500)=""/4096, 0x5e3}, 0x28) 08:51:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x2000]}}, 0x1c) close(r0) 08:51:50 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}, 0x1c) [ 1453.089892] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1453.122503] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:50 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce00000000000000]}}, 0x1c) 08:51:50 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x53f}, 0x28) 08:51:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x300]}}, 0x1c) close(r0) 08:51:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb39}, 0x28) 08:51:50 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x2a000]}, 0x2c) 08:51:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6e8}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:50 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2d4}, 0x28) [ 1453.322366] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1453.365599] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:50 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x12000]}, 0x2c) [ 1453.429371] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:50 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0xfffffffffffffff8, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000009d80)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000180)=""/54, 0x36}, {&(0x7f0000000200)=""/91, 0x5b}, {&(0x7f0000000640)=""/144, 0x90}], 0x3, &(0x7f0000000780)=""/122, 0x7a, 0x3}}], 0x1, 0x0, &(0x7f000000a000)) preadv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000540)=""/209, 0xd1}, {&(0x7f0000000380)=""/242, 0xf2}], 0x3d3, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)="2f70726f632f7379732f6e65742f697076341076732f73796e63a499274b33a6f2", 0x2, 0x0) execveat(r4, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)=[&(0x7f0000000740)='\x00', &(0x7f0000000800)='\x00', &(0x7f0000000840)='nodev\x00'], &(0x7f0000000980)=[&(0x7f00000008c0)='/dev/kvm\x00', &(0x7f0000000900)='\x00', &(0x7f0000000940)='\x00'], 0x1000) ioctl$EVIOCGSND(r4, 0x8040451a, &(0x7f0000002e00)=""/103) write$binfmt_elf32(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4607000100000000000000000003000600f9ffffff5b5daa324d424c048dee668173b5e77703000038000000530300000900000000002000000600018e0f5f00000000004161a05add25e476f4472a9a9e30dcaaf7ac4fdb65e397adfdb8292c88515c757c78151ad444be882b6ba12152fa90bead00ba00000000000000000000000000002158042e56bee4a63d7836aedb4c7d88247f8c050ab6853df65b9af5d06ee84f3a4dfbb42229c8bb15fd2676fc04433d8e13893c0edb2d32f2dd192ecac540b64bd7ba92cbc3c827"], 0x88) fcntl$getownex(r0, 0x10, &(0x7f0000000a40)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000025c0)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000fc0)=0xe8) getresgid(&(0x7f0000001000), &(0x7f00000026c0)=0x0, &(0x7f0000002700)) r8 = getpgid(0xffffffffffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000002740)={0x0, 0x0}, &(0x7f0000002780)=0xc) fstat(r1, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000002840)={0x0, 0x0}) stat(&(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002940)={0x0, 0x0, 0x0}, &(0x7f0000002980)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000002c00)={0x0, 0x85, "3534f577cb3d43c310a36fe93ea43ee757b173765df1873f76b5afe3d9decd1b76c873b3dc5772af17305d66af11517950caf781583a784d60538cf0234d45aab3ace2a150f209d83093dd664e35a8f90ab363f06c338d9b106594d68451c2b266a7370da3141e404042ab4c29449ba2b99e1aebd98357aba9f8fff0bea8f261f09edd1054"}, &(0x7f0000002cc0)=0x8d) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000002d00)=@assoc_value={r14, 0x3ff}, &(0x7f0000002d40)=0x8) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000029c0)=0x0) r16 = geteuid() stat(&(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r4, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000b80)={0x424, 0x1f, 0x100, 0x70bd28, 0x25dfdbff, "", [@nested={0x120, 0x4d, [@generic="249ddbd1802ff86cd2d0f53c8be767a567c119311a65567ff435bb69b2fd8be32db88d5a563a", @typed={0xf4, 0x2f, @binary="a40df03ddb03ab9ccb4b9b777b41f33812fdd0f764cec910ab4f7f237e7c052f145358882c556c4bab1f03a6a494a854d49a8f937068d9cbde8706c92b6c95e14f8c92cc887d306b064df2d51496eedc48c8ce8eafebf89fac8c918deb3862518d941cc354c527caabceef61532416243a14a7f36cd160c3cfe53e4083bc0b603fe078094a46bb46b1b836c1a52dabdfe930cb632315d3972399b99eb242c10f7873e27878240409db94540d49d228d4f8b15f5cd0377f3f03aa8dc0da855a80b10aefe0ba70755bbf6146668bc0dee0659d0e1efd8acf23089b1fbf04bc5df096d9a1c0ba9779642b74225a77c4a2"}]}, @typed={0x8, 0x3b, @ipv4=@multicast1}, @generic="0c8348606b53f24d0c91994d35457c2d7b8654bc95a24e8fbc7e621813ff49cbcc2d9267dfc5059bf966d49b23c83f64c3eddc445ab3d73ae14892d4ed16f5f7d8d9ad8bd6c6a0f7ab375b777941a2ba0653120eb034109042ec369c8cf57539aae6430b447a7baf69935e0e1cb6125e5eb7f01196589cd6e436e2e60636e0e9a026049b7ef772bde741a7cb0b67680d897329af350f854d83628218222d8b89646565318df00389b129bd418e4c6fe097732387869576e4f56f4dc215be62aa1e3c2869b60e4a8b49c1fa2a455db0325d40a23aef", @nested={0xa4, 0x4e, [@generic="77d675503dec7142486de3a508ecc5de9ff99594042c02e68adf46f33cce76c755895bf6967a023ab5b33744ac9ef1671c96ba1aa1bbc0ec24056f68df7a0ec72b3fee0696a2a4521eb7a835a470dd39f2f0cb6d385ff4fd07cc36cad8aeafa7092aaff57575192ebad67d4e3da01481da05913be62d00cfe5", @typed={0x8, 0x81, @u32=0x8}, @typed={0x8, 0x85, @ipv4=@remote}, @typed={0x8, 0x5a, @fd=r2}, @typed={0xc, 0x26, @u64=0x1ff}]}, @generic="2e922639868d34cf58701887052d4f1b73aa936e3239f6090bfec1a151d50092ee1e7020609dfa53417955bf92399d215dee1addfcccd0d675141ab23939ba96186ee3aec3fe43524ca4cbb63ef71a22bdf92b9bf0b51a4c0279cf59597dc6d1efc8798d3e1fa58254396db8d5655d417bc8a1a56391e2bba50d780f7a5faee34fced023831027b130ee48d95e0aed327748562cb242a2f13accabaaa1a6957aca28", @generic="52ec1dce6c34b1c34fa886cc3d408f9c3eae4ebc041201b5b79e469af64cd0091ececd8e400a4f2329a49012c1a47520042366fd8ed87a0d607f4558546a3965f5f2dce3a4014de1cccd5dacd1b1a35d1a4753b84123dd45d9e8d38037f8cff923b91e18d3fd25936d950e9044881d12603bc0a5", @typed={0x8, 0xc, @ipv4=@broadcast}, @nested={0x54, 0x8a, [@typed={0x8, 0x88, @fd=r2}, @generic, @generic="282697ac3d", @typed={0x8, 0x3, @u32=0x7}, @generic, @typed={0x8, 0x52, @u32=0x80000001}, @typed={0x8, 0x86, @ipv4=@dev={0xac, 0x14, 0x14, 0x20}}, @typed={0x8, 0x30, @ipv4=@loopback}, @generic="9fcfc838823dd7b469413b835c04eaad71f80e317b42bf3891683f39d32220051778d4"]}]}, 0x424}], 0x1, &(0x7f0000002ac0)=[@rights={0x28, 0x1, 0x1, [r2, r0, r3, r1, r0, r4]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x28, 0x1, 0x1, [r2, r2, r1, r4, r2, r4]}], 0xd0, 0x85}, 0x20000000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f0000001540)=@dstopts={0x6, 0x209, [], [@generic={0x9, 0x1000, "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"}, @pad1, @ra={0x5, 0x2, 0x800}, @calipso={0x7, 0x40, {0x1, 0xe, 0xf70, 0x8, [0x3, 0x4, 0x7f, 0x0, 0xfffffffffffffffb, 0xffffffff, 0x8]}}]}, 0x1058) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000001040)={{}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x80000000}, &(0x7f00000009c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000ac0)={r18, @in6={{0xa, 0x4e21, 0x20, @ipv4={[], [], @multicast1}, 0x9}}, 0xcd4, 0x1, 0x2, 0xe0}, 0x98) 08:51:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) 08:51:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x17a}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xa00000000000000]}}, 0x1c) close(r0) 08:51:50 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0xc00300]}, 0x2c) 08:51:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x105}, 0x28) 08:51:50 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x227}, 0x28) [ 1453.975896] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:51 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x10000000]}, 0x2c) 08:51:51 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf049020000000000]}}, 0x1c) 08:51:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4a}, 0x28) 08:51:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x500000000000000]}}, 0x1c) close(r0) 08:51:51 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xc0a}, 0x28) 08:51:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x314}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:51 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3b0}, 0x28) [ 1454.235314] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:51 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x693}, 0x28) 08:51:51 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x4000000000000]}, 0x2c) 08:51:51 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xacd}, 0x28) [ 1454.304598] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x4]}, 0x10) 08:51:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5e2}, 0x28) 08:51:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb25}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x4000]}}, 0x1c) close(r0) 08:51:51 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x821}, 0x28) 08:51:51 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x42d}, 0x28) 08:51:51 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0xa0020000000000]}, 0x2c) [ 1454.936404] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:52 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2000000]}}, 0x1c) 08:51:52 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0xe0000000000000]}, 0x2c) 08:51:52 executing program 7: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000]}}, 0x1c) 08:51:52 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa57}, 0x28) 08:51:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x94e}, 0x28) 08:51:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xff0f000000000000]}}, 0x1c) close(r0) 08:51:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x432}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1455.203456] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1455.218632] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1455.241729] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x112}, 0x28) 08:51:52 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6ff}, 0x28) [ 1455.278393] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x5000000000000]}, 0x10) 08:51:52 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x600300]}, 0x2c) 08:51:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x73c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x5000000]}}, 0x1c) close(r0) 08:51:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4a5}, 0x28) 08:51:52 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x27}, 0x28) [ 1455.803653] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:52 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xd}, 0x28) 08:51:53 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c) 08:51:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x49a}, 0x28) 08:51:53 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0xe000000]}, 0x2c) 08:51:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x872}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xa00]}}, 0x1c) close(r0) 08:51:53 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xec}, 0x28) 08:51:53 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xc0fe}, 0x1c) close(r0) [ 1456.071504] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1456.102497] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:53 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x3000000]}, 0x2c) 08:51:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x15a88]}}, 0x1c) close(r0) [ 1456.154268] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x10) 08:51:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x197}, 0x28) 08:51:53 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7a6}, 0x28) 08:51:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x71a}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:53 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x537}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x80fe]}}, 0x1c) close(r0) 08:51:53 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x2000000]}, 0x2c) 08:51:53 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cf20400]}}, 0x1c) 08:51:53 executing program 7: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c) 08:51:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x446}, 0x28) 08:51:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xff00000000000000]}}, 0x1c) close(r0) 08:51:53 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x4400]}, 0x2c) 08:51:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb42}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:53 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x137}, 0x28) [ 1457.002877] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1457.026130] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1457.030925] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:54 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2aa}, 0x28) 08:51:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x598}, 0x28) 08:51:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x10) 08:51:54 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x6]}, 0x2c) 08:51:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xac0}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x200000000000000]}}, 0x1c) close(r0) 08:51:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x177}, 0x28) 08:51:54 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1ab}, 0x28) [ 1457.532228] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:54 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa1c}, 0x28) 08:51:54 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}, 0x1c) 08:51:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8ec}, 0x28) 08:51:54 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x3c000]}, 0x2c) 08:51:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xfec0000000000000]}}, 0x1c) close(r0) 08:51:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x627}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:54 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x528}, 0x28) 08:51:54 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x446}, 0x28) [ 1457.898766] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:54 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8030100000000000]}}, 0x1c) 08:51:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x51e}, 0x28) [ 1458.088593] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0018000]}, 0x10) 08:51:55 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x60020000000000]}, 0x2c) 08:51:55 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xba5}, 0x28) 08:51:55 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x43b}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x54550100]}}, 0x1c) close(r0) 08:51:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x78c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xba8}, 0x28) [ 1458.402776] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xef}, 0x28) [ 1458.467004] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:55 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9a2}, 0x28) 08:51:55 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x627}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x155}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:55 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x400100]}, 0x2c) 08:51:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x1100]}}, 0x1c) close(r0) 08:51:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8a3}, 0x28) [ 1458.732871] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1458.810305] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:55 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffe000000000000]}}, 0x1c) 08:51:55 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x9000000]}, 0x2c) [ 1458.929107] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8001a0ffffffff]}, 0x10) 08:51:56 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb77}, 0x28) 08:51:56 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x242}, 0x28) 08:51:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x617}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9dc}, 0x28) 08:51:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xc]}}, 0x1c) close(r0) 08:51:56 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x200300]}, 0x2c) 08:51:56 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x433}, 0x28) 08:51:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x218]}}, 0x1c) close(r0) 08:51:56 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x2000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000009d80)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000180)=""/54, 0x36}, {&(0x7f0000000200)=""/91, 0x5b}, {&(0x7f0000000640)=""/144, 0x90}], 0x3, &(0x7f0000000780)=""/122, 0x7a, 0x3}}], 0x1, 0x0, &(0x7f000000a000)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x6, 0x8, 0x8}}, 0x30) preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4607000100000000000000000003000600f9ffffff5b03000038000000530300000900fbff00002000000600018e0f08000000000001007b937b38cf0b15b1f6dc5b777d61a05add35e476f4472a9a9e30dcaaf7ac70db65e397adfdb8292c88515c757c6e151ad544be882b6ba12152fa90bead00ba80d0a26ada6621aa2083d6e2a37b15"], 0x88) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000001040)={{}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}) 08:51:56 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x2e000]}, 0x2c) 08:51:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb2c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4f9}, 0x28) 08:51:56 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x14}, 0x28) 08:51:56 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5555]}}, 0x1c) 08:51:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x3]}}, 0x1c) close(r0) 08:51:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x15da294500000000]}, 0x10) 08:51:57 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x600000000000000]}, 0x2c) 08:51:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6f4}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x91f}, 0x28) 08:51:57 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x498}, 0x28) 08:51:57 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x98e}, 0x28) 08:51:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x8000000]}}, 0x1c) close(r0) 08:51:57 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c) [ 1460.105984] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:57 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x1c) 08:51:57 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbbf}, 0x28) 08:51:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x69b}, 0x28) 08:51:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x3000000]}}, 0x1c) close(r0) 08:51:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4c8}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:57 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0xe00200]}, 0x2c) 08:51:57 executing program 7: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0xc0010000000000]}, 0x2c) [ 1460.347391] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:57 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c) [ 1460.535198] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000000000]}, 0x10) 08:51:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x660}, 0x28) 08:51:57 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x59a}, 0x28) 08:51:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x183}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:57 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0xa00]}, 0x2c) 08:51:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00]}}, 0x1c) close(r0) 08:51:57 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x32b}, 0x28) [ 1461.090738] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x41a}, 0x28) 08:51:58 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x12a]}, 0x2c) 08:51:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbac}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:58 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb4f}, 0x28) 08:51:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x281400]}}, 0x1c) close(r0) 08:51:58 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000009d80)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000180)=""/54, 0x36}, {&(0x7f0000000200)=""/91, 0x5b}, {&(0x7f0000000640)=""/144, 0x90}], 0x3, &(0x7f0000000780)=""/122, 0x7a, 0x3}}], 0x1, 0x0, &(0x7f000000a000)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000cc0)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000d00)='net/netstat\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) syz_mount_image$hfsplus(&(0x7f0000000580)='hfsplus\x00', &(0x7f00000005c0)='./file0\x00', 0x349, 0x8, &(0x7f0000000c00)=[{&(0x7f0000000800)="e541c566ab518039f7ea70d047e7ee8d15aad615b3c69de148b925c676efcdd962a0c801e92a478ec7f12c865cd04646de089ced03dd201b29726ac3f352625b9f9364ee4fb785b7364aeef6d2ee2ecb09c50a441d2f60ebc760cf93456920ec207ee6369f14f1", 0x67}, {&(0x7f0000000880)="8ed3e30bcae8cb575e11c36a805b1e8d31962ad0a832807949c221fdc7bb03dadc58d353ed7a379b117c18c8a87e10410ac1b1faf6cebac66b5699c523b02bfb9a3db36047d5bb9a46cc7f09765fe6a07a7390fe19920dbea12d6aef80533f36d45b3ab484121394d49687a20c13a13bbd3a022e1af25554415ac431", 0x7c, 0x5}, {&(0x7f0000000900)="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", 0xff, 0x5}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000000a00)="242738d4babf242d423098bde1606af8e34b2f92871dfaf212b28a80f60d292761f4b47458585f858906d7115d6e48cce83d7cbd3e2fb81aa87422c4f4c9472c055a912513954bac20000b8adeaa3c94c5dc61a2bdf0cbc3ca5f3f83c04fe43589486c2088e7342571789f075c7e1ecbd3aed4352dfc09ba5c07f78750aa3d2651385c95cd0f0476f02b967aa7663e0d2ee1256ea6cacfe41b313476cc8022c75b3eaa3cac92", 0xa6}, {&(0x7f0000000ac0)="5178cb7fe6a3f8407d0f3f72b004cc8b465cac5948050921278a754a5aaad83b476242ce3035acc6cc9887ce2de15ba8efee97bf331a5db94c5ae7def57966a4dc355b9f185bdbdda82fc53c0b010bd90479e9a4cf628542fc19ace4c1a761f1e28ebc20b539d7591bd806c4f746f668bf7e5e299fa4d9c41f19adf6e049b25ac9ed2e5f8247014595831c8657612ce07a1f3fec619cb6c3633156e7e22d", 0x9e, 0x3}, {&(0x7f0000000b80)="bc5f980925eceb2e19bb3df2ebea0ed19f49536c5119d4587b6dd461af36b7370b2b35536863f70de4251279906f25932e4d05afffe0e7e47e1ce0fb87401fbd61472a0c8b0b5984547d6ae33a418249eed92da6f3fe02da85e164b121d5b6bbc7872751877b1c5fa6", 0x69, 0x4}, {&(0x7f0000000600)="4519", 0x2, 0x10000}], 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='decompose,umask=00000000000000000000007,noCabrier,\x00']) setsockopt$sock_int(r3, 0x1, 0x3f, &(0x7f00000001c0)=0xfffffffffffffffd, 0x4) write$vnet(r3, &(0x7f0000000ec0)={0x1, {&(0x7f0000000d40)=""/66, 0x42, &(0x7f0000000dc0)=""/240, 0x3, 0x4}}, 0x68) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, &(0x7f00000004c0)) write$binfmt_elf32(r1, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x0, 