1120.186388] ? check_preemption_disabled+0x48/0x280 [ 1120.191397] ? __lock_is_held+0xb5/0x140 [ 1120.195456] process_one_work+0xc90/0x1c40 [ 1120.199679] ? mark_held_locks+0x130/0x130 [ 1120.203906] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 1120.208571] ? preempt_notifier_register+0x200/0x200 [ 1120.213671] ? __switch_to_asm+0x34/0x70 [ 1120.217720] ? __switch_to_asm+0x34/0x70 [ 1120.221777] ? __switch_to_asm+0x40/0x70 [ 1120.225838] ? __switch_to_asm+0x34/0x70 [ 1120.229888] ? __switch_to_asm+0x40/0x70 [ 1120.233947] ? __switch_to_asm+0x34/0x70 [ 1120.238040] ? __switch_to_asm+0x34/0x70 [ 1120.242097] ? __switch_to_asm+0x34/0x70 [ 1120.246239] ? __switch_to_asm+0x40/0x70 [ 1120.250286] ? __switch_to_asm+0x34/0x70 [ 1120.254419] ? __switch_to_asm+0x40/0x70 [ 1120.258482] ? __switch_to_asm+0x34/0x70 [ 1120.262545] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1120.267121] ? __sched_text_start+0x8/0x8 [ 1120.271266] ? graph_lock+0x270/0x270 [ 1120.275059] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1120.279851] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1120.284457] ? find_held_lock+0x36/0x1c0 [ 1120.288525] ? lock_acquire+0x1ed/0x520 [ 1120.292498] ? worker_thread+0x3e0/0x1390 [ 1120.296641] ? kasan_check_write+0x14/0x20 [ 1120.300867] ? do_raw_spin_lock+0x14f/0x350 [ 1120.305222] ? __schedule+0x21e0/0x21e0 [ 1120.309213] ? rwlock_bug.part.2+0x90/0x90 [ 1120.313433] ? trace_hardirqs_on+0x310/0x310 [ 1120.317848] worker_thread+0x17f/0x1390 [ 1120.321828] ? preempt_notifier_register+0x200/0x200 [ 1120.326952] ? process_one_work+0x1c40/0x1c40 [ 1120.331467] ? __schedule+0xa49/0x21e0 [ 1120.335393] ? kmem_cache_alloc_trace+0x154/0x740 [ 1120.340257] ? __sched_text_start+0x8/0x8 [ 1120.344455] ? __kthread_parkme+0xce/0x1a0 [ 1120.348683] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1120.353781] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1120.358871] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1120.363445] ? trace_hardirqs_on+0xbd/0x310 [ 1120.367757] ? kasan_check_read+0x11/0x20 [ 1120.371903] ? __kthread_parkme+0xce/0x1a0 [ 1120.376156] ? trace_hardirqs_off_caller+0x310/0x310 [ 1120.381268] ? __schedule+0x21e0/0x21e0 [ 1120.385273] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1120.390390] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1120.395934] ? __kthread_parkme+0xfb/0x1a0 [ 1120.400160] ? process_one_work+0x1c40/0x1c40 [ 1120.404651] kthread+0x35a/0x440 [ 1120.408026] ? kthread_stop+0x900/0x900 [ 1120.412001] ret_from_fork+0x3a/0x50 [ 1120.417399] Kernel Offset: disabled [ 1120.421848] Rebooting in 86400 seconds..