0xfffffffffffff801, 0x0, 0x0, 0x3, 0x6, 0xfffffffffffffff9, 0x35b, 0x38, 0x353, 0x9, 0x0, 0x20, 0x600, 0x100, 0xf8e, 0x8}, [], "01fd7b937b38cf0b15b1f6dc5b777d61a05add35e476f4472a9a9e30dcaaf7ac70db65e397adfdb8292c88515c757c6e151ad544be882b6ba12152fa90bead00ba80d0a26ada6621aa2083d6e2a37b15"}, 0x88) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, 0xffffffffffffffff, 0x0) getresgid(&(0x7f00000028c0)=0x0, &(0x7f0000002900), &(0x7f0000002940)) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000f40)='hfs\x00', &(0x7f0000000f80)='./file0\x00', 0x2, 0x6, &(0x7f0000002800)=[{&(0x7f0000000fc0)="fac2104f9d8f2be5436bcdd67068512d", 0x10, 0x10001}, {&(0x7f0000002540)="8fb634bee1b3b1037dbcea32409ca88541178155b035fcfabdb2793a91f43352c94a192e5eb1791e5356e2f11ccfdbda8a4b0ce60b05edcb6ed85e192bbf9f8eabc7e98114bb366fe7d93b0ed0ab0b44deb7fb8f58a1e0d5c5cf6d2517f26d3ea1d7b87a856007498d77d64825507ceb96bfc2cd39c5642400050a3f0334a7af38bba18ed746dd", 0x87, 0x3ff}, {&(0x7f0000001000)="01f61068f7582f08e17b5766b1b65fff61e8a9e08cc1894f", 0x18, 0x3f}, {&(0x7f0000002600)="8fd33675af0b0202b4c7cedfa4fc68e8de5cb79cb40184e2406a642701baa4c8ad5c24d145628c7089149d9b3356034d287e7a0303527e41ad055e43e606321a1e679d003b550ed289fe9182436afa49783f2a49c24fd60d2d624f85fc99b318b7b654f23fc0ed8cb67d6660b994c6dea49eeefb43fc1227df8979d22e74694e4f2acf0e11", 0x85, 0x709}, {&(0x7f00000026c0)="f693fbf43842ed30bd60b7b89c38e0602d043512c84d41e2419cb18f27c59daa876e6f75359eddbd80a6f3a8da392985b0fc932a8c05d136c253f3339b48759178bdcd056a173d3a0e26145bb83d166b398710132fc985b4eabf6d541f45f223f99d17e2ddf5e714382b90219a14c7f9e06c8b6c412d35092c6c8a4835a75675e758788dd611fb916fb3238a7e89a72b24b96f5a78", 0x95, 0x4}, {&(0x7f0000002780)="396daa41e48e9dcf5bf7750ac6f25c8ac9751a9e9ee9dcf2921a10f6d8b2cb61087235d0fdef3b81b0fb77cec83d567fa0484f40ef9dc480c7c83038063ec8a6d57c673284c900fd164cb1b22403a47df868b75be595bae35d4896a04962b543533f4b5882c63864813944c13b0e6513fcad011d12", 0x75, 0x7}], 0x4, &(0x7f0000002a40)={[{@gid={'gid', 0x3d, r4}}, {@file_umask={'file_umask', 0x3d, 0xffff}}, {@gid={'gid', 0x3d, r5}}, {@creator={'creator', 0x3d, "b902c5dd"}}, {@quiet='quiet'}]}) syz_open_dev$dspn(&(0x7f0000000540)='/dev/dsp#\x00', 0x3, 0x250000) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000001040)={{}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}) 08:51:58 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x1a000]}, 0x2c) 08:51:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x841}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:58 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf00000000000000]}}, 0x1c) [ 1461.378806] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1461.450997] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1461.537983] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1461.581822] hfsplus: unable to parse mount options 08:51:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f]}, 0x10) 08:51:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x904}, 0x28) 08:51:58 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7ea}, 0x28) 08:51:58 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x8]}, 0x2c) 08:51:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x5555000000000000]}}, 0x1c) close(r0) 08:51:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x827}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000018, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r0) [ 1461.964164] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1461.981423] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1cf}, 0x28) 08:51:59 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x24000000000000]}, 0x2c) 08:51:59 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb96}, 0x28) 08:51:59 executing program 7 (fault-call:5 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:51:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x5455010000000000]}}, 0x1c) close(r0) [ 1462.232453] FAULT_INJECTION: forcing a failure. [ 1462.232453] name failslab, interval 1, probability 0, space 0, times 0 [ 1462.244289] CPU: 1 PID: 32711 Comm: syz-executor7 Not tainted 4.18.0-next-20180821+ #44 [ 1462.252469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1462.261851] Call Trace: [ 1462.264476] dump_stack+0x1c9/0x2b4 [ 1462.268146] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1462.273389] ? perf_trace_lock+0xde/0x920 [ 1462.277573] should_fail.cold.4+0xa/0x11 [ 1462.281680] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1462.286808] ? graph_lock+0x170/0x170 [ 1462.290646] ? zap_class+0x740/0x740 [ 1462.294410] ? perf_trace_lock+0xde/0x920 [ 1462.298594] ? mark_held_locks+0x160/0x160 [ 1462.302861] ? graph_lock+0x170/0x170 [ 1462.306686] ? print_usage_bug+0xc0/0xc0 [ 1462.310781] ? find_held_lock+0x36/0x1c0 [ 1462.314870] ? __lock_is_held+0xb5/0x140 [ 1462.318975] ? check_same_owner+0x340/0x340 [ 1462.323319] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1462.327934] ? rcu_note_context_switch+0x680/0x680 [ 1462.332884] ? lock_release+0x9f0/0x9f0 [ 1462.336891] __should_failslab+0x124/0x180 [ 1462.341156] should_failslab+0x9/0x14 [ 1462.344982] kmem_cache_alloc_trace+0x2b5/0x730 [ 1462.349690] ? __local_bh_enable_ip+0x161/0x230 [ 1462.354400] bcm_sendmsg+0x2e88/0x49a8 [ 1462.358327] ? bcm_tx_timeout_tsklet+0x4b0/0x4b0 [ 1462.363114] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1462.368160] ? rw_copy_check_uvector+0x30d/0x3e0 [ 1462.372960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1462.378526] ? import_iovec+0x269/0x470 [ 1462.382527] ? dup_iter+0x270/0x270 [ 1462.386192] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1462.391762] ? copy_msghdr_from_user+0x3c4/0x580 [ 1462.396554] ? bcm_tx_timeout_tsklet+0x4b0/0x4b0 [ 1462.401347] sock_sendmsg+0xd5/0x120 [ 1462.405097] ___sys_sendmsg+0x7fd/0x930 [ 1462.409105] ? copy_msghdr_from_user+0x580/0x580 [ 1462.413889] ? lock_downgrade+0x8f0/0x8f0 [ 1462.418068] ? proc_fail_nth_write+0x9e/0x210 [ 1462.422598] ? __fget_light+0x2f7/0x440 [ 1462.426605] ? fget_raw+0x20/0x20 [ 1462.430073] ? find_held_lock+0x36/0x1c0 [ 1462.434155] ? kasan_check_write+0x14/0x20 [ 1462.438405] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1462.443366] ? wait_for_completion+0x8d0/0x8d0 [ 1462.447986] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1462.453567] ? sockfd_lookup_light+0xc5/0x160 [ 1462.458096] __sys_sendmsg+0x11d/0x290 [ 1462.462005] ? __ia32_sys_shutdown+0x80/0x80 [ 1462.466428] ? __sb_end_write+0xac/0xe0 [ 1462.470424] ? fput+0x130/0x1a0 [ 1462.473745] ? do_syscall_64+0x9a/0x820 [ 1462.477731] ? do_syscall_64+0x9a/0x820 [ 1462.481737] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 1462.486857] ? ksys_ioctl+0x81/0xd0 [ 1462.490506] __x64_sys_sendmsg+0x78/0xb0 [ 1462.494600] do_syscall_64+0x1b9/0x820 [ 1462.498507] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1462.503897] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1462.508846] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 1462.513886] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1462.518925] ? recalc_sigpending_tsk+0x180/0x180 [ 1462.523706] ? kasan_check_write+0x14/0x20 [ 1462.527972] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1462.532847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1462.538057] RIP: 0033:0x457089 [ 1462.541270] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1462.560194] RSP: 002b:00007f437f607c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1462.567935] RAX: ffffffffffffffda RBX: 00007f437f6086d4 RCX: 0000000000457089 [ 1462.575226] RDX: 0000000000000000 RSI: 00000000205e4000 RDI: 0000000000000004 08:51:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xade}, 0x28) 08:51:59 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0xa00000000000000]}, 0x2c) [ 1462.582510] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1462.589797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1462.597089] R13: 00000000004d3fb0 R14: 00000000004c8a24 R15: 0000000000000000 [ 1462.613902] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:59 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c) [ 1462.713839] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:51:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x10) 08:51:59 executing program 7 (fault-call:5 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:51:59 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3d3}, 0x28) 08:51:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x793}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:51:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x280}, 0x28) 08:51:59 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x6000000]}, 0x2c) 08:51:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xc4ffffff]}}, 0x1c) close(r0) [ 1462.794876] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1462.911617] FAULT_INJECTION: forcing a failure. [ 1462.911617] name failslab, interval 1, probability 0, space 0, times 0 [ 1462.923060] CPU: 0 PID: 32747 Comm: syz-executor7 Not tainted 4.18.0-next-20180821+ #44 [ 1462.931235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1462.940626] Call Trace: [ 1462.943240] dump_stack+0x1c9/0x2b4 [ 1462.946897] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1462.952116] ? perf_trace_lock+0xde/0x920 [ 1462.956294] should_fail.cold.4+0xa/0x11 [ 1462.960382] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1462.965506] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 1462.970631] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 1462.975761] ? trace_hardirqs_on+0xbd/0x2c0 [ 1462.980129] ? kasan_check_read+0x11/0x20 [ 1462.984289] ? __debug_object_init+0x581/0x12e0 [ 1462.988973] ? graph_lock+0x170/0x170 [ 1462.992791] ? kasan_check_write+0x14/0x20 [ 1462.997038] ? find_held_lock+0x36/0x1c0 [ 1463.001119] ? __lock_is_held+0xb5/0x140 [ 1463.005212] ? check_same_owner+0x340/0x340 [ 1463.009755] ? rcu_note_context_switch+0x680/0x680 [ 1463.014714] __should_failslab+0x124/0x180 [ 1463.018967] should_failslab+0x9/0x14 [ 1463.022806] kmem_cache_alloc+0x29c/0x710 [ 1463.026978] can_rx_register+0x571/0x7b0 [ 1463.031052] ? bcm_can_tx+0x620/0x620 [ 1463.034871] ? can_send+0x850/0x850 [ 1463.038515] ? hrtimer_init+0xe4/0x410 [ 1463.042418] ? kasan_check_write+0x14/0x20 [ 1463.046667] ? tasklet_init+0xcb/0x200 [ 1463.050572] ? bcm_rx_thr_flush+0x2e0/0x2e0 [ 1463.054922] ? _local_bh_enable+0x30/0x30 [ 1463.059087] ? __local_bh_enable_ip+0x161/0x230 [ 1463.063778] bcm_sendmsg+0x16b1/0x49a8 [ 1463.067697] ? bcm_tx_timeout_tsklet+0x4b0/0x4b0 [ 1463.072474] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1463.077510] ? rw_copy_check_uvector+0x30d/0x3e0 [ 1463.082294] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1463.087858] ? import_iovec+0x269/0x470 [ 1463.091851] ? dup_iter+0x270/0x270 [ 1463.095503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1463.101056] ? copy_msghdr_from_user+0x3c4/0x580 [ 1463.105831] ? bcm_tx_timeout_tsklet+0x4b0/0x4b0 [ 1463.110619] sock_sendmsg+0xd5/0x120 [ 1463.114372] ___sys_sendmsg+0x7fd/0x930 [ 1463.118361] ? copy_msghdr_from_user+0x580/0x580 [ 1463.123128] ? lock_downgrade+0x8f0/0x8f0 [ 1463.127293] ? proc_fail_nth_write+0x9e/0x210 [ 1463.131799] ? __fget_light+0x2f7/0x440 [ 1463.135785] ? fget_raw+0x20/0x20 [ 1463.139731] ? find_held_lock+0x36/0x1c0 [ 1463.143806] ? kasan_check_write+0x14/0x20 [ 1463.148048] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1463.153697] ? wait_for_completion+0x8d0/0x8d0 [ 1463.158303] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1463.163850] ? sockfd_lookup_light+0xc5/0x160 [ 1463.168366] __sys_sendmsg+0x11d/0x290 [ 1463.172266] ? __ia32_sys_shutdown+0x80/0x80 [ 1463.176680] ? __sb_end_write+0xac/0xe0 [ 1463.180668] ? fput+0x130/0x1a0 [ 1463.183979] ? do_syscall_64+0x9a/0x820 [ 1463.187979] ? do_syscall_64+0x9a/0x820 [ 1463.191983] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 1463.197098] ? ksys_ioctl+0x81/0xd0 [ 1463.200742] __x64_sys_sendmsg+0x78/0xb0 [ 1463.204816] do_syscall_64+0x1b9/0x820 [ 1463.208711] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1463.214088] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1463.219029] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 1463.224059] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1463.229084] ? recalc_sigpending_tsk+0x180/0x180 [ 1463.233847] ? kasan_check_write+0x14/0x20 [ 1463.238117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1463.242978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.248177] RIP: 0033:0x457089 [ 1463.251380] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1463.270301] RSP: 002b:00007f437f607c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1463.278033] RAX: ffffffffffffffda RBX: 00007f437f6086d4 RCX: 0000000000457089 [ 1463.285315] RDX: 0000000000000000 RSI: 00000000205e4000 RDI: 0000000000000004 [ 1463.292598] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1463.299879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 08:52:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xfec0]}}, 0x1c) close(r0) [ 1463.307150] R13: 00000000004d3fb0 R14: 00000000004c8a24 R15: 0000000000000001 08:52:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x31b}, 0x28) 08:52:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3d9}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:00 executing program 7 (fault-call:5 fault-nth:2): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:00 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x5]}, 0x2c) 08:52:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x1000000000000000]}}, 0x1c) close(r0) [ 1463.477344] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x356}, 0x28) [ 1463.538347] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:00 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c) 08:52:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x10) 08:52:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb3d}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:01 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x20020000000000]}, 0x2c) 08:52:01 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x217}, 0x28) 08:52:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x6d083351]}}, 0x1c) close(r0) 08:52:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x92f}, 0x28) 08:52:01 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}, 0x1c) [ 1464.206517] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:01 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x450}, 0x28) 08:52:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x256}, 0x28) 08:52:01 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x4002000000000000]}, 0x2c) 08:52:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2ef}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x8000a0]}}, 0x1c) close(r0) 08:52:01 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa63}, 0x28) 08:52:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xffffffc4]}}, 0x1c) close(r0) 08:52:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x10) 08:52:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5d7}, 0x28) 08:52:02 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0xc0000000000000]}, 0x2c) 08:52:02 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2fa}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:02 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7b}, 0x28) 08:52:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xffffffffa0008000]}}, 0x1c) close(r0) 08:52:02 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c) [ 1465.063043] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1465.110412] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x516}, 0x28) 08:52:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:02 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0xa00000]}, 0x2c) 08:52:02 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xea}, 0x28) 08:52:02 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9a2}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xffffff8d]}}, 0x1c) close(r0) 08:52:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x632}, 0x28) 08:52:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x10) 08:52:02 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x55f}, 0x28) 08:52:02 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x3f00]}, 0x2c) 08:52:02 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3fe}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x9]}}, 0x1c) close(r0) 08:52:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbda}, 0x28) 08:52:02 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}}, 0x1c) 08:52:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x600000000000000]}}, 0x1c) close(r0) 08:52:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1466.031723] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:03 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x642}, 0x28) 08:52:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa44}, 0x28) 08:52:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb01}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1466.100633] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:03 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0xd]}, 0x2c) 08:52:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x11000000]}}, 0x1c) close(r0) 08:52:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1466.390244] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1466.441734] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x50000]}, 0x10) 08:52:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9fd}, 0x28) 08:52:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8ac}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:03 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb6a}, 0x28) 08:52:03 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x10]}, 0x2c) 08:52:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe]}}, 0x1c) close(r0) 08:52:03 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91ffffff]}}, 0x1c) 08:52:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x5555]}}, 0x1c) close(r0) 08:52:03 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2ce}, 0x28) 08:52:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x947}, 0x28) 08:52:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2b2}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:04 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x6000]}, 0x2c) 08:52:04 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c) 08:52:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x1000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1467.185722] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1802]}, 0x10) 08:52:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x5000000000000]}}, 0x1c) close(r0) 08:52:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x756}, 0x28) 08:52:04 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9eb}, 0x28) 08:52:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xae8}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x8000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:04 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0x18000000]}, 0x2c) [ 1467.701751] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xe5}, 0x28) 08:52:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x8}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:04 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8a7}, 0x28) [ 1467.783125] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:04 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000, 0x0, 0x0, 0xe00]}, 0x2c) 08:52:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x91ffffff]}}, 0x1c) close(r0) 08:52:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x28d}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa8a}, 0x28) 08:52:05 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}, 0x1c) 08:52:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x100000000000000]}}, 0x1c) close(r0) [ 1468.140469] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1468.144617] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1468.202731] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1802000000000000]}, 0x10) 08:52:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x100000000000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:05 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xaeb}, 0x28) 08:52:05 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x200000ac) 08:52:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x15c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1d1}, 0x28) 08:52:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xc4ffffff00000000]}}, 0x1c) close(r0) 08:52:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x200000000000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1468.682450] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:05 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2b) 08:52:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb9f}, 0x28) 08:52:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x10e}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x1802000000000000]}}, 0x1c) close(r0) 08:52:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x2000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:05 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa72}, 0x28) [ 1468.939070] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:05 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff91]}}, 0x1c) 08:52:05 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x48) [ 1469.012925] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x11c}, 0x28) 08:52:06 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7b4}, 0x28) 08:52:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6bb}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}, 0x10) 08:52:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0xffffff7f}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xff0f]}}, 0x1c) close(r0) 08:52:06 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c) 08:52:06 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2d) [ 1469.568142] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:06 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2c4}, 0x28) 08:52:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xc000000]}}, 0x1c) close(r0) 08:52:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x2}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x996}, 0x28) 08:52:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x413}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:06 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x30) [ 1469.760427] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x739}, 0x28) 08:52:06 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9d5}, 0x28) 08:52:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x800000000000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3dc}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x10000000]}}, 0x1c) close(r0) [ 1470.038512] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) 08:52:07 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x800, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbf9}, 0x28) 08:52:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0xffffff7f00000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:07 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x735}, 0x28) 08:52:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbe9}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x700]}}, 0x1c) close(r0) 08:52:07 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}}, 0x1c) [ 1470.497268] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:07 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x56}, 0x28) 08:52:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x0, 0x800000000000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:07 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x40000000000004, 0x8000, 0x41, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0xfffffd6c) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x40, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x2) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x120fc, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r2, 0x2, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xef76}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x737719b4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}]}, 0x58}, 0x1, 0x0, 0x0, 0xc0}, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000000c0)={0x0, 0x3, 0x2, 0x80d, 0x400, 0x7fff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000180)=0x4) 08:52:07 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0490200]}}, 0x1c) 08:52:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x453}, 0x28) 08:52:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x906}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x885a010000000000]}}, 0x1c) close(r0) [ 1470.696319] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x0, 0xffffff7f00000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1470.817403] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x10) 08:52:08 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0xfff, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0xffffffd0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x2}) 08:52:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb6a}, 0x28) 08:52:08 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x143}, 0x28) 08:52:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7a4}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xfec00000]}}, 0x1c) close(r0) 08:52:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x0, 0xffffff7f}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1471.351666] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:08 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0xf, 0x9, 0x40, 0xfffffffffffffffc, 0x30, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0xffffffffffffff25) 08:52:08 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7a9}, 0x28) 08:52:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x0, 0x1000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7e5}, 0x28) 08:52:08 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}}, 0x1c) 08:52:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x2000000]}}, 0x1c) close(r0) 08:52:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5a4}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:08 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x334}, 0x28) 08:52:08 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7fffffff, 0xc0100) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0xac2) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x4e22, @rand_addr=0x3}, {0x6, @local}, 0x40, {0x2, 0x4e20, @multicast2}, 'vcan0\x00'}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000580)=[@in={0x2, 0x4e20, @local}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e22, 0x7, @local, 0x3}, @in={0x2, 0x4e22}, @in={0x2, 0x4e24, @rand_addr}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e21, 0x3f, @mcast1, 0x800}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e21}], 0xa8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0xffffffffffffffb3, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x40001000}}, 0x254) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000300), &(0x7f0000000340)=0x14) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000002c0)={0x1, 'veth0_to_team\x00', 0x3}, 0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e22, @multicast2}}, [0x5, 0x1, 0x2, 0x8, 0x6, 0x7, 0x5, 0xffffffff80000001, 0x1, 0x1000, 0x1ff, 0xeef, 0x3, 0x3ff, 0x6]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000004c0)={r2, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}}, 0x8, 0xffffffff00000000, 0x8, 0x7, 0x29}, 0x98) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0xffffffffffffffe0, 0x100000001, "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", 0xe3, 0x5, 0x0, 0xfffffffffffffff8, 0x5, 0x55e}, r1}}, 0x120) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x10a, 0x4, 0x8000, 0x43, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) [ 1471.636330] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1471.669889] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1471.711478] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x218]}, 0x10) 08:52:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x0, 0x8}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x82b}, 0x28) 08:52:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xadd}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xa]}}, 0x1c) close(r0) 08:52:09 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xac8}, 0x28) 08:52:09 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x3, 0x84500) write$vnet(r0, &(0x7f0000000240)={0x1, {&(0x7f0000000100)=""/254, 0xfe, &(0x7f0000000200)=""/25, 0x3, 0x3}}, 0x68) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), 0x4) 08:52:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x4002000000000000]}}, 0x1c) close(r0) 08:52:09 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xade}, 0x28) 08:52:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x0, 0x100000000000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:09 executing program 1: r0 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)=r2) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) [ 1472.430781] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x923}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:09 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x1c) 08:52:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4c9}, 0x28) 08:52:09 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5a9}, 0x28) 08:52:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x0, 0x8000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1472.492441] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4529da15]}, 0x10) 08:52:10 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000005100)='/dev/snapshot\x00', 0x8000, 0x0) fchmodat(r0, &(0x7f0000005840)='./file0/file0\x00', 0x100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000005a00)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000005900)={0x2, [0x0, 0x0]}, &(0x7f0000005940)=0xc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000005980)={r3, 0x81}, &(0x7f00000059c0)=0x8) sendmmsg$nfc_llcp(r2, &(0x7f0000004ec0)=[{&(0x7f0000000200)={0x27, 0x1, 0x0, 0x7, 0x200, 0x5, "f5434108342155ad8d8fcb9b2d6b1767e9efb7cbbad3e2a2a3ebf7aa8c8b1dcc2a3efa91b8566e36a7cf7e887f696f680c2dca976e17bcafc9f0c355322439", 0xd}, 0x60, &(0x7f0000000540)=[{&(0x7f0000000380)="e93252d81252f1c8e1712e506f6c5835dac40abc57ca05b369e42e1d2314778f639e834fc619b9e93410efffad208044a78244975d6ebf22eda08ab8166b36a1dd5614715b9995dda6b366168169bd1331e3677337cc49abf59206bdc45c6374fca6adbeb349aa73b9fa84bd665fdcc90373600238ef11729cf57a79ffd7885f90268aeed8a68a477eb8992f35924162ba945590bc5b4b6d80636a7e86a98f672882c565b56ba7b316cb7012bb59e6f1520cd5f3139581079a5c2284420a4c4873c4257707096f7893152e84a5764da76ec8e9c722582d419da20542", 0xdc}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000002c0)="ee07ecbfc5f5080c88d9cf22592102c6afb9ba871d18271f7e7b31066e3e29be26fb42611dc2e2e1fb6774abcc73fae31d83101115e76fa57b37be1e2797d044ecd013625e006bc1555f7d84d4c08772381f072a1d858bb56409fcfc0b048da4d4f2c93f9ab4319b210b4724e89d89855c34e7fd8de473277e20f1716edb84", 0x7f}, {&(0x7f0000000180)="367a6dac0ae3ba0d8e96b1fe0a9a4e5c4a8c4af5fc57d85c54582484879977acaaa16de9e2233dfdfcd082f9b3fbff114489d73e", 0x34}, {&(0x7f0000000480)="934270d508c9083adbcc79bee167991851019c4f50f89ad2ceee4e6775be5ad6fb755ec93466618c31e165c8889effe7a2a0c9afdfff7467fc04e8a8dfca33b44bee448cd1df4c53efbf9954388071a642d45e965998b10cc26d5e7cca04ea0cdff6be4d1887a08b595c6fc72e2a8029f72b2f6f96480a72fa63f2fbdae039051cf2d1065f3cbad0de22efd549e32355c464", 0x92}], 0x5, 0x0, 0x0, 0x84}, {&(0x7f00000005c0)={0x27, 0x1, 0x2, 0x7, 0x1, 0x3, "26560b138bcd9d7ddd6105c28ae326f0b2e20eb5a71ad5ea944de2b0d7210857af4e6c25fb6f28307ebd7779afe37d76290084b1cd7581f81571f9c7d56898", 0x30}, 0x60, &(0x7f00000017c0)=[{&(0x7f0000000640)="4e87328b62d637c33e0cbe1092e7bce9044af0b00f1e6d3ab6bb8c29cd392a275d73048d3f0ed9322f0b7dc3a93a", 0x2e}, {&(0x7f0000000680)="120b529321b0027f10fd762dbccc6cae02f9aea4567f04869c684da8ecb2487099f2838817fe22d6c2a937cf30ba1d2038e944cd0f02ca6d987ac75ee9054128422b10bf31ec9c0c3e127cd864712af9148bf212564576f63fa1de3149caef7dfcfa5cbfea2736f3fcebfe8a13f209dd289c432815cb005ac90a73eaf8497e34a024a938dd2657069eef5e9f4186f254d4b4e958f935c7f43de47c0656edea605fbe5c6c3736b09aea", 0xa9}], 0x2, &(0x7f0000001800)={0x60, 0xff, 0x200, "a028f43b3c395dce299b3f13d7f733b73efd9c39a4b8f7930684cbd502c3d2739c95bc7e358f506e365feaa83dd387bed44dc369f3f88f74a05c2bc811a2808c48bf4cf0c2a43ae634"}, 0x60, 0x4000000}, {&(0x7f0000001880)={0x27, 0x1, 0x2, 0x7, 0x6efd, 0x5, "d879b8819b7a9131c4f1e8032c35f45e20c72b119e76b18d1121b63889ebe01d5ffb6440666815c65fc49bfe3da06e896652fe996ff3e2a1ec102ae0b72cbc", 0x4}, 0x60, &(0x7f0000002dc0)=[{&(0x7f0000001900)="2894233247e9a04cbc068346ecaa98de4b727b846a70a1be6e63b2668c78d166c24e69407f1b6785f6aef791f84cce6670b0727dcce018c78f7ed26737486f0130ce24667cb12d7296736a6ac9b8ef670e9c53131f9d26c13fe2d4240a00c5f578f6e649fa4d17d5dcd0e0ede3233878f4a428716192045a7ae69af3a0d00a032ccd4b9765ac3321f97770b65b79110dcd7a08ee3fdca033aad83b962b71ec32cc6a64f283913075a16736e4512f353dd1ed46f4f9b23d0f834e4d335b4dbbf3505804d604ca5a80ac9bb7c540ac0c78eeaef632f4dd4412cb", 0xd9}, {&(0x7f0000001a40)="e79dc843ebb8387f293d172beef7922a70bd2a12504d08d7a651d1c21e8be563fb0f9cb0ae0d9a12248f5b823bc6bce154abe4927922992e16b5d0019e6e93c82d7ebcda52fc6bab65c8387fa488dcfb2c2eea62d7a7ea9094513f4d532202ec090dd0b0409069c5fd70de365d3e86bd7345699139f1adca1fc23c9c54a9", 0x7e}, {&(0x7f0000001ac0)="566954cbe171ecc4ef5647b2f1c299acde97f5f80e74ad970af2322b3d2ce26fcf4c8264be6a4879dd5ab98c39226e237f6fa626f7ed8d2d0af3d1e469d1936206b7ed3eca3e8ad441b8584a957c4a002fd168aa4a00f606a3055a88642cdf65d21ef6e82cd0d87111cafc75108320", 0x6f}, {&(0x7f0000001b40)="b291dc0c6287b8ee7e42", 0xa}, {&(0x7f0000001b80)="3f80e97b2e33a59bec8f0b22fb057fc59f141acad7606c7ed1ec4496aacf3a1cfadb60a8d8847a0681d009c20ef8bc085315fdeba6306bda645c6d521b3ad05bb47e3d7dce3c16576b0b9d5b4ba92f21669aa466a43049eb74b2a43550a856df9fed1c629543b1c19c43e8ce35bfc8b3a6209c5bfdef719c50ba4a7c292ca06ca22ae4f9190c43bace14df12096288595a2dd05c0001321654ec702e60f806215474003956695bba5dddee17265ab721ec2473671c1ae9d46fddc645bd72811cb7f4d65bc8dea856c512f3a9bc21447bdc3cfe2bbea6544d66929ef3dfde1a8a78", 0xe1}, {&(0x7f0000001c80)="0a2f975d2340e64000f11c2f64340ccc49f6566edcd1f849d3a4ce57eff61e1384dabc9409daad1e1e9bb2639758b03744f43f417215f47e4afe9b39299ddaaa453bc39239e835dec728da44db8431bfb2d80ec24bf3c7c502744c084057a14958396123bc336832711d76bb7df66b", 0x6f}, {&(0x7f0000001d00)="2adab50405613d913890bcfa7ce581412ee81b0224f3dce14c7c974d72ca5ed98da794feca74ea399ff7de54980a1cacf8ae9e7f3763dedad8ac676728837e8fddab856554fd2a95e20a01f7ec235b4f18db532f82ff513867e09c8efe50a02e24b94103a4ed723f5673aeda24d82d8138cc5b793e35db3624f3cfc0a374", 0x7e}, {&(0x7f0000001d80)="c4591899049031b5e65875ee054c92677f8a88c6392a81f43a91cf", 0x1b}, {&(0x7f0000001dc0)="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", 0x1000}], 0x9, &(0x7f0000002e80)={0x18, 0x10d, 0x4, "e14ea1bc5d33"}, 0x18, 0x40}, {&(0x7f0000002ec0)={0x27, 0x0, 0x0, 0x2, 0x101, 0xff, "6209281207f54e6dfa4dad2f8153b2d24503c997cacf53307a90ba934a41c88d077037b801cbf55b185baab1586fe17c5e0c118b7f2642fcdda21038ca2407", 0x38}, 0x60, &(0x7f0000003fc0)=[{&(0x7f0000002f40)="93af8ff52978f2fabc14dfa262746b4cc5334b0f871b55b46b94a225971c96504174c08f6bb55b683107b5e0f765e8a567f2f40f728ac3def423d71fdea2bbb79e718adbe80c72ecb564e0d0838f52c37fbb8a95c6a419", 0x57}, {&(0x7f0000002fc0)="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", 0x1000}], 0x2, &(0x7f0000004000)=ANY=[@ANYBLOB="e8000000000000f46c54c9d04a6ff4a971aaf1c45a926c6988029007ff14e94278e0952f3a9611a5061f33546d8bf283c8a109f773d0bc482bcc1a64bba0ba3f22a498cbd13db93443f26e0eaea5ecb120f31bcbefc4a9df1411fb80152125984381be939d651391a4a105bf514c4345ddb619233333f5205444d45abc206d0523bfdfa84028a552909ca2212770ab9fb4f46713cc4809746c0b4288737eec461392ee448dfd944c98e70e362778b967610ec41229942b85244e824fb6942b693d4d83499f2cfc41feb699412f0146caa2a20a4f4ed3e7d2b1d3b6b7890000000000000000000000"], 0xe8, 0x800}, {&(0x7f0000004100)={0x27, 0x0, 0x0, 0x5, 0x3ff, 0x0, "6f7656cd843a93a66eca2e335b77e2dd3e7d2306938cfd0994d1b4bdf9e1fb4c7c5d7b67f4a61736ed4377ae019b547420fc157adbc23f7096e8aaededf72d", 0x8}, 0x60, &(0x7f0000004680)=[{&(0x7f0000004180)="54ecfe587f6a000a050813470bc910db301d3a1d32b1fbe5a26d9ac5af3e359cd878f6321f7b", 0x26}, {&(0x7f00000041c0)="56776e05000b4cb7987b718c77222f2fcada19c8dca482a4e9f1e43837140678c15e92aace6453691c9a757fc57bd31ed02e5853a142731b8b7748e5b13c4a27aaee2d43e1de507450abddce8b239d038c693b555714297d4802267b86e88c40d1f18356becca3a72bdcc738ab1c7b13249cf0626eca2b3ff021c97f09deec5c", 0x80}, {&(0x7f0000004240)="db4ffb5b7cfbf0fcc500dd8053a4499271903c516e8fc16a4e3f7e96a8b7bb549b974e1c97b32f283b6a716e422d59d21de7420cba9381429b64147c6005200039bc7d3c4efa8ce72edcd81356b4e922f60c3a99c1d27d2ab0807676d304c01570435b24d03c60437aef60acc5926905e0bd81ff3665a40168aa11dc22a5d666c82c3119c6372cdf770a1b62f39b1585b20417a6116bebece8fd7ffbebd139c14eea8425d04ebf4ead85f37636ab108d30d06302a746d72a481a6b769bc7399b1d1cfc815685160c8c6a0a4a7fcce53e8b92577383f17a10fc2a", 0xda}, {&(0x7f0000004340)="00531db09c6e4a78686d52a2be46e88c0c4c1f7a32acfc115c404a4c0437e44ad0707b3768386ce33737827895486b50f27f4a7967d9e347f3640a26233eba45e261695cbb06bbc275bc111020e36be7d3f53a04f4c7948f1a4e4c71573cb13c10e437a821f1cf15bd8d4a38ccaca0919426766c4ad3608f9db0f91d4f0c36a7e46b85d63aeda9f73ec317442bc4efeccca088faa917b225530497d725582ddecfcc25f603ea5252b4f35f85fdb5266f578a997c7eff1a75907539c834eb2a18786d77d8c5229aff50ff59e219e00f6b21", 0xd1}, {&(0x7f0000004440)="789ee00f094c253bbda62ceff4803cb424d53b9974ddd86412477bcc665b3e", 0x1f}, {&(0x7f0000004480)="61cd5b321d2ffd0d3eace5c5cad54353448c9ea32b1b6cec9d744c4000ca2e37787913cd1c515f37dbf55bef04ceaab1240010507a79dbbfccc9b3b868a09ed38a097bdffec3aeca5d4784b6779c6d78bd49b734bc440fe7f5af6157486ecaa4b1131ae540bebf388ca7ccf827a5e7bd5ab3943737452a14a902582d503480280a90bcfb54adaf13b8d58b8deec90152bb452fdd8b8dacbf1d2d8d894c2efef767773e1786ff2d6684a95a98a388f52392f7334ad8822cd24297c66f0b289f43dd45f60ce63535faea12328675788ad339fb3c", 0xd3}, {&(0x7f0000004580)="1c5c68a50dff81cc62906de500bc5cd1ce2909629057e26fe1008fbcfa05e046ac68b6ad07d9b586ea4195e2563bcfda81d9cdbc5957ee0c32a5fe0092e622694a0e74175a0fd960e05bf5585b32b00f160755e91d6f3812398c7c21fd9fe41cdc9f0cbcce6c919b155bda818803b8", 0x6f}, {&(0x7f0000004600)="a424da38404e80a23bbcf0878ad26415d03b34689203835ddbf90a14bc3a2537550c11068062aa651f6713fc8c825293607e7e7433d844461f1a6957c4f17781922f4c8e4c299dcb6ce8617773f333d62645", 0x52}], 0x8, &(0x7f0000004700)={0xa8, 0x1ff, 0x3, "b4d0fdd7726febb58abafd233ab4d498104e49ef912e8ede8ce9eb26864d9825f3830ff4d3d65443d0c134ad5ab49a306d01a68aa3c6adebe4d4a69a8bd919693aac74dbb4e4ec5238cb5b8ef7fa20e91255ce527c2483f8dca9a66f1f58e4de848e0edbe5a882ace0447f34a9efc23907d682e3c9af79a6ae23fe1b087797a312436041738747d8b92018f35b83af69f92136f88890"}, 0xa8, 0x20000000}, {&(0x7f00000047c0)={0x27, 0x1, 0x2, 0x2, 0x0, 0x8, "8cb5769c894bb9a80162220fe81a2d5cd9c6b01f85a9b8e8569223f3805e47812cd99d97e127c9a9d4b1ca3b74d96438a6eff8431b7aa73f6a52415ef9ff46", 0x38}, 0x60, &(0x7f0000004a00)=[{&(0x7f0000004840)="b7e2a1848ce1da9e1a79b100b2e3d34a67527ea97f5f2fbbdeb6593bcd17087a7293d09cf615e7b9d3759be79c7f5ebe93c3399d856821240bd46cdb51f0a8af614a4426d73218928fae3e9f1ad5771667c52858d901650012eb499f429aa67efa4d4f97ff28ea20ac791b6ea0dab9f8da10", 0x72}, {&(0x7f00000048c0)="25d54bf1d122f0be8a76418f24f833f1e8b46a3e270379e81e3a847894f40bb75060c240e9d7469e20d44f2d51d9735bb18ddbf87223c16f2562114d98710e474d136249d70fe41c8751ead76269c82145f795abcd31b4762f6f6e22f210d63a6af7f48e3d34bc097bb859c8fe5de70c10f09759bbb855be94800be58574be8709e06bff4d01c979cc1e323e910e771b96394ec65806f78f7e7daebc88871dd6ec1ee45dfbf673bc156f1ef881bd5e90b000c1d921fd1d6d375a9a5a0dd3124f1129ed2c00f390", 0xc7}, {&(0x7f00000049c0)="6170d63f26f2852bd292beef78bdcd53c4e4db86888fa04afeb024cbd317693fa8f8baad1c96262f4c7050b59da547c27d4f7a170b9c9987905778fe3862", 0x3e}], 0x3, &(0x7f0000004a40)={0xb0, 0x113, 0xffffffffffffffb5, "35a2e3256be52adcbf92fada7c8c7a18290cd71f82a9149de1cea080930444af9322a2a12d18ce7017642e41ae2eb25ff04ecd68de44baf52b1cff1c2232bbe4f6b85464513040ac106a404a040ea70e517c55b29238e705c60553367cdd7f3b66f655d4fcd73c0931f87f1e059980bb8b6de3b3ef9b6c143d1fbaf834ccce384e8732df94c9ffc339f5fa16c135d5db7ccea381db3725b01eaa9606f1197b"}, 0xb0, 0x800}, {&(0x7f0000004b00)={0x27, 0x1, 0x0, 0x5, 0x2, 0x101, "37ab80e6a0db298085ec8571885cfa8e6fb0aaaa379bbd280c1c81249cca9e7cd4ca4c12f2600c2bc615865e084f060fd8735ecbf7c20ee8a892af6f492bee", 0x27}, 0x60, &(0x7f0000004e40)=[{&(0x7f0000004b80)="29dd1db774a17e341513948c2603b8d20d951e0ac768acf2f5", 0x19}, {&(0x7f0000004bc0)="7b630a267a81f905579addc2e53cd497c9bd67fc2e6a984f5ed80cbd6d42973d9505dce325f16d248c06e776deda93c065a5445c29fe6f4ccf11ca6473ec16b07bf9d1bda4963f1e6912ac9576a84c048ee3a45430ace191f3df4ddd081601e904854b66080b9616a54833a3ba317ea0612c0116400e56e0a20c3045d2f1495a18c0f4e500fee5a8b8f3e1b591b2be9656d273b2c0cf86513ca6097d2a7f9fe788e2cb6018679474af96e57203c9b22431eaa09c1c25d338e162f21dee2d5966", 0xc0}, {&(0x7f0000004c80)="dbfef93b668297c01138e9396b0b741e6bbb761548382a4c247c10cdf82505952137", 0x22}, {&(0x7f0000004cc0)="9d9b4a1e7ea05f61f7ca25e107dc97ecbb9c0d2f326ed1f9f9ef1b14b6a403d0bdb9eaddded1eb9aeeb46d98f93156c7f24abaf5402484628c4faed55a0083bec1104e973b1353946ae95a63999c9f1e9d0c592fea0ce2c3046f7ff79f1ed8b5788776dbe9eae61d01b392499a5151a9dbeeb18bb54ec38f77bc1bf212e6025f5e408241acb5bb4dd0f614208568883ac77a0c5e9c97f5eb712bb0cb6d4c1b4eb664321f61e2d70bd84f201d142b61de7d200eaf48b6b168eec8c84e", 0xbc}, {&(0x7f0000004d80)="b75a5042dcaa8abc6dc6ebb425a89dc394e535cdc336c8c507ccc8755e27e5b75d51faaeb4af0573f8255309846ab9e1ef13b724a743d60b9eb790df9619ce4aaa6e9736ebe9e1231112d06732dea4a7612f1e31b6425629204501d3f3a666f462097518969b9fe2197b3095ac4321d325276c875866b1a81efd8c4fc0995e0fb7b5cf4151cacdb3834f5a4e5d967dedaf", 0x91}], 0x5, 0x0, 0x0, 0x40}], 0x7, 0x8000) mount$fuseblk(&(0x7f0000000280)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000005800)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000005140)=0xeba) r4 = getgid() ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0xd) syz_mount_image$hfsplus(&(0x7f0000005180)='hfsplus\x00', &(0x7f00000051c0)='./file0\x00', 0x1, 0x6, &(0x7f0000005680)=[{&(0x7f0000005200)="d5cfeebb5348f2dab8c2a0fde633bb45bf5ffe6d7cab6ca2823e99eb4321298793d26eaff039710ea5cf2afbdb15f6da83f6856d2aa25f3d25c6b4329dbbe4f5d864427f6bc9794fbadfd5bb6f1789f867bd5c4de6b109cb8f1a31bfd4ddf4660ca2b0f95949fd3ebd0ff5a4cdc79cb559f3d26933bd934282193541567b89b98d1072", 0x83, 0x20}, {&(0x7f00000052c0)="aa03486a9f9be18909006d2c54d42500edfa8e7547de817c7560e47ece38aa4d8e520a7d89179b92119f08068e66a082184985b3697e171be573a54c27b341e827bf602eb07376ce954b1411cec6dbc6946928cab4d2fd16e7d416d58372fe11abfd5453a252ae633ce5c9968da3c9f803b8836b00b73e75f72bce7014004cc313126160e86af2d0a24d9de3", 0x8c, 0x1}, {&(0x7f0000005380)="72e809084ed6ba886fbd53a4e19cd96e85cddf43e1a365c310bfd997e096a5083ab18dcf6e67b11ef510ac59747c1965bc1dc6cde33d91a089dea4b0995df5ca1f603faad0ab251534029b83e96a749c7e68b1d4d28e651e01e6c1d3a245c268039061bc26bb48c75aa34a9fd414e4f50680fdb1b3637b6659726a322ec5b052461e753d5372689f1a3b77ff43bc36d9e3709958f052e3a83e89262f67c87e459561a6a95c9d6504456ffaf06f159a", 0xaf, 0x3f}, {&(0x7f0000005440)="92b6c61f4ddbae70802512d7ce70031e56e47320867bab08e534f67e37225865446b94c2336507fdaae60c8e3d9a28893b979849531f054d84b3308a22ae96068eae7fe23f6e214662f1e93cc84bd04cb9ea0df7187611d1193ebf8394a07418350b5efda33f9059f1fd84e7d8966c0961b31469348d3fea26fc0f2cff58193e82131da6f7e410028f6240f395bb9f90da936497665196442985641f9ea83d28d082d785da1dd5ae95c606fb8443817e9e", 0xb1, 0x3}, {&(0x7f0000005500)="20d75fde13574294e5eb2798c8105307b29fdafc5962f433cf45dfa92c4a07e935c8dc3f86329aa1581aa9e6cb9131029014ce4a7c3b09eaab2ca57d4636250c9646e14aba997cc6d1239887f21426b06c16389eb2a6f5db37691bf8e12ed986b1b8eac5aeb9587a048b823948458669a5965b7bd4ffb397b849c33acc6d80f35908276f232acfabc8924125ffe9d6384fd3371dafa13d9409abdad63224", 0x9e, 0x5}, {&(0x7f00000055c0)="5cb297e01b61cab8d3d2de0a7bf9e3f29181ab87492f0a8fd0fcb5ea8eae45a0d7963bd351d3f840b8322c91f86d92fcc76a7550440df3271ef3baf82263ef4aabe5655dec2dbdd790f904e046b6118e6d6d7563c6978dd67c6676f6433363a549dc27a8448f5e69a76c26a3a75a89ecae82bff3b2dbfbd4f23d8c6c6d6fbda1c93d9f85d358238359c6a7fcb455281be956debfb68d1d456ab4fca59f0f7c7f1e", 0xa1, 0x40000}], 0xb, &(0x7f0000005740)={[{@gid={'gid', 0x3d, r4}}, {@part={'part', 0x3d, 0x1}}, {@nodecompose='nodecompose'}, {@part={'part', 0x3d, 0xef}}, {@creator={'creator', 0x3d, "d7600301"}}]}) write$FUSE_INIT(r1, &(0x7f0000005080)={0x50, 0xffffffffffffffda, 0x8, {0x7, 0x1b, 0x100000000, 0x20002, 0x0, 0x4, 0xfffffffffffffff8, 0x61}}, 0x50) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f00000058c0)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'veth1_to_bridge\x00'}}) syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000018c0), 0x10421, &(0x7f0000001a00)) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) rt_sigpending(&(0x7f0000005880), 0x4b25b16ff35a10fa) 08:52:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x566}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x8dffffff]}}, 0x1c) close(r0) 08:52:10 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xba9}, 0x28) 08:52:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9b}, 0x28) 08:52:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x0, 0x2000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:10 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54550100]}}, 0x1c) [ 1473.131157] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x0, 0x2}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x13d}, 0x28) 08:52:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x885a0100]}}, 0x1c) close(r0) 08:52:10 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7d4}, 0x28) 08:52:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa9f}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1473.274845] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:10 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x100, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:10 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x163}, 0x28) 08:52:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xac20cd99]}}, 0x1c) close(r0) 08:52:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x10) 08:52:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa86}, 0x28) 08:52:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0)={0x1d, 0x0, 0x0, 0x200000000000000}, 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x90f}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xfc]}}, 0x1c) close(r0) 08:52:10 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6dc}, 0x28) 08:52:10 executing program 1: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='GPL\x00', 0xffffffffffffff9c}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x0, 0x8000, 0x42, 0x0, r0, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:10 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}, 0x1c) 08:52:10 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000040)={@remote, @broadcast}, &(0x7f00000000c0)=0xc) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xc00000000000000]}}, 0x1c) close(r0) 08:52:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0xf, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x455}, 0x28) 08:52:11 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x743}, 0x28) 08:52:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x58e}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1474.127209] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1474.131308] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x202cd000, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:11 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0xa, 0x7, 0x8001, 0x3f, 0x0, 0xffffffffffffff9c, 0x4, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x18020000]}, 0x10) 08:52:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x900000000000000]}}, 0x1c) close(r0) 08:52:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6b1}, 0x28) 08:52:11 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x31a}, 0x28) 08:52:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4e4}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:11 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000000c0)) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x452, 0x12001) 08:52:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x20728010, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1474.846630] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:11 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c) 08:52:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x164}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:11 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x8, 0x8000, 0x3f, 0xffffffffffffffff, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1be}, 0x28) 08:52:11 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3a7}, 0x28) 08:52:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe8030000]}}, 0x1c) close(r0) 08:52:12 executing program 1: r0 = accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @local}}, &(0x7f0000000040)=0x80, 0x80800) getsockname(0xffffffffffffff9c, &(0x7f0000000140)=@hci={0x1f, 0x0}, &(0x7f00000001c0)=0x80) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000005400), &(0x7f0000005440)=0x14) fstat(r0, &(0x7f0000003140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) sendmmsg(r0, &(0x7f0000005280)=[{{&(0x7f0000000200)=@ll={0x11, 0xff, r1, 0x1, 0x2, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="1a5b969ce2c95d1d3f4db4ee8ba3a237c827b530f65a9d1e0fe108967dcdde9e0b5f542b0a14d96b02650c1df12ff748c0266c593c2816ab8ab6cc7fe73b4a6721382e37ca6d31d9a594cf762fad7e7cd021b4715d5911f8086e47860f2da14e90f1d2fa4ab9aad74cc4029b76b5651b5d3f06bd5ad5c41e2bbcb97847c6de1e5524107d05c7b334c7e4641c896d7c2961ce6a4b8961d808b271a83281faab853ffd8ab2748b882c7a59c57041634c2589fc5ec5e1ce95588d25da2adcf7bd451b69f6a84c30cb9ab3efcdcb2939fb6352247794600ed1e9cccd5c05b50135be40a2baf0de62e0817023fd8b", 0xec}, {&(0x7f0000000380)="f93801be02a07ec3837244ce343244dc501c78bfa620dd34d4983e55a3a987298440182d524c4ff9a098d22f53bfc4862818cdeb3597be8f2c93", 0x3a}, {&(0x7f00000003c0)="9d0066650e96e9893f9d5d140d7d32a09ab72ebbd261fead2c0857b2ee0f4d558d1a0fe40bfa1858bd0a672ad4ee948f3f2c6255e738c48bb44978ed93769a28f5d1314a93b6c69452a2445752687744138a373689de06f7887cf80a8b88ad1e388854f1474c0eed69a956bbe8ee3d96165d46dc23b487f56c0ccf6424dd9b3ddb36c5530b7e086fda", 0x89}, {&(0x7f0000000480)="3771fc469be8063c867d854af191a45e39172b4bdd62fa95631790f08fff7bcaa47284eedced624f7b3ac7cc73edbe4ea1c70a06fd921428334d5f83a17f068138f2cf12ab6627e89df6dd16ff6b2028d61493de6f3944b99129196a361cb02b05ee9f5737e5c69e311439eaf7d82a1d63da2fa659fd65459364a01fe4b9cac27c328e5a31b84386e593f026ca42f438631746da2c6a615cac1873931e0e83e9631bdc26e2db5c8b02d02556aef59fd4", 0xb0}], 0x4, &(0x7f0000000580)=[{0xb8, 0x117, 0x2, "be739f0fe89f161bc05db71dc355cd836105b92f7f4a047350c4a50eb5163f7a9d1fc49e5969853d25331688958d820c0d450bc458f3d53c67c966e15d2d4be2c3eb6466a29b6fdb6a25f45b0fbec148365fbca2a2dac551afeb7a235742e80556a9c073816db5000c04427ed9396853f977d0cba59c9536bf762027aa797bae30130ed4b88c5d0e54f4920a656d28d81ca88a35c380d974c54ceebe2ea1b9b899153c"}], 0xb8, 0x8000}, 0x7}, {{&(0x7f0000000640)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)="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", 0xfd}, {&(0x7f00000007c0)="7e7c87528b396161da4b20dbdafff953a58f1887e7b3dad545c2e055d01f72104e187ea538755d359519499397cc4fb4cb4d54184068c533c74eea6af2a65d5392178f2a949a482de02bd318a873a4057240f44fd6b6993d3e545fd4f66c5e04e7e5382a0b6d9ecc9c6b4af181890a75225fca973cd9ff239b06b3650c927144e5482820afd4f5f01fb7e21c52a4", 0x8e}], 0x2, &(0x7f00000008c0)=[{0xa8, 0x10d, 0x0, "3b3528f5c49cb09b14b453031e963384f11f34cb409c900964da8d9e1491841c221173b6ac1ceb80fe405249f47046cd8151c1ec55b8ef22ddc4bc04ace75568f8cca97038724f287a42495b0ab5c19c665d3d5f3bc2c8f43f709cfbd1e2805f21569448dd48d27fd4c572a3fbc2bdc7e1871f27e68de3e178f3581e30d5f69899c1400285797502d5a3265b9f4038e39ab67260368c"}, {0x48, 0x10f, 0xa989, "52c56e086c6563908f16ad4894a6b6cb619248eb7895278ec42901a68f6c640c07f51ba108d2f35bca295bdb1712ec8b77f410105ba47f"}, {0xf8, 0x10d, 0xfffffffffffffffb, "1e84810e0843056a315edaf36c2307eda30e70abae30f2bd49991afb7b91b0bd41427ddfe00293823cf0a7b56ff99f7ac8a540398e01a9f0bf893e0f91f8663692f944f49b192e9188b598ca8807d4af88b816ab4422e3653289150eafac637fd6b25b4e5eae01c966e0edd783a2c830c891dc6f78417973e6831915db8423c1c49dc8ad05e37b7bb4cd2dc84d9af4e2a9f20d7f607a638b1edb7145474a94fc5d6192b7474b9e5d67f9dc289c8506cb30cce7ca0a40ad613d702c9fe37667e194acc9c3f010950a68a1c37feb3e3c3fec241f94dce597dd81cb7050c31edb21c76800e8b2"}, {0x40, 0x10d, 0x10000, "2059da0fa5fea19ef868bcabe9055f29da4ab82c085e98663e9bc4cefd0bb06cd8994e70083831804844e512805b7fbb"}, {0xb8, 0x88, 0x1000, "ef36b5308136ccb6969bd0c0914f7cacdc58a362adde6b45fb9f758d2ad330911b03db59f1c3db307419522c8f69fdd71b781894d0e1375b1918d385e96b326053ab16f2724065c486515d5fa11516cd483f79ccdc462f7397d7acf8d7a24ee11b21b4ca2878554c19740097d6dea07ef9b6e063a83260c854eaaa599f2d33319d03841f3b264fbbf332f4c55fc58699d5f856f3ab0f312614f66ffda3ce6aff1e3830"}, {0x108, 0x108, 0x3f, "58c8c8860ebfc1e99238d7a854a462529078a9abbf033f5b5806e39e1c2474b3f04ac385764a95d347b57a4fdee23b546bc8f23785efcaebe325b4233f08f3cc76ed893c067816cf6829651d51ccd83613a5775a6cd415e22c5f6a4920ae0bd9793a980ad7be02759197dff177e8d37ddbf3a1ec68ff072d96166efeec6b9457d6dee900225fda00cb1f35de4ab00782d520df081b26057c8f674dd7626d9fe4e7c31011ec586f52206757088d4d075784106dc2071f0c16d4301c88973636e634474752b3ad0f1d136f7aabfdb630a167a753a83f9979547783abba1c336eaddce0951cda367b8985fdbcbc99d4b33749286106c0e7d01a"}, {0xc0, 0x0, 0x2, "ef22e0fdcd9f8122493b3da7e3965245f2bcab3000cd41490c9c63c63016a799da0ca5092095f7a2a4a5400515009d5076508fb6423260de8863db8d4f0fda38e130d4cb31b88edbf3bbbe8be1cc72b7b42ac9292a98abac4ec1429f1c3d28f932819821d4d4fd95f584f625125e5318853be1cb08de5c50a13dde9215e03b3a86dda74b92d951e6c31fcd9652aa2f1ba4dbf5b18e37744e3c276e10cbf94b67e8a13a88d6c4a0bdd7"}, {0xa0, 0x139, 0x4, "3c08b70328c91f9d830360681024b5fe785bd0d09215c10a66784f4a23aba571eb4d8888cdd88c202d7882206b3d107ab0af909c7f40059ea10e2f8bab0f4c76e04e0b4e1a1c3be9ca049167dbd29d2e008e1f4a4c80b495659ac510d6aa2645f4cd3bbd3cd57ec136d13fa99d0ed8332d099ef746bc665d49d937de90c54447e4b396d7990665da8636256ea68261"}], 0x548}, 0x2}, {{&(0x7f0000000e40)=@pppoe={0x18, 0x0, {0x3, @remote, 'bcsh0\x00'}}, 0x80, &(0x7f0000002140)=[{&(0x7f0000000ec0)="15d9243a803b3889eb132ae383f615e7016fcda1a3de409b61302d047893a01a9ac64e9ddc0bb12c", 0x28}, {&(0x7f0000000f00)="2612cbf01bc0ce6a4c042cbd6296167dbc779ae65ed6891f201da5e1e26dc85ea09db459793ae8010df1de420d0e9db9f1ff2821011b81b0550c21e0d18345e321d4e7a87a109c9c7977a54dd1102be3948ecacebcfdaa18e04561506c8286a63d0a8366d37edf0ef64e578b3b92428d0918fc67feeddfea85641e4178047f9e9748a514dc6724926eda71546ffadfb40331aaa8e182b79bc9ace218c484ba43596448e7baf2051f29de25e7e836882caab0b55913792b14392a6e53b8c740cecce27053706dba9c24af982c2f8e537cd9d6257b5cc5f0eac769fc36", 0xdc}, {&(0x7f0000001000)="4a20706789db8eb4bf681f17f72b6b39562c5d377fe6bd45fda908a8ad48e7613158d2d1a9b899b51b3716c5ed", 0x2d}, {&(0x7f0000001040)="f35ec1bbae76a77e6ad0a8a22d340189944fa459b032597240a3fcd6d5476f0b0c06730aee5ef6f8967811fb3f737664e1e29b4ee6831e461379d4c8da4702abda62a134c211c53b8ff1d7d6ff544c9863e97dc958ae97640ea8d93385215602fabafaf47932f1779e782a76deef92141256e34ae1f969ddd5c8b1725b5ee483e694bba64e4cceddfc05a896ce42827825f95710d3013dbda38d1e1319f705c369f5a590e1ec16bf47133398abfe9025f9b039dc3b4c35991917cc2269b51a6205", 0xc1}, {&(0x7f0000001140)="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", 0x1000}], 0x5}, 0x9}, {{&(0x7f00000021c0)=@nl, 0x80, &(0x7f0000002740)=[{&(0x7f0000002240)="58b118071e0e54c477b7f599f384887d2ae05acf15d61b5dcf274b430fb89aa994aa3728d06cd9d947e2a2ae09e47924a9548c6c139b74cacd27395f70de900aec5316f3a509d2b2c8aadb1a5b9bcfb6ce73b77cdebb3c1b9faf4cd882112bd01a7ef5c289be11ce66d182478038c059", 0x70}, {&(0x7f00000022c0)="b1cb7f290841959b38e7299d3e47336f9840cd6f0b93c0b41eb0727ff5b982f1c6ede0b6809bf53d419f6bdf4f57281cba53f9ad5977e7c62720414a6d98415e691495ee83de5517280a69d0c2bd5be92d1eb7bb4c8fa074fb9aa2dc24b1846f0ed7d54e1b5b9ad3b7f02f05e9c2e8929ddaff06061506b8f9e34fc05197f2bbb832828002fce976a82896ed65e40600bc891e4161b560", 0x97}, {&(0x7f0000002380)="897fcca15d14590c9e375f2196ad6e4aa8b28924f4cc1a265c7b55063106f352454cf69756fc20f7c6349c13ec172e65e04567d8a3c7fa6e46a3795be2879519d88113bed21278fca77a9e8c445c440fb52649d9aed4aeac179eee59d63525fddb2a4a62217cd46e0c0a8b0784d1433f92f8997f5d11158678fbab7f6d57e835f527c06b65e302de0475fa7533553e7dbc4029ccd9e016fd2b53861a2e248694cf4a6a36e38cb4698557ec0621023a385f66", 0xb2}, {&(0x7f0000002440)="440a6b775cd35bbcd6178b58ef572cac1dc8fbe0aa19c7b9bfa675b62ecdf45f2c9b39653ef3db50da9ee4703827bc3455a82fbc51ec3c9bf54017f2b6f4999d5ad21b3b3def466c34650e0580df5967d734a00d33e681ab67901a5b13aa7cc26a543a0b47c8616332e98cddab09d627da6106dccb6435e6817abc63ee23759d8715cd22a660c2f744311ee44d2d85adaf73e2a22ecc6ebc0b9c1705a357818317832a801bb5ce6203fb52de0239afc6038e2f7ec1eeb94c29", 0xb9}, {&(0x7f0000002500)="680c94c5f3f6cbb4fc3f78e4644e6773f1497771be28b19d819a146f764c949147a5d3b8cb57b8f9f5830d47ad3dde3158d9570fe09a4d9893dbe690a2bade705e16e1753b51618177f34369bb6cf28581b89827c1b0dbbc36f786db9c51725073818d9674df8c613cae19245b7974c52529adc2aee11e622745f573764517e083", 0x81}, {&(0x7f00000025c0)="76135c726382b6ff45b382bc683834016231dfb93b30d12b", 0x18}, {&(0x7f0000002600)="c24b8e186e51a216c3c161bfc4ef33114cdc8cb5fdefce2d47d96211e196e3bcfe05a07d0d", 0x25}, {&(0x7f0000002640)="98106dffe1dcd26a4bed3a739fb3ae740d9042cdffa52762bee1bad9477a3a926ab4b0306cc16f2d231dd34fa0846ff8df97708fc9b77ad664107245fa908c5ea3931db58bf917f4eb521c51c7b5032b1bef16c37b30db8cd17b7ccc5337b05015852320e425137052fde2ae69c9b8928addd0b5a06f21998b0982ede67f2230beb449f9af31ca4066d8dfdc4c88604397b825d08d817e4aee8cb032177a521784d3c5623432a20549f439a7469b42f9fb57e26b65b1a88f58b0b7f18165537a9c8ef81c8d7bcc0fa29bccabafcd464e5aa011dce8daa30567b6bcf4c89e9cbba63c4a3098032ce7493d4da47e709bfdbfdfbf", 0xf3}], 0x8, &(0x7f00000027c0)=[{0xe0, 0x107, 0x1666, "803fa005bce7bd5be276d9a5c9e548413f2a51ce196d608c042c2a944d4bcedfac7e0beeeb939624efc05a27d4a26a9e55bd6452431b95b4382e634b00326233d27cd79119de094d9c4ff10467b4390599fa80ef2ffd76650e803fea2ba1b231bc386adbf2d3d1029a611a81bd5eff8968c64fb193d07bef14e751c04b3ca90d0850d0563e849d875b60ef1f2ee8334ce3c8bb9deb1669655a48e8e04e5439626d210f0666e39955ffa27b8fec1140367147fc49a21952dd85814d1a530d50b451d7ee73f956cd36e1"}], 0xe0, 0x4000}, 0x4}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f00000028c0)="0b6fc9800b2ac29143829fbc2288cf2c435e725a3b3ead60c55e6b82f980271edec939bc8dc1260c060fdd4c41fb5025fde621667ce7bd6945a1301a2ba8849578332cd53b6551f11bdd41bba4c2e05014ccf01cf43c612cf67f2a871adc4f36611155e2b3072eacc9eb652b0014815386546772", 0x74}, {&(0x7f0000002940)="2c521a2e793c95e35d6e74d6dc0fee195da2f7ffc4a6047bd7535a7beab0d9ae33ed5e3831f5ffbcdd913db1b48cdce1db54132713b0bad487bedfb7ed4f3fb56cc1b92ad41a9dd2084a2da3940fcd55f17c7ed27c51016fc1d292d76885b621fdec0b69445026e852eb92375e152153da2cdf02976457566c0fb9f417358cef4b05acddeb2169f147100d855f4f23c88fec0933e75fe3d6bdc2b47248a95c57b323d4da3ac48cb00a4e7631eb238c52b900784a3130e42eb3ca2428be7263d35c69050167bfb7a6adf9b55697d958fe4d10e4e12f2937b92351a51bcef981eb339840767e52978d9c84567b82", 0xed}], 0x2, 0x0, 0x0, 0x408c0}, 0x4}, {{&(0x7f0000002a80)=@vsock={0x28, 0x0, 0x2710, @my=0x1}, 0x80, &(0x7f0000003080)=[{&(0x7f0000002b00)="24ce0ced0dfb780c2905fc701fa115f7fa7b36e819553231be85c7bf2688404104d05549f0c0ba07efdd034281392d18dd740aaac925d4d6a44c3609b0f77ec6686d1e27cada746c257ea2006cf31b5da6967563212836f1305fbe5a5830b7d7164c825ef1d0083d7706f50b298dbe9a018990c445be643af9773bd4978adf8bff2ba60700e035e42c1ddeb0964256eaf47239488694aa0cbbaf13e8bed53d80cb279f74a9d81ed7a2f1453701780e3da7e69cb670310f86eac508e2a511b981a278e17755e3760644f4", 0xca}, {&(0x7f0000002c00)="af7756b5b897a61aa650828c79e923d6c343f9cb56b52f2d2fc16f9cda23437d761ae033a0da67b9e0e2c9d5beebbf1da15c5220b5f6e0d1be465767dc65ad3f7ed987d50c1f1f32ebf41ddf8910c266b6c0d23023a200cc614c82076d23d7b8da04c9fbe6c6b1a55dbdb0d6fc2c3e2f390063b532b9c3400cda7bb68aac7ae2d29c5ca9c67def72ad1f42e6ad13abf51a9a6c58f38af3e3d8f70445df4abc615158f55edb9124d5b86cbab8162639e26a62bfb49abd662201f673f016da5390e8bf9e8f45d3b265e6b8cd8423e1899f69c0177088c67b84752928bada11a08f6690518f823ae972068041a38dc3", 0xee}, {&(0x7f0000002d00)="436bbc5e6390388749a89025a73ea034c1a7a91ed8f8e5f0304afaac92343fb69a8c62781faadfb7272cb0d1b0417910e0f6", 0x32}, {&(0x7f0000002d40)="ae2d72f1e2a10918f831d767515155a5c050e5b63011cdec6111a5bf95ec8d8304e3a9abf6e605cacbb0c116448040478cb2cd19e7418bf638875ed34a97f0fb67ddc651717c1a7b8859576ff951821b93736335fcd8405de7", 0x59}, {&(0x7f0000002dc0)="3c17d6bcd86ee6", 0x7}, {&(0x7f0000002e00)="5fb7291f3dbc24448c5b668177d36afc6e262b6becaa84cb96309267d32a730d380b29c2cba609e2e99199f92e31da15967273aa961a68bb1b987a9c28a46730", 0x40}, {&(0x7f0000002e40)="cd183c4ce30387678506fd64fa7d3f5b24f303c6e2f593851ebd06fd2a9dacac1a5919996bf9c01e6767db0599da420fbdb8a983cf19bf0206bde8f3547e45ade2899ce31337bfa133a8497f00e5d0652e27c971e5d6f9f07757ea58f2654bd2396b81c32a37e51d77f7814da11cca0079ab0a3e69d9df608efd8b5c0755e83f97b8b26af34ad14f6d30fbe55afe8f6dec4abe7c9e718d9b36f8de32cd736969ce04df5b5e2116446347b0970bf513e018f49eccd6cd8ad98422f6fb2d4318c5aefe49a6d6a99969f671ce4eb75687b61e0584eafba3", 0xd6}, {&(0x7f0000002f40)="3072a0960556f18b05b57caf103a8b6961b60a", 0x13}, {&(0x7f0000002f80)="d45aba1297e6a25fe4e7b38d7fc0e0d737d347496fd6d44aa2bb7f4ead56ebe5730bc38c57c4b72fb69fe4104c83ecd7a79d8142d107aebbfd9000dd1248fae00394b1f2f9a4d5fabc51b57c43f900da5146fdc8d3dee3653a7b7fb6a07a4e155675b99ef964ef74fcf65d30797bfce4e69d9eea520852104e971061ff1e66dc688f748c137c225391c737acfa316ac0a79c0ba4076ef970ad459bbff28ec4e450fe78653ff7529eb5f27a6d4629e0d68a498a197f7efe3238fef01455a2beeaf5a0193b7e46586b3e18429e11742388ed971cf911267633281fe07e4473dcb15d54e6b20f0fee666c9526ecfb5478f9ae3c8c80e9b5", 0xf6}], 0x9, &(0x7f00000054c0)=ANY=[@ANYBLOB="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"], 0x2138, 0x8000}, 0x8001}], 0x6, 0x80c1) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000005480)=0x1fa, 0x4) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) setpriority(0x0, r3, 0x9) 08:52:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1475.179122] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x10) 08:52:12 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1041080]}}, 0x1c) 08:52:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x652}, 0x28) 08:52:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:12 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6eb}, 0x28) 08:52:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x55550000]}}, 0x1c) close(r0) 08:52:12 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x80, 0x0) r1 = dup(r0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0xb, 0x8002, 0x3f, 0x0, r1, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) [ 1475.753402] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:12 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x40, 0x40000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x8) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:12 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x19a}, 0x28) 08:52:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:12 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) 08:52:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x79c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x419}, 0x28) [ 1475.828792] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1475.939154] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xfc00]}}, 0x1c) close(r0) 08:52:13 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1de}, 0x28) [ 1476.080203] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x10) 08:52:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x87}, 0x28) 08:52:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6ac}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:13 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x400) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x8, 0x8000, 0x0, 0x0, r1, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r3 = socket(0xd, 0x7, 0x2) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000100)=0xffffffffffffffe0, 0x4) fcntl$dupfd(r2, 0x0, r3) 08:52:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x11]}}, 0x1c) close(r0) 08:52:13 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5a8}, 0x28) 08:52:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x416}, 0x28) 08:52:13 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x459}, 0x28) 08:52:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x500]}}, 0x1c) close(r0) 08:52:13 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaaaa0000]}}, 0x1c) 08:52:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2c2}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:13 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xc, 0x3ff, 0x8002, 0x40001f64, 0x0, 0xffffffffffffff9c, 0x9, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x4f) [ 1476.873898] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:13 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x352}, 0x28) [ 1476.938164] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x8dffffff00000000]}}, 0x1c) close(r0) [ 1477.079444] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1477.131025] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x10) 08:52:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa5c}, 0x28) 08:52:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x818}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:14 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x2c4800) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0xa, 0x4, 0x8000, 0x3f, 0x20, r0, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:14 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5dd}, 0x28) 08:52:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x142800]}}, 0x1c) close(r0) [ 1477.525466] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:14 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x240800, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000040)=0xe8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000001c0)={r1, 0x1, 0x6, @dev={[], 0x21}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:14 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xad4}, 0x28) [ 1477.591956] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x97f}, 0x28) 08:52:14 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x815a5213]}}, 0x1c) 08:52:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xfe80]}}, 0x1c) close(r0) 08:52:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x574}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:14 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9b5}, 0x28) 08:52:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000]}, 0x10) 08:52:15 executing program 1: r0 = msgget$private(0x0, 0x2) msgrcv(r0, &(0x7f0000000000)={0x0, ""/116}, 0x7c, 0x1, 0x1800) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x200000003f, 0x0, 0xffffffffffffff9c, 0xfffffffffffffffc, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0xfffffffffffffeb3) r1 = msgget$private(0x0, 0x200) msgsnd(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000000000000a1cfc1003aa79dd5f464fe41aa5de51cef8349874b230a6ee45d3d978ed5348026e133f301d647fd51416702fb4a4fa8ed8fa2e72a5016b620b2"], 0x1, 0x800) 08:52:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x643}, 0x28) 08:52:15 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x85f}, 0x28) 08:52:15 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18020000]}}, 0x1c) 08:52:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x1000000]}}, 0x1c) close(r0) 08:52:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x345}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x87b}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1478.464802] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1478.466645] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:15 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) set_robust_list(&(0x7f00000000c0)={0x0, 0xfffffffffffffff9, &(0x7f0000000040)={&(0x7f0000000000)}}, 0x3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200000, 0x120) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001180)={r0, &(0x7f0000000140)="fe1841c1e64e8c248dd73508bce345581f52e4bf9dc6faff4d735072b19d331057c689cfd22c579041225c92d7db5bec87048521bc3d2ee6234065f3", &(0x7f0000000180)=""/4096}, 0x18) 08:52:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x6, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:15 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa07}, 0x28) 08:52:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x202}, 0x28) 08:52:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x7000000]}}, 0x1c) close(r0) 08:52:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x262}, 0x28) 08:52:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x7, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1478.814113] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1478.874220] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x10) 08:52:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x60}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:16 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x4, 0x400000) 08:52:16 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x86c}, 0x28) 08:52:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x2, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x701}, 0x28) 08:52:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x600]}}, 0x1c) close(r0) 08:52:16 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c) 08:52:16 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c) [ 1479.362881] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:16 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r0 = getegid() mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x20000, &(0x7f0000000100)={'trans=unix,', {[{@dfltgid={'dfltgid', 0x3d, r0}}, {@fscache='fscache'}, {@cache_fscache='cache=fscache'}, {@cache_none='cache=none'}, {@loose='loose'}, {@access_client='access=client'}, {@version_9p2000='version=9p2000'}, {@access_user='access=user'}, {@loose='loose'}]}}) 08:52:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1a1}, 0x28) 08:52:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x3, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:16 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xab9}, 0x28) 08:52:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x578}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x240]}}, 0x1c) close(r0) 08:52:16 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x1c) 08:52:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x10) 08:52:17 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x4000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[{0x7, 0x48e}], 0x1) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000000c0)=""/89) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0xa, 0x4, 0x8000, 0x2992, 0xfffffffffffffffe, 0xffffffffffffff9c, 0x80000000, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x4, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:17 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x479}, 0x28) 08:52:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x14280000000000]}}, 0x1c) close(r0) 08:52:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9e4}, 0x28) 08:52:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x51e}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:17 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}, 0x1c) 08:52:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8e0}, 0x28) [ 1480.238747] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1480.255454] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:17 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x77b}, 0x28) 08:52:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x902, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x950}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:17 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0xfd) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x12, 0x4) r1 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x7, 0x3ff, 0x2f7, 0x5, r1, 0x9}, 0x2c) 08:52:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xf5ffffff]}}, 0x1c) close(r0) 08:52:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x908, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x47c}, 0x28) 08:52:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x10) 08:52:18 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2d8}, 0x28) 08:52:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x32e}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:18 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x401, 0x0) write$cgroup_subtree(r0, &(0x7f0000000180)={[{0x2f, 'memory'}]}, 0x8) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x25, 0x2, 0x13, 0x1e, 0x6, 0x0, 0x6, 0x9e, 0x1}) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000000c0)={0x22, 0xf, 0xf, 0x5, 0xa, 0x5, 0x1, 0xf4, 0xffffffffffffffff}) 08:52:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x8000a0ffffffff]}}, 0x1c) close(r0) 08:52:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x2, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x457}, 0x28) 08:52:18 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x1c) 08:52:18 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x752}, 0x28) 08:52:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xff0f0000]}}, 0x1c) close(r0) 08:52:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x179}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1481.192840] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x619}, 0x28) 08:52:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0xffffff7f00000000, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1481.296671] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:18 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x474}, 0x28) 08:52:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7f9}, 0x28) 08:52:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x715}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x10) 08:52:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x800000000000000, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x4]}}, 0x1c) close(r0) 08:52:19 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7f, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r1, 0x10, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x12}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 08:52:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x19f}, 0x28) 08:52:19 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x203}, 0x28) 08:52:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x528}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0xffffff7f, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:19 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}, 0x1c) 08:52:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x8]}}, 0x1c) close(r0) [ 1482.298898] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:19 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9d7}, 0x28) 08:52:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x367}, 0x28) 08:52:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r0) 08:52:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8a7}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x1000000, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:19 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0xffffffffffffff14, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) [ 1482.501893] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1482.579990] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, 0x10) 08:52:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x398}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x78b}, 0x28) 08:52:19 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x35f}, 0x28) 08:52:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x8000000, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:19 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40102, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/49) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f00000000c0)={0x3, 0xde5f}) accept$packet(r0, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5]}}, 0x1c) close(r0) [ 1482.872341] Unknown ioctl -2146941692 [ 1482.892144] Unknown ioctl 1074310928 08:52:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x8, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1482.937170] Unknown ioctl -2146941692 [ 1482.948926] Unknown ioctl 1074310928 08:52:20 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28570100]}}, 0x1c) 08:52:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x3e8]}}, 0x1c) close(r0) 08:52:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2e9}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:20 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa4c}, 0x28) 08:52:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa5b}, 0x28) 08:52:20 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0xffff, 0xffffffffffffff1c, 0xffffffff80000001, 0x10, 0x1, 0x100}, 0x2c) socket$pptp(0x18, 0x1, 0x2) 08:52:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x100000000000000, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x200000000000000, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1483.206024] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x10) 08:52:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x700]}}, 0x1c) close(r0) 08:52:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x962}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:20 executing program 1: r0 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r1 = accept(0xffffffffffffffff, &(0x7f0000000280)=@in={0x2, 0x0, @local}, &(0x7f0000000240)=0x80) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x81, 0x4, [0x3, 0x9, 0xff, 0x974]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0xe148, 0x5, 0x4, 0x49, 0x70, 0x3, 0x86f1, 0x5, r2}, 0x20) 08:52:20 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x85d}, 0x28) 08:52:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x447}, 0x28) 08:52:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x2000000, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1483.725462] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x327}, 0x28) 08:52:20 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x1c) 08:52:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa19}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:20 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6e9}, 0x28) 08:52:20 executing program 1: r0 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) dup2(r0, r0) 08:52:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x300]}}, 0x1c) close(r0) 08:52:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xaa9}, 0x28) [ 1484.078505] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1484.116020] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4c1}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1484.136727] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x10) 08:52:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2d6}, 0x28) 08:52:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:21 executing program 1: r0 = inotify_init1(0x80800) writev(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)="f6639f4605224287210137e6047b3c0a9b806836b522e1c72f130ead154031f6f40e4cf16802c898392c51a682258707612e301849739171bf60096b68589726ba32285013f15791ae4cccf3e7c358f06a5b5f9271c2fb44d8eba147eb809458563b777595a1b6a34d4e4719cb2d6df3694ec64be1b36a8a2072b6328b8e5c2e704b2a66153adc92d072", 0x8a}, {&(0x7f0000000180)="d572bddae01ec58b4f6264938b0d45eca8291880165e8b63fdccf7a26355b03154905c2cb4871c779ed88c7a8a2c1d7b462d23bc1cbe306053a1d369e9a14ec8953729bf621f645e8621d95cb603295043012367b2ec8fd381ee57896f9c369c8dafcf27730dceec9f8d47de65320720ca0cec1534ce2d8c4acece014bd25a3554c39c8e4a2cec0c7d538a0492fee4db2ad92cc038381382f42814eeafee652a12521dc96e935a963ec61fb4051e3b9e1e5026d56e354186dc017bb53bfbfb72f7185fcb781bcca26d56307672c3cb095c61f45695aa285f397d8a4e78431f97b8463142e2ffcb7e0dff23bbcbba685f1e4eb7", 0xf3}, {&(0x7f0000000000)="39a776c8851a29c583ce407c4ba9f4467b6c71f54c73eb934be206c7337a85ebd1fdcf1f6683606f2893f18099c713e3e7b16fec46418473a4e14f", 0x3b}], 0x3) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:21 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x29d}, 0x28) 08:52:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xc4ffffff]}}, 0x1c) close(r0) 08:52:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x36d}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6f3}, 0x28) 08:52:21 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}}, 0x1c) 08:52:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfe800000]}}, 0x1c) close(r0) 08:52:21 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x92c}, 0x28) 08:52:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x87a}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:21 executing program 1: pipe2(&(0x7f0000000000), 0x800) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x27c}, 0x28) 08:52:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1484.975485] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1485.028520] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:22 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb1c}, 0x28) 08:52:22 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0xa, 0x8, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x67b}, 0x28) 08:52:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x10) 08:52:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2b8}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x4]}}, 0x1c) close(r0) 08:52:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x99cd20ac]}}, 0x1c) close(r0) 08:52:22 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf00]}}, 0x1c) 08:52:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x92c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa00}, 0x28) 08:52:22 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x13c}, 0x28) 08:52:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x8]}}, 0x1c) close(r0) 08:52:22 executing program 1: r0 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) close(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) readv(r1, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/161, 0xa1}, {&(0x7f0000000200)=""/171, 0xab}, {&(0x7f0000000040)=""/56, 0x38}, {&(0x7f00000002c0)=""/84, 0x54}], 0x5) ioctl$UI_DEV_DESTROY(r1, 0x5502) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2f00000004000000000000000000000003000000000000000200000000000000070000000000000000cb4600000000"], 0x2f) r2 = gettid() openat$rfkill(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rfkill\x00', 0x40, 0x0) sched_getattr(r2, &(0x7f00000003c0), 0x30, 0x0) 08:52:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xe]}}, 0x1c) close(r0) 08:52:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3be}, 0x28) [ 1485.930346] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x16c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x240]}, 0x10) 08:52:23 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7ec}, 0x28) 08:52:23 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, r0, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x4e3) 08:52:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x300000000000000]}}, 0x1c) close(r0) 08:52:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x31f}, 0x28) [ 1486.431482] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:23 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x1c) 08:52:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x728}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:23 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x80000000, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='\x00'}, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) 08:52:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4c}, 0x28) 08:52:23 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1a7}, 0x28) 08:52:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfe80000000000000]}}, 0x1c) close(r0) 08:52:23 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0xb, 0x4, 0x8000, 0x3f, 0x800, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) [ 1486.792051] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:23 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2fc}, 0x28) [ 1486.847797] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x29b}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x10) 08:52:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5ae}, 0x28) 08:52:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x2000000]}}, 0x1c) close(r0) 08:52:24 executing program 1: r0 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x8a, 0x800, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r0, &(0x7f0000000040)="4535d7e5fc5f8eff8a52bc9f8763c5a5c87cf30855b9d1bd35e35e24283fd01d775cb701084d722df3e86b46c9b2fed9280c7aa8ef7201466b162b7878beb5db388bba27159547c953f1f2f64a05f1198c3f80f83a4959289c82c433df2bf38431e226ba3704dd6f2af1facd45682ff70baa3eaf0086f592aa86d6d46c1a0ba275835f07cea7753c292cd38eb5ed821c23df254fb470515c85d5aab159a4c8ea80d5069609f4a8c7b20387f5b3abbaaac52ffba08a9e7b23bb7f3bab7cc44e9df22ff2650f32d58441e74ff9dfea80f31139d694c250e504689c2bbe76b98f09ab9deb1c69249f6ba828c6a356d41d1ada6b46335eb5493a1adcfb35c1b850891a7b8a62cbcd58c4724a1e8688036fd0343a814ad18fab7006528636247335c375e7e37668c5e164afb57c25370c26828c63a3f8857cf1547d1b7119dba61a226d608a2e2b6a0e4995a2a4ae90109dd67841f54a432e2bc512349e749e2a421fab3001adbbb392945da829eda4723f526f3b4810d7b5c6714a148df84401189d99271e26842976c590ff4278cc17f144bcc92e0bac4931d1f7f7b676606b1a3c7b42bdb8a5b2bc9020954d22b84e032922e2849bd742810c12b0217b17dccac45b2c501b63152837eda4d620e9f1ac872e2bfc4e08f227ad94320ef24f0f02e2c4d6e9b4e63bfa90d4ed35984e4db670e82db930d6ccac91a0801204caa6030d4e5b41de8f47d2aa259f83514e1d24a37a04d4813b549c47fb0b5e90ebae723a4f97875f6d09efea3acf72aa1b05bf993107038ed2b4d650e421c96e43866784c99d068d885836af01fbb1ef2fbd4acc27b5029203209bdc1b713661a2f4d2e30c4f26f1aad12eb618cfd426d864cf0a9b9e3856678c70c777bbcd522c7590b6ae263d515d49e2b959b65b57ab42da40a913cf0e98856fe2dbbb77ba3682f229d076f044a0f41285c2eaee007b5285a77bfc3bf802ffda5913e5c82d4dabd3340c489dbba0b5b1abfd0c7d67e447d4d66f9adc51a259a7d3bec479423af593220a8e32caf57e2f51d967c1c4dfd22b26c2ea259d25389780657e9e8f3d17373646efc3c3247e945e942776c6b08450c83d49fbcb7c0a6b8e2a614bff159cba17d26c6ae3b410d8dd2f4a043e7b6ba18474262b49b0530e5886658ee864aa0f6a371d246db372207f78abc51f4360a142ef10d06542d193518bfc3073a880466548b217cd5f5be50d273af8be6511c4071e8e9af881554135089e05f89a0d2744f27e15a11b48f1207cf4e0045e53f81c1a521fc3cd4e9d5fd4cbcf36fdc56548a03442fb78a7cf0484806908cbd3586a6ac5c13473ccb925ba615f8d2abd7130d77daaf6ab949337023dd36d9f8dfd4270545874706627fcbf8b04c269fce46efd8ec1607a191e37d2003c45592c394feb399adf13274f264890dd212ff90ea7697fa3cb50e2c8b816b2a056dd40405a19ca8b9b05a68aa60fb6a38ea37b49acf58d655fe0a4425932008235f0c224e942cfba73d6dbbe6d103d3c544d7d4d665a5eda1284abe3e245bcfedc351b1bf797f04efa395f03c0ff8baf8fc6466ef09d30ee5fad157cb9f00e4d7e90cd23c0691c335321fca3e01886cbe36dd74c149ea5ee070270407b047a4921fe5aa7594cf50de856f299d6414662248bc6d8c2b921dfa71b04fe9e5b86bbfff347928cfda3c7451c1384eb76bbe20cfc9eb764b991b76b05a282d1f48e8737f1fac80cce10d411831b5c0bf3cf8f00e32f43ac69ada6b5be531f81b21ae2af04443d8e82cd9c5ae6e9fbfaf349bb72c74b5609c6dc7d3bd326ac121137915973b4a18aa3a477a5ca2b3bdc9ddedfee01b0754ca2b7862b50b75188b28d1d87d57751b846d2de07b88877001dac42bc2a84e42e777499b0f1052d97d5d1021b2778a30f5080fbff4b1c2b4860e34b3bf36d5262e75bb37279cdbd98e775516013170fab3998fc6b6a18a3a61a3c0e621b4ae4f62dd400e764fad9d22a1dc4464e0e5bc03acaef9e5a10c8c7e19262adcc0dc4de777062c05b767112810666a5842c08c7d28a872279af55899b8bf9637f3aacda3e157026a00121ab256f79471dc1a5d5f3538939c147d78a70fa862245193fba8be4b2f059743bd9ffd3d4ed54dc4c5efe887073045bb3f44c8150df75698cdec3c4c81501b5ee807a5d51864620b6c0cf8710f1078d4b667370c4bb16e4e479074d9b223a5d633e19704c7e7bfff3e5a1fa2bf79178b31013b74f8684bae64e4607325920d6bf4a015af19ce963d4cf681154add7412c7527b2f33115351f0d8ff44b4ce114d541fa013a287b34c76c2d72f6b8190473cd4f8b03f4db5dc305399ff7dc10ad71d6a79c71fe243f3327c5e747d6c32268ea10677211c39c75b61e15dd74493df20e83df6f98c9e8055ccec56b9c1f5f36709d31962cecf31ca5f8c1ea3437f5684698e9098930a3fa16f77268922344e13a32f052e61e69d6447ae15a8ca902c2dc05ba1b847cec738bb099cc08e2f34b7d1f62f75fb32c9e0680dd308c7702fa0e7a0781442707f68a818a0ae42985a0653b5c694e24fd856f5286f316938a5f40f5fba7b5b6def1b389db5e1e3e9668560ea87130aebfab5c9347b0e94ab1f9662bf56753cac148681ce26119421cd1b293bcccb9e73f6d9aabe64c27d384533dacb90c67e6b6c0c3b1079915771df07220daef3bd9f0816923b39e47706a8c265a6c12d96c2c150ad718a7b06588ae8f82e9599c82096dab9c5f9739dbf0ba3dbc1282998a67acc6371a152890758552f2ce1a63051b4aecb88138e569ddf71ee6ee92aa43fb9f563df52c554ddb9c8282a64b25d4159a28eaf75acd8dfc160c57f636a1f57a2a110e697fb59c72c9a46f6768e89241cbeafc135a277e5305cc8485077c8bbbf4709007ffa93bcd8c9699736b017ed3e1359ff2b1abe54a31c6d5b4a3860fcad278c3dcbfb55d6a15d03a7b1eedcff5997d983bcbb8937a6f6829e396c50cfa1daae404bbb445fea546e77cd5dcbd57a00b2de4f862cf319c4c0fe44312da9e003c22bcd754b51febc7ad7174224ccb2fc7104c2ad373da5c09e36d586a3bccd523644eab30bf237ba0dda9f39793527b5b110a71c88724d2afe97486420056d8d6bdf00d6f7b0866e2f0af4498ceaa743bba8266f63c65b680532cf79597cd87785eae3a51eaddab47a9eae26d070601d8f535d23c02beb2431ff4a57064083d601032ce1deff6e72673c908fa3e6a314926ebddc8f28e814c83de0031d0979e99af68af7987b5c4a2fe1ab1f370a761ec317a3b379fa313257fa3fd9ca479e9d8a70885d4efc78463b7279bc2efe50e4d591e6869b820461a8a56009ada42814a176444aeabdef88fca214249f1aa009d87159033b7400c204e69c0fce3b4e1219638c921e87097d7a8783368105f0d52c316d26adf155fe0c355262b013d7fb9a36f6b6969dc306bb1549d0729e628696b1538f6e1b989a79545fdbe58dcbb973e7324b4e458d7656cb62e6e816df184bc0a18e0f4cf45139bfc162a4e8e6d26435398de142cd8d75a4368d0861837aa2cfdf6abbb770305b3bcc34e9a1c10d8f09ce537c4b04e352d78912879d2b3d9bfa86baa0eaa33a439f5629361ea3168633b136e3d78e1731b9e41064d1b83561be74e19577ed3ab9190c5f5ef0ffd9ee25ecf89133c2696cccbc9d2b23fa1d4d001d513d105d3db59edc9903d1af61db7d9d305dc81c5b582f33e93dca52c7d5d718cc302b0ab7c14d29dce05e51b90a587becc0043d6a694b96a3ecfc4e9811447e3af6b19366c8c4cff4232e3d8d02f82cc30d4f4e59a5ce143f6209abb17f56f27fee3d9445a4e471aaa0147900d6d26c97ef487ff71236a21ba16f8e8e87c36d6f3e680a4e74aafc9090c81a91440945ece00df96f284101f62f67e567e726d270bb87035bc45b3ada39c5c3c9cf9d72db6ce3717e1aea75357a1157822e362656c5c966037aab3ba917f52a871cacc17e6b2748c24547d8e313dd626ebebca3250d4f4f935a01234d9d3d493e205563838f603c67d9673feccfbf0e8f3d4b49bd247c67f458b713b2ddaef9fb1079e1fc509b82c46a562e807fb6f631d0895a1c5935dce489382240e2a7a3edce50deb1379c753a997c6c50e7666d24c0be1bf5e6f1369564a91560eb7b99d9189991bd376ef7ced94270fef28413031ee98ec84501b0e70f05d7c1d39a1e4d27c391dd2dddc680f7b91910b5401e51822fe5981bf00a74ddae366056ef71a7e214558bf637d584d607d18d96919d46c2a12fe3de360c05948ab3b20a07538f9edded691e8e9dbe711e3bad78ac5c5a7b131cd0e6f58deac26ac66ac335cadb796071649c533fcccedd9213cfe71d6657be3ad0bb6f88727206ba8dcc0abfc693f83a9467cadcc547808e2baf20b7ebfdffb01f4affa087a3a59c298e90cc9d990baeb5f8296fbacbe1c9ab5ff8ec95f5973492d6f3d5c653c08f54af22cd7c6581c03df3e75d1eae7d5887129aed15ac3332642924c72e43a5cbcb51d7405b4abdb6ad39a96a935211363084e598e6d935eadecd949cbd6db5eb84d091f5ee80bc29dc80615d090632ef058c2661f424308fd1f8388587de1195f97f16f928ba0e1ca59c596a73c07442236ca58792fc504f4c3d89aeae49a5fc04abc41ea03eff742d332c8fa1c3b8ba15cbb5c8c2d6915dcba6a2d432a2f2b8dbc1f1bd332cd7bb0c1966eca011748667ca51c4529ee6dfafcca691b467bb6e22ebda88516f9dab1aeeb4cea0b383fce9f5b16296fd7668f61b6b269120726ac7f162ea778970cb1d02bc6dbb7218eb164ad612fac3bf52747f6e2cda56078ad1908a8ff932c715afba1fb61b1e3ca3a32201818c2918a6cd8d438aa71fc1bae5c46bd91d6b0fc6c1d4658ca08583829b8a60567da6846adb29919dc34a75d403ef7ed0a950cb223b6a4058f7138c366b4bc6c3c667dad883026d55e6413873d1ad30142054f2e1c76e6d632f044a727d6fec4bc9e6c5f403a6d2eecf2ce5d53d9ef67e902c9e0d86bb355877f0ca94ee88ced73d99bdb7b93ef4039eb79b7a8dbfd9f2e086786e7ba96d33cbfbbc136e1be0534f63027fc6fc23ebca5e57e4ed574c09a666f462c5e7a22b77bc494904b489214b029f818950faba633b773606e149410174dadf7774b929a7bf5c2fe3645dcd558a9641b21290a730263873be4c05b19c6b3523fec7bf3afbb7e82b5ab8ade0d7a77da7d10f42923821c8ca7fadd1d8257463ad1e985a18c2379dfd6a067c57d70d1b2f11b174ed205621ad012c46fdef89454a6304894c69a50411340ccc04d640855e092f4016bcc7a2d0d58e094339583818cc6a6f7bf463a9bf967c9a45b06397671afc359bb6d4d005c454a04786779d632dad016640d053165a1327ed57c6176ccb1b47f2b63ddc4f75808ead57e9b38a482a9c0d19c1a690f6b411ce2721165a56b42ef501dd81b5928515190d4d8fb80c2056a7ac3ea07b4182dedef5f6b640904f8650751db84de4d8c329604a76ccb4a5e0ac7e1bf58cf1bcba1c1792c2a6861a48ebcc9a6827e1e52180ea3d45926b290f30b8a4bca04e00005850733ae4f095696392b7261b073530ff507552888685cde345bc2ea2b0311078c59bdd59c879befb3934a255eedce0f3d147d83821ce2f306f493137e7e74f41c1aedbb9b9c13163a2713fe5a1be9cc5479d56251818e55b24f96b4602e71f856c520f05961fe5069bb62e9f840255a7a0c03a594b7088e6213a576b8034bb2dee1", &(0x7f0000001040)=""/39}, 0x18) pipe(&(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 08:52:24 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x365}, 0x28) [ 1487.285366] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:24 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c) 08:52:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x82e}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:24 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000000c0)=""/82, &(0x7f0000000040)=0x52) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000140)=0x200, 0x4) prctl$getreaper(0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x118}, 0x28) 08:52:24 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x87b}, 0x28) 08:52:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xe00]}}, 0x1c) close(r0) [ 1487.723253] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1487.744182] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x2}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:24 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x3, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:24 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x240}, 0x28) 08:52:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x631}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x10) 08:52:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x87a}, 0x28) 08:52:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x500]}}, 0x1c) close(r0) 08:52:25 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x480, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, r0, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) fcntl$getflags(r0, 0x401) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) 08:52:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x8}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1488.155977] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:25 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8ff0000]}}, 0x1c) 08:52:25 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x90d}, 0x28) 08:52:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbde}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x100000000000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4b5}, 0x28) 08:52:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000000c0)={0x4, 0x1f, 0x5, 0x0, 0x0, [], [], [], 0x10001, 0x20}) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x6d083351]}}, 0x1c) close(r0) 08:52:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x200000000000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1488.632211] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa6c}, 0x28) 08:52:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfec0]}}, 0x1c) close(r0) 08:52:25 executing program 1: lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000140)={0x3, "c2d2b9"}, 0x4) 08:52:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x10) 08:52:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbf2}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:25 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1dc}, 0x28) 08:52:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xffffffffa0008000]}}, 0x1c) close(r0) 08:52:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x8000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1489.008927] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1489.071010] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:26 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}, 0x1c) 08:52:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x538}, 0x28) 08:52:26 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x7, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/full\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0xfaf, &(0x7f0000000000)=0x2) 08:52:26 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4bf}, 0x28) 08:52:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x847}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x800000000000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfc]}}, 0x1c) close(r0) [ 1489.453082] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0xffffff7f00000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfffffff5]}}, 0x1c) close(r0) 08:52:26 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20040, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0xfff, @remote, 0xffffffffffffffff}}, 0x5ecf, 0x6, 0xdbac, 0x7, 0x4}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x2, 0x1, 0x6, 0x8000, r1}, &(0x7f00000001c0)=0x205) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f00000004c0)={0x40, 0x10, [0x800, 0x2, 0x8, 0x0]}) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x4c, r3, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x4c}}, 0x20000000) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000003c0)=""/239) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000200)) 08:52:26 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x65e}, 0x28) 08:52:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x10) 08:52:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x102}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x221}, 0x28) 08:52:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x1000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:26 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x427}, 0x28) 08:52:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x356}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xffffffc4]}}, 0x1c) close(r0) 08:52:27 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000240)=""/239) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x4ed}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r2, 0x4}, &(0x7f0000000200)=0x8) 08:52:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x2000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:27 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50000]}}, 0x1c) 08:52:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x650}, 0x28) 08:52:27 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x24f}, 0x28) 08:52:27 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x831}, 0x28) 08:52:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x938}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x64f}, 0x28) 08:52:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x100, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000180)=ANY=[@ANYBLOB="090000000c0000000600000008d1ebce892d5fb08c9467503caac9f2cd3c584ff54de5cf31af02a23cbceb9e0d1d75d50f6ce8d2d86387734e9382c1e8d1c2c00e3efe2ccd98ba99ad7d77e72f94a3faedade93027004b6cc297f3526ed2ee7df1ced8977d3ea3abee3e947b3662b7e41213ffffc075287d130783667721c80919bff6f2753ed9bf132eb7a1ed848879a7784710ad5043"]) r1 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x6, 0x80000000, 0x101, 0x0, r1, 0x2000000}, 0x2c) [ 1490.414388] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8001a0]}, 0x10) 08:52:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xc4ffffff00000000]}}, 0x1c) close(r0) 08:52:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0xffffff7f}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x999}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x658}, 0x28) 08:52:27 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) membarrier(0x20, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfd, 0x80}, 0xc) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{0xa2ae, 0x10000, 0x6, 0x80000000}, {0x3, 0x5, 0x6, 0x200}, {0x0, 0x95a, 0x48, 0x2}, {0x2, 0x4, 0x0, 0xfffffffffffffff9}, {0x2, 0x7f, 0x4, 0x81}, {0x6, 0x64, 0x8001, 0x5}, {0x80000000, 0x9, 0x3f, 0x1}]}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x10001, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:27 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xfc}, 0x28) [ 1490.745183] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x200000000000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:27 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3c, 0x0, 0xffffffffffffff9c, 0x800000000000, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:28 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}}, 0x1c) 08:52:28 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x117}, 0x28) 08:52:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x608}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x90c}, 0x28) 08:52:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xff0f0000]}}, 0x1c) close(r0) 08:52:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x2000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:28 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0xa, 0x4, 0x8000, 0x3f, 0x0, r0, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) [ 1491.263607] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1491.315985] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x10) 08:52:28 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x97c}, 0x28) 08:52:28 executing program 1: r0 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RLCREATE(r1, &(0x7f0000000000)={0x18, 0xf, 0x1, {{0x1, 0x4, 0x2}, 0x5341}}, 0x18) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0xe4, 0x3f, 0x4, 0x6, 0x4, 0x7fffffff, 0x4351, 0xffffffff, 0x1, 0x2, 0x1, 0x5}) 08:52:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x441}, 0x28) 08:52:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0xffffff7f}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb19}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfe80]}}, 0x1c) close(r0) 08:52:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x2}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x800000000000000]}}, 0x1c) close(r0) [ 1491.796320] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1491.850364] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:29 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc2]}}, 0x1c) 08:52:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2fc}, 0x28) 08:52:29 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x532}, 0x28) 08:52:29 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6000000000000, 0x1) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@rand_addr, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) r5 = gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)={0x0, 0x0}) sendmsg$nl_netfilter(r0, &(0x7f0000001940)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001900)={&(0x7f0000000400)={0x14d4, 0x8, 0x4, 0x200, 0x70bd26, 0x25dfdbfc, {0x7, 0x0, 0x3}, [@generic="d6c1b26d86aff7b237e87ed3841278cce2170780ae4b32c4c4a0ed430c8d6487a251b4a0c9b779de7299161a4e52981a11379599646f93289cbc72f7700e03cbcfa2b74b7e1bd15e13bd7d237be813ec409b5b320d2e0e6c52b7894e14abb37f1be021b38133c565f03340e39f9fb33876c85369c9debbfa858f602a29a07a7d2c423f3d027714a438d4ff56a2897b20e38c47005ca212b5839cb2819ffa10639fb3bef396e2f0d8584da36655925e4e773d8be2fac660eeb2", @nested={0x1e4, 0x5f, [@generic="d732b2c44b3711be84ab683c2226d8ee6c2c3718faa7f24b055c11e138b47d7a532c29b8af11ff4e32f9bda0f8c430f68df26b4d24d9636a64bd5309915dc56c36393ecd3e513836f300ac828407edd088641cf288cd3298d3f3f7d80e639b6d6dded2b786b6bd532cbbe28b181ad904517810ddf2506daaae66b8a74659ddd3568345278c249a04de58f9f6f40fc9b67d5a6a39af2bec0378033d968d710dfd9ce024720146cec9cdcc1b5531196d1c42c198410736722593e7d887469cde2f7b3092a6aabcf13130c9a2847ade14de97795b3d7e6162", @typed={0x8, 0x71, @uid=r1}, @typed={0xc, 0x16, @u64=0x1}, @typed={0x14, 0x0, @ipv6=@remote}, @generic="8f5fc0e6efbc0a501961172af688f549eae2c66c8103a170fbaadb03b8120384871270cd10cc966605736a2899fb5077bd30bec8857483a5954e77e5149c94a073ac991ea0a0d5af03d982a4c25aac98386a18c7f8a3807379e3ea6dd0efce0e506923445f1c2b2f79b69a2dcf63c1cd0a1ce0a696d27c7e8a8ef713aac5e9eed5b168a1b449e4bca56e7bac41f51708f4e942efe3bb11d0b8a77c5066750da1222eff7115f1cf1fad95f2bb49cfa4e912ef8ada573254bda6e5ba36d3bba00adb1e50c0772c02e9bfdb36429f0e582f631cb3614034", @typed={0x8, 0x2d, @fd=r2}]}, @typed={0x8, 0xb, @u32}, @generic="8ca9fb86e267733aee1ba9e04445218e22589e01daeec769d03727c765f089e9876a3a3793589e19a10a2c2e1de9", @typed={0x8, 0x2, @uid=r3}, @generic="0fc7202f3619c367000a89d3a9c56197135be3c3fae3203172ab758a46336b0544be45d231a93cb159d7751ff8cf49289c7360e0a39951d1579a0808c9b642b529a170fe63e4f631ed59f91b71de096a129f54737542bb84840616120ec8391bcd5e075375196adbb1e580c255592c1f35f08f3e95d8a67804b58368956f54c6d3640dc9de8349025f9a1c862ba0cf43b7953abe", @nested={0x1080, 0x8a, [@typed={0x8, 0x74, @uid=r4}, @typed={0x8, 0x47, @ipv4=@dev={0xac, 0x14, 0x14, 0x19}}, @typed={0x8, 0x94, @pid=r5}, @generic="b016b66bb476fbe0e49eb81e439a63ded1835721bab229eeb516a8363693fd48ab8f8023b9c8971353a6444ae7121da2398039198a8b322275f5d27ebd44f99ad9e6b3e43c79e6f65e588413ad9fed4c19a5f352f500c996eb92c066", @typed={0x8, 0x96, @pid=r6}, @generic="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"]}, @generic="e7f332aa99895d27f395017afb2a55c90c05d31457bc4b27c9c34b4d391e68671d11fb15e32139212233482eeb0a1d9f0d13d341549ad41adb1346fa7254cfb280c3848db9c8dc6d82b6dbb1e0d1b45857ed86a4ea08df5dc3cfcfc4b9f656a9f1cff33c1bf38cbd12669a24a4587680a49419a0f3934b7da279343a733a45149848769de6c28cb02da5594dd7e77ca77c74f3560e3b6d44b783279501322189dd9812ce873c5b49a437354d87c2584a4559031de5ef282d2ebff42210b371967c30d57a5b01a94375f09fe394853177"]}, 0x14d4}, 0x1, 0x0, 0x0, 0x4040}, 0x4) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x800000000000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x570}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x885a0100]}}, 0x1c) close(r0) [ 1492.164787] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x10) 08:52:29 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x84a}, 0x28) 08:52:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0xffffff7f00000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb7a}, 0x28) 08:52:29 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8ff000000000000]}}, 0x1c) 08:52:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7c3}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x2000]}}, 0x1c) close(r0) 08:52:29 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000000)="d0deea40b98025c49786082ca7e85398e2893236a9e0fc15f7dd2fce2e3faabf62bbed4666a39a025e788eef18ce3f342a50a40e36763b908c0252a41ee04aa87a00d4b4a8c3629aaa59dd01ac54e1ed4aaa3ebca198efbdeb349fa33852f0298bddcbdabb217f49eaa5325e247e59811cddfb98e74ab2eccbabd4f25b3377a602f4fc96c2be208f47d0b964ef8464b932239bde896d2640d56cd6830afa3e5e0e0ce38d580d958ddc05636635adb11d861427cb6b6088fb9ecf11b3eb4c436db0e0ac40000bf0ddd63e41d3cd840a78e98e4efd7a8576454b9b7eb99ce70ee37d3bea0396e3cdfaccd665", 0xeb}, {&(0x7f0000000100)="83d86439ce86af20971ce3799322b375d3138458a33a44a4e1ff4df6be5da13ac02994198eb313e7e4e831379c12225124e16d36d2c2a9b4b5114c81e85fde10c8e2bfa79e6bf3176b3010b9a23c5116aa", 0x51}, {&(0x7f0000000180)="0a85613f6fb85df8925039d0a16593fcab6e98be5a166ce5c2876bdd81c7f122e9f66f8c11c45b2a42dfe88acab182c0107e0f7573447fa63c7fa6ac594ed3238e22b110efa395dab58ff6222b7a9cdec314ef1279e4f742b17b19e850faa103c645f7dd322341411ce9b2d1f65ecaf1ded190704621ea031093e1144606610974749bccb6733fe5bf6e9fd56de1a3ec5f7fd3e85bf398adef3cd8667825fb8a1d7da8eef00dd0f3e7c5cfb92dd62d237bc6b288e9586f7d287130b39539ff7fe1adc2dcbe5c05609bfdba", 0xcb}, {&(0x7f0000000280)="a8f59c62f0b609cbe13c48f12ef3ab29fc1973da7392d1f8d60c1560f7903533059578ea66a83c05b55e54c27287427396f95ae108b9657e8d21c0e2efdea13666a48d510cd9fe32272c8b514e7b9077275164db95af523f7fdb036ccab413c5d460d4ac1c2d186c0ed9520772ae17ca7571e47cfdc576190e47dd1fcb6fbe7a9983fe733330e8862b3422dc08341502762216df98c998d5dc7fa29b8e7cc63c31e7ecae0502987521e12d76bb8dea24e68856cf", 0xb4}], 0x4, 0x0) 08:52:29 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6db}, 0x28) [ 1492.499060] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1492.530351] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x100000000000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:29 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0xa, 0x4, 0x7ffc, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2c6}, 0x28) 08:52:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9c4}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xffffff8d]}}, 0x1c) close(r0) 08:52:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x8}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:29 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x915}, 0x28) 08:52:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x10) 08:52:30 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\x00', 0x10000000001) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f00000000c0)) r1 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x1, 0x21, 0x20, 0x8, r1, 0x2}, 0x2c) 08:52:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x1000000]}}, 0x1c) close(r0) 08:52:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x914}, 0x28) 08:52:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x593}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x1000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:30 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x57f}, 0x28) 08:52:30 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c) 08:52:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2c2}, 0x28) [ 1493.463203] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1493.482886] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:30 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x86a}, 0x28) 08:52:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x8000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:30 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x200002, 0x20) r1 = socket$alg(0x26, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x8, 0x9, 0x3f, 0x22, r0, 0x6}, 0x2c) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)="a718852e3b6a622ed6edfc777b5bae3c899adbfb59d72f6c749a5bce59aa0cdedb9d71cb3fa879271cc09b820bdfcfbe05da98da162246610040", 0x3a, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:52:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x54550100]}}, 0x1c) close(r0) 08:52:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2a9}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x595}, 0x28) [ 1493.697360] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x633}, 0x28) [ 1493.763475] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x91ffffff]}, 0x10) 08:52:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x100000000000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7f5}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:31 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x91f}, 0x28) 08:52:31 executing program 1: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x4500) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x7, 0x70, 0x1, 0x4, 0x3, 0x4, 0x0, 0x63ff, 0x80000, 0xe, 0x10001, 0xa09, 0x9, 0x6a, 0xdb97, 0x4, 0xffffffff, 0x7, 0x4, 0x93fc, 0x1f, 0x1f, 0x37, 0x7, 0x80000001, 0xffffffff, 0xb63, 0x47, 0x4, 0x10000, 0x9, 0x9, 0x35c0000000000000, 0x8, 0x9, 0xd5, 0x81, 0xc, 0x0, 0xdf04, 0x0, @perf_config_ext={0xfffffffffffff577, 0x6}, 0x110, 0xffffffff, 0xce77, 0x0, 0x80000001, 0x1, 0xfffffffffffffffa}, r0, 0x6, r1, 0xd) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x218]}}, 0x1c) close(r0) 08:52:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8e2}, 0x28) 08:52:31 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6108c51]}}, 0x1c) 08:52:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x200000000000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x723}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:31 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="3200750ad6dfde4070060d7d4200"], &(0x7f00000000c0)=""/161, 0xa1) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x2000000000000080, 0x0) write$eventfd(r0, &(0x7f00000001c0)=0xc3, 0x8) 08:52:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x449}, 0x28) 08:52:31 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2ffffff]}}, 0x1c) 08:52:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x8000a0ffffffff]}}, 0x1c) close(r0) 08:52:31 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x42c}, 0x28) 08:52:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x1000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:32 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'team_slave_1\x00', {0x2, 0x4e23, @remote}}) 08:52:32 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce000000]}}, 0x1c) 08:52:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x200000000000000]}}, 0x1c) close(r0) 08:52:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x2000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x15da2945]}, 0x10) 08:52:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x50b}, 0x28) 08:52:32 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x565}, 0x28) 08:52:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xad6}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1495.190169] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1495.202731] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:32 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x28f}, 0x28) 08:52:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x8000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:32 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x1) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="d4ed0000a864d3d52c1c6330541d3ffcd0a7efb32d04f82fabc291993efe287cdacfad0c5673c76013d78be831c85ef6e70709a0c75aa089ec36aeaead4bc1e619f2fb88ff47572f4dc9cbd0d1e942f982ab2adfe761f26e48239ccfc09add23267eb46d64d9bc783dbcdbe812aed0314e9556dffbd7513f984f270c5b73b1ed07a70e591c462c320432837f1bf260628d14230d655e2d3542ab32a9dd857a278a07e8c56d561dee3100e5a0009de61b03c2c17b7184dd29ff5c16415670a1d228a815982027ee7e08000000000000000000000000000000"], &(0x7f0000000140)=0xdc) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="9d9242043373c4472ada7f64aafcd49082ccb3f68253a7f50699d2ce31dde397eb50911d775aa39fff918dc45e07502a2818dbd4492d3c97e181dba695ad415dfa850ea2d3818767c67ea0c0526893c4bf180e77f2a3c8a2d4d8efa651b0ac69a19638bc7512c34f4af03d248b82c9f04584743438c27b669db51eb5de74f39857a0b3ef395276cd75eabf59f47e", 0x8e, 0x2}], 0x2000, &(0x7f0000000340)={[{@notail='notail'}, {@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation'}]}) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1, 0x6}, 0x8) 08:52:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x133}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xac20cd99]}}, 0x1c) close(r0) 08:52:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6dc}, 0x28) 08:52:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0xffffff7f}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:32 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x0, 0x140, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000040), {[{{@arp={@remote, @dev={0xac, 0x14, 0x14, 0x21}, 0xff0000ff, 0xffffffff, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, {[0xff, 0x0, 0xff, 0xff, 0xff, 0xff]}, @mac=@random="e1e34ada20fd", {[0x0, 0x0, 0xff, 0x0, 0xff]}, 0x4, 0x7, 0x0, 0x9, 0x5d4c, 0x101, 'syzkaller1\x00', 'tunl0\x00', {}, {}, 0x0, 0x34f}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="6e4706315a8d", @empty, @remote, @remote, 0x4, 0xffffffff}}}, {{@arp={@remote, @rand_addr=0x7, 0xff000000, 0x0, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, @empty, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, 0x7, 0x0, 0x4, 0x400000000000000, 0x54, 0x6, 'irlan0\x00', 'veth1_to_bridge\x00', {0xff}, {0xff}, 0x0, 0x300}, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x1f}}}, {{@arp={@broadcast, @rand_addr=0x1000, 0xff, 0xffffff00, @empty, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0x0, 0x0, 0xff, 0xff, 0xff]}, 0x1, 0x8, 0x9cb, 0x7fffffff, 0x800, 0x8, 'vcan0\x00', 'veth0_to_team\x00', {}, {}, 0x0, 0x110}, 0xf0, 0x118}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x20}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) socket$nl_netfilter(0x10, 0x3, 0xc) 08:52:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x54000000]}}, 0x1c) close(r0) [ 1495.612648] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:32 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c) 08:52:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x897}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x10) 08:52:33 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb53}, 0x28) 08:52:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x518}, 0x28) 08:52:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x8}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:33 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$pptp(0x18, 0x1, 0x2) 08:52:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xaaaa0000]}}, 0x1c) close(r0) 08:52:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa9b}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1496.058340] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1496.143158] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:33 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) 08:52:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa10}, 0x28) 08:52:33 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x740}, 0x28) 08:52:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x2}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x98d}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x54]}}, 0x1c) close(r0) 08:52:33 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="8631e76abf3c6f44e88b73adad33caaa1fe56452cfc78f4458d6dac03ccf7b41462bd1d2e1a75df3343245aed8e01d1cdc2850e8f32686e7", 0x25, 0x6}], 0x0, &(0x7f0000000140)={[{@part={'part', 0x3d, 0xd4ec}}]}) 08:52:33 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cf2040000000000]}}, 0x1c) 08:52:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8b9}, 0x28) 08:52:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4002]}, 0x10) 08:52:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x1100000000000000]}}, 0x1c) close(r0) 08:52:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x800000000000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:33 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x78}, 0x28) 08:52:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x393}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:33 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r0 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0xc0, 0x80000) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x5) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f0000000180)={0x5, 0x0, [{}, {}, {}, {}, {}]}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000040)="420f415f0a0f098fe978c38307000000b961090000b809000000ba000000000f3041349442d006470f208366b8d4000f00d8b8010000000f01d92e470f09", 0x3e}], 0x1, 0x40, &(0x7f0000000100)=[@cr0, @cr0={0x0, 0x60000008}], 0x2) 08:52:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xaf3}, 0x28) [ 1496.930794] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2b}, 0x28) [ 1497.028098] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1497.069242] QAT: Invalid ioctl 08:52:34 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3a1}, 0x28) 08:52:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0xffffff7f00000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3bd}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb46cae62c2194edc, 0x0, 0x3, 0x41, 0x16, r0, 0xac5e}, 0x2c) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) write$eventfd(r0, &(0x7f00000000c0)=0x1, 0x8) 08:52:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x72f}, 0x28) 08:52:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5133086d]}}, 0x1c) close(r0) 08:52:34 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c) 08:52:34 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8f0}, 0x28) [ 1497.800856] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x10) 08:52:34 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfff, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)}, 0x10) tee(r0, r0, 0xc22, 0x1) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) ioctl$KDSKBLED(r0, 0x4b65, 0x7fffffff) 08:52:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x0, 0xffffff7f00000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x8dffffff00000000]}}, 0x1c) close(r0) 08:52:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6d0}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbe6}, 0x28) 08:52:34 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9d9}, 0x28) [ 1497.913653] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x0, 0x800000000000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:34 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x674}, 0x28) 08:52:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x725}, 0x28) 08:52:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x53a}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:35 executing program 1: r0 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r1 = accept4(r0, &(0x7f0000000000)=@ethernet={0x0, @dev}, &(0x7f00000000c0)=0x80, 0x80800) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r2, 0x5}, 0x8) 08:52:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xf401000000000000]}}, 0x1c) close(r0) 08:52:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x0, 0x2000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1498.191014] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:35 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2857010000000000]}}, 0x1c) 08:52:35 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x27a}, 0x28) [ 1498.681007] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x10) 08:52:35 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x7, 0x1, &(0x7f0000000040)={r0, r1+10000000}, &(0x7f00000000c0)) 08:52:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3ef}, 0x28) 08:52:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x747}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x1100]}}, 0x1c) close(r0) 08:52:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x0, 0x2}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:35 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb8}, 0x28) [ 1498.790859] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:35 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa8b}, 0x28) 08:52:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x0, 0x8}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x910}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x900}, 0x28) 08:52:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x15554]}}, 0x1c) close(r0) 08:52:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5a5}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x80fe]}}, 0x1c) close(r0) 08:52:36 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c) 08:52:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x0, 0x100000000000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1499.523195] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}, 0x10) 08:52:36 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x6, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0xffffffffffffffc9) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x40, 0x101000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0xffffffffffffffd2, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) connect$l2tp(r0, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @rand_addr=0x6}, 0x0, 0x0, 0x1, 0x3}}, 0x2e) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000002c0)={r3, 0x1, 0x6, @broadcast}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x4, @remote, 0x7ff}, {0xa, 0x4e20, 0x7, @mcast1, 0x2}, r2, 0x3}}, 0x48) 08:52:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x78d}, 0x28) 08:52:36 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5c7}, 0x28) 08:52:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9ba}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xaaaa000000000000]}}, 0x1c) close(r0) 08:52:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x0, 0x200000000000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x0, 0x1000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) [ 1499.692789] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x85d}, 0x28) 08:52:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x99f}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:36 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4ec}, 0x28) 08:52:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xa00000000000000]}}, 0x1c) close(r0) 08:52:36 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2000000000004000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000080)={0x0, 0x4, {0x3, 0x0, 0x9, 0x3, 0x8a}}) fcntl$setpipe(r0, 0x407, 0x9) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0xa, 0x3, 0x8, 0x3f, 0x0, 0xffffffffffffff9c, 0xfffffffffffffffe, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x379) [ 1499.958824] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:37 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x157}, 0x28) 08:52:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x0, 0x8000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x10) 08:52:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xaab}, 0x28) 08:52:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x322}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:37 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:37 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c) 08:52:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x10000000]}}, 0x1c) close(r0) 08:52:37 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7bd}, 0x28) 08:52:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {0x0, 0x0, 0x0, 0xffffff7f}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1500.498554] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x8, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:37 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f28c]}}, 0x1c) 08:52:37 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x551}, 0x28) 08:52:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6a6}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2a7}, 0x28) 08:52:37 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x800, 0x801) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000400)=0x7fff, &(0x7f0000000440)=0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x581000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)=0x0) write$P9_RSETATTR(r0, &(0x7f0000000480)={0x7, 0x1b, 0x2}, 0x7) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000180)={{0xa, 0x1, 0xffff, 0xffffffff, 'syz1\x00', 0x3ff}, 0x5, 0x100, 0x7, r2, 0x3, 0x22, 'syz0\x00', &(0x7f0000000140)=['/dev/dmmidi#\x00', '/dev/dmmidi#\x00', ')ppp1cpuset!{keyring[md5sum\x00'], 0x36, [], [0x100000001, 0x3, 0x4, 0x400]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000003c0)=0x14) r3 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) 08:52:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xffffffffffffffff]}}, 0x1c) close(r0) 08:52:37 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd200000000000000]}}, 0x1c) [ 1500.872386] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x10) 08:52:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x2, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:38 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6d8}, 0x28) 08:52:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9ff}, 0x28) 08:52:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xc00]}}, 0x1c) close(r0) 08:52:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x422}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:38 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000002c0)) r1 = memfd_create(&(0x7f0000000240)='+}vmnet0*vboxnet0\x00', 0x1) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$KDADDIO(r1, 0x4b34, 0x40) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}}, 0xa9487b2, 0x3, 0x0, 0x9}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={r4, 0xc21}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000180)={r4, @in={{0x2, 0x4e20, @multicast2}}, 0x1, 0x1d}, 0x90) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000380)={r5, 0x9, 0x2c, "fabbbc1a0048b82bcf4d1e53fd78066fb6635838454a7e072e76898cd4d2b5615ad0fefe124f35b374d96be2"}, 0x34) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0xffffffff, 0x20003f, 0x0, 0xffffffffffffff9c, 0x20000000005, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) getsockname$llc(r1, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x10) [ 1501.363780] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0xf, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x548}, 0x28) 08:52:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x47d}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:38 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x94d}, 0x28) 08:52:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xa00]}}, 0x1c) close(r0) 08:52:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa97}, 0x28) 08:52:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x91b}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1501.608547] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:38 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x815a521300000000]}}, 0x1c) [ 1501.819650] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x10) 08:52:39 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7ca}, 0x28) 08:52:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xe00000000000000]}}, 0x1c) close(r0) 08:52:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb2a}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2e9}, 0x28) 08:52:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x100000000000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:39 executing program 1: r0 = memfd_create(&(0x7f0000000040)='iocharset', 0x2) syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'cp852'}}]}) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) socket$inet6(0xa, 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffffffffffffe) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@rc, &(0x7f0000000040)=0x80, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x3}, 0xc, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[@ANYBLOB="2c0000002600200300000000dbdf25000000f60059345619ea0532781becbc9320020015cccc08620c0b937a620096ffc5b6c0e8f4dbba03796b8d37df208586545d81c08baf4a23f9122d5bfa7d3c72368a9250c212817b000000000000003e56cc4b6df0872ac4b9b61cc016dc9c3a4293327f23b3192bce8a386246ca192a16ec49215bd659d7e2209e1652a5288c771689840fb7ed647c5ccdbdd8319b62286379365b3c5a958c48e5d625d7f40dbe5908a99ffebb8f1ed17acd3d39d1"], 0x1}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(r2, &(0x7f00000003c0)=@xdp={0x2c, 0x1, 0x0, 0x3d}, 0x80) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000800)={{0x0, 0x3, 0x100000000, 0x2, 0x7ff}, 0x2, 0xffffffff}) fcntl$setown(r2, 0x8, r4) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200), &(0x7f00000007c0)=0x4) ioctl$LOOP_CTL_REMOVE(r3, 0x5421, 0x0) r5 = add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000680), 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r5, 0x12010100) sendmsg(r2, &(0x7f00000008c0)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000880), 0x0, &(0x7f0000003b40)=[{0x88, 0x107, 0x5, "8a9682aa42761273de4d605a9dc106bf46f4daa17790408d5048b282dbaf827a99ac612f1292ab710d09477c1902cbd9f16a07cf1b8945c6075b6af6f99756108e599195ffece6e8547cc7b15781a6fb08bc36c76d84ab0e265fa7410a30495015a7aa16e7a82586378fc994a43f01c489ff7147"}], 0x88, 0x20040000}, 0x8001) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r6 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x100, 0x0) sendto$unix(r6, &(0x7f0000000100)="9b0f3bc6445750cd60df6190fbc894ab5687", 0x12, 0x4844, &(0x7f0000000700)=@file={0x1, './file0/file0/file0\x00'}, 0x6e) r7 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r7) fchdir(r1) open$dir(&(0x7f0000000240)='./file0\x00', 0x80440, 0x0) truncate(&(0x7f0000000280)='./file0\x00', 0x100007) getdents(r1, &(0x7f0000000400)=""/240, 0xf0) r8 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x471, 0x40000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x459, 0x401, 0x101, 0x8, r8}, 0x2c) [ 1502.248463] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0xffffff7f00000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb79}, 0x28) [ 1502.307613] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:39 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbcb}, 0x28) 08:52:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x431}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x40020000]}}, 0x1c) close(r0) 08:52:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbcc}, 0x28) 08:52:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x8000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:39 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xc0c}, 0x28) [ 1502.644315] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:39 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}, 0x1c) [ 1502.824429] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x10) 08:52:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8b}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:40 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x100000000a, 0x4, 0x4000008000, 0x3c, 0x28, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x100, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000440)={0x0, 0x2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000004c0)={r2, 0x6}, 0x8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000300)=0x0) waitid(0x2, r3, &(0x7f0000000340), 0x3, &(0x7f0000000380)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$FUSE_ATTR(r0, &(0x7f0000000280)={0x78, 0x0, 0x6, {0x3, 0x8, 0x0, {0x0, 0x20, 0x5, 0x0, 0x3, 0x8, 0x23, 0x1, 0x548914f5, 0x4, 0x27, r1, r4, 0x6, 0x10001}}}, 0x78) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0x7, 0x6}) 08:52:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0xffffff7f}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x40000000]}}, 0x1c) close(r0) 08:52:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x539}, 0x28) 08:52:40 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5ef}, 0x28) [ 1503.128722] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:40 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7dc}, 0x28) 08:52:40 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000023c0)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x210002) sendmsg$nfc_llcp(r0, &(0x7f0000002380)={&(0x7f00000000c0)={0x27, 0x0, 0x1, 0x3, 0x100000000, 0x5, "86e9947a09beed01e45ad9ad76aae61412fea767a29814f4007aebb08c850689b58e0f5fd38fd6179acfe4188b07b1c690d3b219610f66bea0b828aab15ec7", 0x19}, 0x60, &(0x7f00000022c0)=[{&(0x7f0000000140)="f2c6c80872f8eb48fca6f194e8bdae928c460bda6df813800fefa7b61a3db869f5c010b7ad1ce762fc12e096ef83fc235a69ca511a45202bfb88529b8d02ca418fc0126dd357befb13498c522982437dd8eea124bb18cb43f9749aee5da512780082d5f040d0af92407e242f41a00750", 0x70}, {&(0x7f00000001c0)="984f8d524dcc1e091c382d1fd3b6409502d7cb1f802ae937398261771946d301c20f3de481c8ae55c94b358e2c8e1e8485de19f968278f942aa272a120377d57a1e0d6113f7e6aa41be06689dee6c8d2b7b7b68e49556f94d53d31d093f0dfd881eeee0cf2614015b404d8aee634b5fba48de75e2c2b44e40ac36aed0c91cc37ba3e4713c1d84827f8efe8a81af21949c7d401285c4b67cfc3d894a11385d69c2cc8275d8b3afccc0026232bffa8bce2bb9090d1ea1d481972cb48c6cebd000ec53b46fca782100138a9b7dd4f353ca4d76e2e9c0ce09bd00f88761bc419c7ea5a3abaee6e5aa87144579a7f9941ef70e3be5b8851f4bb06178659f79e874967187091c447a4ab11d49376080b0b1d8534f273fec84a54f513fd7eb80ace8507d34d38cdb7da43cf9210fa75c5de4334fbdeb027f88b4c83712e77c27bf94946f5d96bbd9177b01337ad45f58cff9355f2da1ec217094108dd793f2424c858da284c73437c79cc85149a7d75493118c6280133e13d5fe0ad7dbc23324822201adae5ac9eb447a66970190a7e4a4c07d0b9d37a12498ed61ff7a77dc0fdc4792edebe648811f0c6718eb1da79fcec334d4712dd3a5c32a29e65151a24a6eb584868c119455ffa7c1ca948e2e296b2d68b167702d7cf5a9b71109e68589578dfed029fc1afe769326c3029240a8bb7df90f3cd32a6366a0199052d1549122587fa4a51b76e0961e363bc31c3126194485a1ec58c782644b68ba8c316722c6575e7d74e379429c4d3a691a1ff49fa9a8e9875a6a4f6c8ca24cf22bc933df39dcde559b7f67b6af100e671ced48a3a7c7b1f3735a91b4fd2f6d543784d4c4546f12ba4802c6b8f36125e410b9813db645e5bb1f46bf46e66b00507751296bc1d33dbd665e5b4a9ecb5aaf8b34a50c167a7a5f9f3de14c644dcd10ce2ba2bb5c7a4a8b18fe4ba91b332f2ff5e305ba6c69731e6944daddd81849baebf816d69dbc4b53b351ecf9b9c4856a23ec301595be6fdd64f204670a4de87df1435ef7462ea91ca5d8bc3b018829361f947824aaec1a7c204c71dfb4e39f644c5cb379062540c581b2abde1323702bf295914f1cf07438ada23a28c527a562e05f791d061a20d9665c234fb3645ef355fa066a8680a4c5606eb4474c494e22f08bcc462c184e9d230941251703b6926bc3c2c7fe30eb1a4b43f487025f7176ccbc5731284e3938fc9f9f1bffbe3ca68b981595862cc261d187ef5b6e42c265cbfc4a3e2616c31a8eac123ceb136421602ebd874ff512eba878cdd40f56f26d97075c5490bae9c7e64b1708b7657137e51d8462a481c9683cf52fcc4d3bc106c3f835424ffa0bf7e59d8ca27aa0699362b35cb9e82a2edb66f175c2f7c4ac513c6710c237976c0e282eed48d170d4fa0ea927f3c7b32a364456fd45286377a3bdeb94547c4dd9f66278cd80dc1bfc7a71e3ec724c3af9b1e365587f084d09d17da4effff4a186f04a420829c096e239e11e88d44a7edb885983c918f97a8568e9db735de87560ceb17b6d2aea731c50c5312487c425278b605d7cb7d530a41973b064e5106dd58025b2349a95489b4482fdd26075ade01591c41203576868b8d7f2cadbfcd4aa47554aca7ba898abdc85c09be3d70f9e2d84de089edf38058fea93fdf7541e5aae5b102f7cf40dce1f4adfab041c52ae6d128800142814c9a8ccc9e1d8d1c74c117b03be232d731fd1b05525fb9825a51b3e94e4631d7b00e0f48c2f1e8d25e79539c24c048e42743795d173274ca1e6fb4c097b4196ae91a325b154746e024e43349ff0188847836d96b3a600bdef6c434b4d4695a925d6e87298ba8a3e978ebd13d05f12439da73dbdadba75be647eebf25ea91277b904e37d3015cf02e38b815105becaa112b0950d62002e49f2f1810b335b220e79d758ad78ba2aad04eaa94e1c2b8fdb555ca6bf050f71d5949683325fdb09b23aab8ba40c1ae88aa6875671b513d567a66bbeb2ee5d416c91aa0ab6098216c4e6bb9c584206b80c259cb126c6032fa295ca7153ad5bfc283f2895f25f9731dc75748acba210d342559baafca1a40fc264cb4540e25f67f5a4291d995a5f1c65efd8ebcdfa834c026b4033c740d1cf76719c610fb2037f139011800e07a64b6b80a00b3ee23603d22669dd46530232a707e676b0aa240906377a7b38645c4d44495e5755cbf5f60ab9e741e0c7ffc14602b939abdf52a2a46d62f5ae899346e6effee394de6ff20d1a72971adfa78a834ca3139ca523ed723d29dfd85e5ae73e18c66e80a1b67c6c23f963f9c8c4374e0af4593c99faf665a6c6de0ea68b33cce526ca4b9f0504236c94e0d53a899b90a4748c9a2ce05557662ed0da3ade0d5ffd1f558a263c35c6cd505b8613346c89d13780dd8cd9caed23b0fd0e938dd85056bf3e31c8926c5a0dcf5e4836ea2c7a67ba0788ae028671327b2d6f1eb4fb782b1da3381bbe4c4c9ffb8e6853d607a511bc5eac69ee6a5ba088c511dfefa1078c0186f50da9679d6e4e6c903d749a59399ffaeae9e6426670838c5546673a5770b0a340a27305c04248e57ee68779b0641b0eac8bc79e2bbfd525e6c53b0d3c46e3bdc5caeddfc89bf29cb7fa8e21995b1784b507f5bca3f405bea096113e2914efc8c4f12991ffc0706e6fd866e33ec1865d2226a2646bd86734b1406e6d5d14e376f1f714399df453daae6dc8cec17412e4680614b368a248874f7e4cf1449597f1ccbfebe348d2e78fe698f57f2000821cb79a548638c84e6b9ed13542e66139e4f987a776dfc7dd0f193a23592dacfd6e43314a7800f090f1be2330ac6715e35e03a3969d2cf888ece282e42ca1d3d9d081955d1aede6aaa197fa7aaaee60be14a0a321ea9fe851bf9b14ff9246c20d653440f9d1a6c60430cc376f510fcdc46b9cfbbd38a7f22b703df946299f22b60185a00a78a9f96fd24fde02fd69994fe9092fd7d9f96be39c76b894a18ec8a7f36fd93a017fda1c00945e35f9b239565666eb1bd7d31dc14c11b2d8c8460f9ba062f8fa2fc96a3bb8d2cc15bb2c8d18dc19282cbd2e431a57fcb101a460165e8f464499c896f0ea025441b4afbeb057b7b2d80821cdeb396366e708d04df7b92496e09d6e1062b2bfee41702387e67f02be7e06b0ba223c48345308734deaca667ef48e1d2d96a5dba5a46de03e5477490d48356dd495e1663c37bec140dba28d7af3f8edf35bd95317b0903419b13963f6cddb23e83e3220c4cc66f48c25f18b917a7e0f0e40e5605318fd5fe905f03f2dc6bd53ef66144c67b653d9c8c9c54d19af823e6b132f9a8ee2f4be54bcc5fe1d43fc5718a577c83615d5b80f25f7ec52e79a237a8220f56c56699c3d905f9cf11930c77fbe46bc3e18f88f23523431405d3d8248669a268278ed204906b2ec42d5feca62125fbaaf5a45d61f479bb567e0b6486d0368f11d37be3dfb53c4145a34246254999da1fcd2734dfad6351ccfa884ac15c3a9e9f9882521f53db08e15b0829d2e90d122885524aee50e43913960e262992156ed9892b065983151bc5d932e1c01716144496e733f645138df5f120bae002d2d20e479390366d8cd6f4d66d741c0daebbffc1d2fc0449bddf0fe4b4403ec36a9c101fa0f5d65b61afb1348f15dd6db400e9a76722b0ce6643370683ebe547057c26fa852baffac27d8f0a03caf26f3f0021d730f96922e8d47937a6eda3db3470fc2a0c0c428cd3aa89f74d22a1bcc31cc1a6bf8b05e4b0583ddeaead78d73ff02e39d79f85ce7cdc13d0d95d58473e6c82fc8a28c42ff08388c5d5ea8b3d1f4af98a257af6f6f3094d53fbabfb450afdfb9a1e94d06934723fd8435944c609a31f022dc2587512cabf7eb7067b9e70fbb9cd2506b3190de13771fd05bf75a49a3ee9e00512bfdea5cb9561e10b5a379539e9a47207be6b0a800f75bb51cfb73b595fe0e21ffbc08ebb75743c98949808417ed5986fb1ffd645feac4f7b4739aca016c40b7b6b3ae8c6f050bfe36187ede241a7d5d38201c89efa1561ee47cb6f5a30866b07f742f718ba5d6134435e6840a2e6993969239a2ccf99e200b005707c2adb71957cb9284056e9e47187fe40bdc29a54cea1a48cc231d73d06b013c94d507bbd1b65e7a334a9b3eca4da1b056c9377732c22234d760bf3bf0e8b40e75bb1486f73908fd258c88a4674e3b9a3ac56e5a66c5674b838c7f632531d5561c36134e16ed6620483d2e5ba552832cd85af8b1ff87bb926d09356dc8de541d923489f29971e47d20f975da427e5714f90e24642fa8c7b3424d6fae7b142ea4868b5cd842743ffb0adc2559a05eba9d6098194c08f824c8d8944c03599d33238a1c4d1f4eb4bb9e1314d277e3988596132f261b25c5fa44e7ed5177a52f8d060770d470058e99ec7a2d0dcd679055c0f0641647db01a8538e938753e6306166cb0d4331d07c63f17709a43b5f0af6c04324e27dfbb525bc90df59728a7db240f605db871af2f5056c05246b4abbbb0fc71b4732c8b82a91ea9b8949934a95742fff1bf266deea0b2587ad6e62e4e8c61be8cabb1925c650809feb52d21a954b6cdb86328323f00feaf85e998ef173a160782ec39c51e2ea0e332805d91941960075c4f10ee7458ccf6a9f0af23cc52c3d6ae70645987a2d098e482e8e146306ad9b55d3d39ed95c9881f81f52dbb40e5e3864a9eed5cb63f89f01b99610e8fc9d93643ec35a24d0c0b404b3cd40aceec05c6ca840df92cf1522f53e7f3dd23984b13f873723a056fe4e0b622d4898e0a4a1c804fbec4f31ed6178c2ea53041b56fe723837871a940ae5d750ed2fc0f58eb856ca2cf079c84161ceabefd295c0c1bf65aa24af63b22ba5eb57a8a2fc8065007338cf3b1f8ee51d5b335fc762b0b2df7207a23ce79c1d90719c9dc931297e4e68bf9909188cd81f15dd79633be088c9afe402e4c84a55ff3e226b520e91179680d31c9d7ccc23087c3ef4802e087678340089fadc16349971f2437ad9985f47fcf7b3311c2cfd7ea69ff3a63b3ad741e1ee4f5e85afa98232bf6cc9be9dcc0bf5cc993aea6ce907e52d513821c03471768b87450613a126eab71c293dc147964563c68eec91e9f621dd92115e3f234a5f062a255cc3c89afd47acd652db37a9255f200ed6f2946dec86765bfd1f6bf17a0a893be75a1e02cb291194f074a3603a7b306c5fe32856e930ee10534b01cbc7957ee88e8cdd23d9b2347578b8eff7ca8b601ef44b9f8d1d807735a8f3f1498088b7591799bbf2dab2d3b5886314c9174d095a80662fa4e457cd0f300c26c170492bfcfa9f967c5a74d860238f056b379b9938a16929bf61b8a02d92f4a6f31d9bd61192e8c14773c6eabf9ff513cdaafcb8a48cc6b1bde3053ce8eef9977b4a53d6ad3c41b49aed1984dc6c5723920d0b1405bf163f94e514ca02051b79523e88e0993ac5653791641ec4d98248634512ed7a3f1446c92cb3c05dcf4e371c87544b0c1bac0c8901141a574d9b9a1a50a49ea452564210b98b6c0fdcf0769d7cf8ee095b6f749c8d4f523a5a5b57d09b68d0449fdfe91fcc514a0a919e0817af0dc5553d10a73d1aa6718b0f23a77e74087511a7a3bfd26258f016aefd6a1f7f01bf1065f289aaef4ad900165d95c94e8c74f69b050b34b5b515e7c0df5187014ed423ee9b4bf6f5c1878df4beb47d9bad3995c54bf165284a477e20f53e6b055c4afceacd0f05071a6b9cadf8051a2bdcd6e5a087f62c8ad38e5d6052c495c55d399030aa67335a70ce7e026d4", 0x1000}, {&(0x7f0000000040)="ad36", 0x2}, {&(0x7f00000011c0)="a0460da68567cc0cce520c3860fefdc5005156dc74066d8a32cb1fa255b166d655dcdd17695f43ccd500a8c63cf0dc99063adb8bb703e99f61e8624043a855739092aa32904ba558214dd8bf890031443fbe884c026552aada90c6c5a1623d866447769b9de87740a9eccce5c22bdd6683106c3c6e88a87cbd9245d7b659cb1e72716c90aacc7dfca227df6749e3dc1d5703ebd1a0f2f42e1e6968f7e9f009602fa5066216596c62f724f1fc3c7b86c40a917c65dc75a165c744f9c0231ab241716f23537d3e1ead9068a7c131a85c822a27fdb175ccfb02710ecf8f6757b3f388a4a1c957e401490af3195a2e325ee8f5c7ac", 0xf3}, {&(0x7f00000012c0)="e8906c0751bdbd2ceb7ba06604f5b9b17700e7a393eb84946d0677ec080bb4f40c6a04fd250586f1f48813579c48726676df9dd4a2fcf95fb7cb94626a5319851459421e11da5892c639a80521190bdf8692d939d99d087ead7c198eda417bcadd126acb5b6ea870ca5b23a7390cd999a286a3616fb3ae54abf6e9dcb8c08ddc8a36106530211d139acecfaaf0a2387973649c602f5abb1c671a86de3a027ed1504056b643cceab033290282780f848861f0c33587413786c986c058786edb583afe1117742ea88941c584c39c8e417a7c1eba4649bfea9d796e844be440cdbb96ee10e7084fe84882c3d6be274d22407737ead91305bfab585d121c22539576e8e56623668701217e9c0f38a813085f53659e6220c1d1ab6f2a6454267451d22a574cd2eb6ca6582eca5a37025a90586cee7958e4d65b4aa1c235e348ecb9182041bf1d2645b9c6ce12d413c53201526beb5e6f676d302b2cca434f7857c118c667b9adbadb4a3e4ca11c609b81c6e397eae0bcd893cfa76e905c74fe1581e0062cb96f81110960ba824cc6bacf29ec20570b100df65d0ef033d409857b5a3c6312c685c3709e6471dbaa19896c92ca76a962a48f0356eae27769c00ac411e9da0bca53fc4ce39ac350ea07cf140cc4cf7aa8fee45af1d367a749942fd8fcc922f9dc4d8c2076436898e0f6b874eb9a38939037c76f99cc259f1bdaa9f9ee1534a55554410befafb5b98db8238569efe34add8a1562c37da743a6a0b40eef7d01b92de25be0e5ec5eb09bd47779f190f1d8e7b47aad9d4fb4b1f48234b3d05c546f608827743db2fe954ada8511449d19694cb2378074ec25b6079cc0d328e9e2d7f3af2c259a1ba7cc30484431083818ad0a4c993f6fb844c48d246b5075d24e9be705c25e85c32f82e8f8bd717bf8c0a3005b6b7b71c02c4ee4b61ad4553e4663751deb668924479838f623915ae0ce3c4b9f22ccee4ce08b6a845a053770dce174be1237732045061fa2cde45db36f7e6d3907aba18f91ad2ca2c85cf196fae0dfd81f026e8ba13651393768526f2dbf590ba8473ddd5dee771bf937463bdb8e49d404b120cdf5272193e92d814f05f7dbdc967992b93576120626fedda4edf46252b9bdec04432b06432ff6896c9cbcff76a1467d5f5ae3fc7f144534887e01bff00463f61f138a6f1ccf57f447933e48738ee720961010b16d2d1b882c837f8cb23a39a1f28834efb0afc9337b4f803a1371fed00a450c2056bc960433906580f6b83f979e829ffb907ffca8e2c1c8f4ccdc1da92785656630e476899b3a7fc126a124413fd20062aae81b26c02aa4d3dc8b1b91b5ee8be7b14de4a9214887e9057a6d0b3aedfdeb050620e8ce5bbc9d4c52e1dfe2b0a17b1eb74fc564df28edef4b100c5b11dd73e771f24911ed06f0edcf7d105ebf7640d7b591a4b582f4451d7b46abaeb9080700888b01bde43d33d8d75a9c03445ee82c58fa175b5bcf4ad829791455091f7ee11a32c2ad1e96f346acaa9054ab8dbf361c2bc0ab6578098b971789e6f73bdab5f400e06c1b0e39875f9e2f1bbe2e651815bd6c28ede893897e7d96d54f9ec9d4f2970a6b76600aa115fdb649352fd5a3bf9e4734357c6395f457eb2fbae1e098cfae26f50b771afba3558f4b4f772130445058fd5122501b4019d0a7bcd03feb422814a3058631f8a6151167f6da9c237d110409981d54ff02263638811ed42ce3561dc2cf52d48344e92650fe7a2257557cf3366a42c260abd7a50f64989a388f32478507e084586abcd138aaf6938ebbc63090756323db5358a158f7f86c6468107273f1ce9367e969928c3a238d6205c0fcdd9e59fc45104b7ae1096400b610b6ae87d9c9095183ca08a50335c2463e0cc9bd8dfe6e13491b36328bfdc7f69f6e9bee6bbf84b1d3d4f5e7d56e57d3ec3b3bbbfb65e33e38806b2543e0c14e46970d7220c9c529031036cc4b61a5efd3d03bf860d8b2c35f0202fa743c73049a480be3f034f305db72b74612b760f5de0437a4f7cb671e5e9975a2d6be93f1873897ec3b9a95de0260afe1b76e3d6d06ca54972391396b3148079a9ce68b4becb18d548ad231c6fed2307c44a27491c2e78aad2750488cc2dc87a8effa0ba153fe5eb5fe5e0e9e7d54ff2b74cac97faf19ce8204c906257dacfca4380ca07ca9e2875a34483faef6e50d8fe4dfa9ba481231bafbdbd30dd5f4a47f8926299383ee8e579a3ca64e27ef2d2b838583b705d51a8dafc6b855628f261a82771d3338881db6c37dec3d905a79f6a8ccd47c8844231de2b1dcfff77f83aff0dd6fe05eeef820f92f3dbb98d483af832c0c1a495df368426aa1efa317663fecca43bf22967d5a8e531f5f6eef56ae8734738f305af4705cfac08a1d6558ae81ec6c55f5be7053b33152c7bc8eb433d03bd7a9aff36185d5cf24145c9935fe7f804330051035cbf82e334e69e8913dca718a4aea34e6c2d0ed68251ee902eb5d253a443fe8dc9525424bebe25227d620112a4ff1acfbb0d74f7a4fb84efbbcfbb3b50ba7c3bcd30836c1ad3a8e13f37fd52f1e8daeeb1f78894842d52d1d8eaeb80b8c1066d4010dcf5e18f7fb44a3faac7d7f0f7624f99a5d9c5126ccfe91c41ebe12ea4d5b226e341f221234c7d0101605d9fa6918931ae7593f9531b371ee15303c8cfbb715eb7518c5698a0bbdd27e3f75a05bcb9679f5754d0613b68d1484e31dd0f7e4cc314bbc25b9abbc6975ae1081cbec530a59fc66697aa522e2ab4f2b12fdcb485f2fe0ab935f134d2d1dd9bf589031796cb8966f8b4828b3f814928a1d40bc65814f9bf827259365816024701700410895a4aaf292516ce306793d762492f517d6f6c3f34497d52f14a2be1a1848778dd3618d60aa8557f4fd95b403b1888999374a6d2e7caf672fb32a3921bcd6fc5be06542a2f3f64229afd90a211ccf1a0275f1a94f461505aa62302349ce739a13fc51565c21f47fa4349d054dd17d6e2c2357a8fb19a626f8725b8d9d6d2cb8d060ec75599cce0fd900dcb092aebb81c34ddc5a955024a3c1975097d0794fbeb5b3f1bf83eeba0d0995e3fb11c2632fb266d220449c3d343e3a13973be9f3eb859493eaa01fb4e0c53fe193e24809e9a31788453af7c3f49bcbae80cbb35620e82a110ce0a312e2c23d0b8db91e468952729bf5520760ccd8362421acd47b3425a7ecf08a9b3f8bd3514ba3e493ad7d9b97e9c40a6082a81a6b3aeccca67e876674d1b74e10a9f084b1010e140fd6b9ca4004b3551d393a8bc4396c5db2a5e90f6e066e818a15e566af346e6a26cc0cc8530e99910cdb877ff32163550b50b5dcd36359ce6e3017f007876b6789b65030393e9d423e731c56c445c8553f7d791e0372d1f7b368a1e2f32611994430e98cd996ad22942be20258d60cce205da7a13bd6249c6b7d42316f4f5c24e0df23bfc38350d87ae9ffb00441617b213988284cc36e716b693bc50258d1aa26374f0ef3c9b20db2547cb0d655e66cdcb2227dbdfee185d029766589e0dfbd58ae0e36d4a029d24a2e1ea094bb4a025a79121fcc681143581b1659ecbb083f7dcb600157f3a8154447fbf548ff5c24b07f0188f593502d8505a58ac6ba65ffc971c7e796557d4aad23f61ea18bc067a441502682d7733f9d45ec329f56c4899e6f0b6a5e09ff95a71e7b66c7d3a4856a67d5a26cfe002ce278be8ef9309888e801688cd397569e6643602c92c6a284b000442391c69f48c795681aeb784979ddc916b16871a04ea71b97550c2d48cd6f418cc9f21b39a019d65492dc63f7299d3b601d92e4266bb17028a56293982a987bf3201119df72cdf98e334e098f32f99065ab80f5bf88179161ae2190f53ed6df07affa68234fdcc22d7d8d86e895285e756f59179431a973eb0db621b0580c1664c1279323188c5738b48390cd0d658a2c79f2ecadad808d59516d84f6f1326951f5944194c8ca240d3bd7dce2a52e9a2219103ace47f179a1703846851955ea5af1f8a235215d8fe534292e44dfad2e93c3c277297b9f691d2357c1039805d294b3564e949bd433f1ccb26ab73833e8036c8b310861ae8a932ac8e6fd3e066f67dd5d8ae5674756c7112da0dab25b6acb8428451bbd8101202c5457d6fb1fc6d885b8d7f22b648c8246897b976e9a7c09dfd78bac467ca05647b340b9027a53183380ecb3949cc8602f2dcefa22e1e8ac2c5eae5b1ee5e9505279165ecfb072ae691e52ed73f1b97355d533293a6fbf6be046a88bb77abec48653995509f2cfffb1457eb3ffafeca55a5d134691382fd62844786b9d018b083cf5e50bef46edb2783d615d1817bc535ca93e2e1c28817744be474f471c47d4e390bd48be575017df17f2bf9e7167df2a511803dec863212e9122747f4f7b2f7aef73319f58c04d5f2bd3bb8296b6c30ade5f00806465d3eca7ff64d8e3d0283acc0f8f68b73571f800dc5e8d67531459e42ee5c7b0cd56fd32dad5938a3e74699cee077ff3ab904d5c9b84b8036d33c08318e1746b2a31378fb76c9a49dff3491a2e0002d66f1e76ddd8b78ebe3b2e50784bc8a103e3dfeccbd78b19d7fcf4f3f5cf52ab23250c3ef2fdf622b34e033ccbc2903c98c62417dbbea0948f880f80831d00997bfb895efb7f49a48ece50a1e94ac3f34452ed92966cea646fd79107edf63dde0d2b50e74124ea38978fbf57468517047fac99336efcea75a9796b74ed9e7d05fb2f3172ade1962b094ac4616a7853711dcdc071f6ab2469115c75964c01700ff42d2549c2b53a01d7872fb30bbc819629843a404cd8813b0ff007308ed55032e9b55a682e3bc82efdf00bff16aeb4be02d94e8132ce244f0708c34da06a483bb20bbf4ea068fb322270729d98e1cdb5ad876e53c58617242120918b8186b1e74700de8886235341cd3aaca5b4d26634ead9dcaaa7e63966185165f736758acf106bc03c77b03ed2709f0d2294d081ad15eeaa34830ebb7824d47a5794a1beaf03714cdceeceea052011cf99fb1a8c9a1585da60eaa7c5c545e51604e2a24d3d465d866d7f4a00862dd007bed6e8181fc7ba58ae969d42d022e8e2386da554c7772d16b7855b70db2f1ccf40a816d8ecc4670f771a399911e9ced018fbc08245411c7f06efa9abd355b7b7d2a99293a93fcb556ac12d523c8de0c4259817abc784dcfd77a1aaf198f8624db06fbdf178b461fa19af7d82e575d2d49cbd5f6d0b0f1ab96674f26d95b7e6321465a348119ed33a517015e84bae52eb6111c9812676fbe79a268008aedae52b6fea8107154c1bec8587eafc3612f57478b5433a1e6a5bd1dc860673a0ba2dab49261c3d3b9d6668f2174c43c911e408aa109c4f7558a63b06d008c6bee55794fe70761629da34a9db945b6833e4145beac7fc1d620a34fbb838a236840074358e50ab445121264951440a63d88222c4fd8e28943b45d3f84aac8dc0f61e2624aefbfde1ed8e9b45f17626f0ff643f9d525ea8b054e74ec60bf764de28df3a6fba63bfb3c6982eaf1572d90e1babe7bfa5c8e670a1d48fb3978eab66eacc4c370aaab01b2a741e106b748c1f9a1263d73a4fecc3eda8e5d3a7fb46a88c2f3a333f1510d08ad9cf8baf11985b7ef12c7c7f16d6b33c3ec31dfc06aa16bfd3dd06f61e925faaabb03b3373a8bc189ee115ba453bb4f0caa7831bc05019fa271ef58b2769023df8b8dd04abaa567aa87e7a4bb36e57ef465cb5095b137e663a8382a08cde52fcfdc7f9018ce72ce8df77e31684215d5e29b8bc2fff", 0x1000}], 0x5, &(0x7f0000002340)=ANY=[@ANYBLOB="401a0000000000008400000006000000083be6dea39e7209bbd6666c6b04da7a54bce163c00283ddd378904458cd10d5a929ef087c586705e4ca987eb850b9ad"], 0x40, 0x4000000}, 0x800) 08:52:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x8}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x689}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5004]}}, 0x1c) close(r0) 08:52:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xae5}, 0x28) 08:52:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x200000000000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa48}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:40 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5400000000000000]}}, 0x1c) [ 1503.656250] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x91ffffff00000000]}, 0x10) 08:52:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x231}, 0x28) 08:52:40 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9e5}, 0x28) 08:52:40 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) inotify_init1(0x80000) 08:52:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x1802]}}, 0x1c) close(r0) 08:52:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x800000000000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x855}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x464}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x1000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa13}, 0x28) 08:52:41 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x100000000, 0x40) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e24, 0xf6, @mcast2, 0x8}}, 0x100000000, 0xdff, 0x7fff, 0x2, 0xa5}, 0x98) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5555]}}, 0x1c) close(r0) 08:52:41 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x17d}, 0x28) 08:52:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x2000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb5c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:41 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000000000000]}}, 0x1c) [ 1504.502364] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, 0x10) 08:52:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb42}, 0x28) 08:52:41 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x96}, 0x28) 08:52:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x3]}}, 0x1c) close(r0) 08:52:41 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x800000000000008) 08:52:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x100000000000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x190}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9b}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:41 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x57e}, 0x28) 08:52:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5fd}, 0x28) 08:52:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x91ffffff00000000]}}, 0x1c) close(r0) 08:52:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x200000000000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:42 executing program 1: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x2) accept$inet6(r0, 0x0, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x0, 0xf4) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000100)={0x1}) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000001540)={@rand_addr, @empty, 0x0}, &(0x7f0000001580)=0xc) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000015c0)={@mcast1, @empty, @ipv4={[], [], @multicast2}, 0x7, 0x5, 0xe37b, 0x0, 0x5898, 0x0, r2}) 08:52:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x50d}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1505.109791] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:42 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x91d}, 0x28) [ 1505.173740] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:42 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}}, 0x1c) [ 1505.409372] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x10) 08:52:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x7000000]}}, 0x1c) close(r0) 08:52:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xae4}, 0x28) 08:52:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x1000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x29f}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:42 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb39}, 0x28) 08:52:42 executing program 1: r0 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x400000) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000480), &(0x7f00000004c0)=0x8) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x0, &(0x7f0000000440)) setresgid(r2, r3, r2) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000000c0)=0x5, 0x4) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0xfffffffffffffffe, 0x4, {0x9, 0x4, 0xdc, 0x5852}}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1f, 0x11, &(0x7f0000000500)=ANY=[@ANYBLOB="1804000004000000000000000000000000000002ff0f0001001d8e17b000000000001810000000000000000000000000001400004d51d1d42a641c2f3966cc08a6b65d9eed5603cdda38036b5445964053e7bfa70eb7d8a3c90e5e2ace80c61330ca43cac2c24087d459c54d668bf772930887500ded96d4d6bc5f81d5f5de2295d60f49ec0ca74700", @ANYRES32=r0, @ANYBLOB="000000000000000000001daafeff040000000000000000000000b7fe03001000000000000000000000007f06ff0100000000000000000000000095000000000000000000000000000000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, &(0x7f0000000040), 0x41f00, 0x1, [], 0x0, 0xd}, 0x48) 08:52:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x12e}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1505.817290] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:42 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x846}, 0x28) 08:52:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x758}, 0x28) 08:52:42 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4100, 0x0) r1 = inotify_init1(0x80800) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x40000000}) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x44, 0x9, 0xffffffffffffff9c, 0x4, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x3000000]}}, 0x1c) close(r0) 08:52:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x800000000000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x582}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1506.083294] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:43 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c) 08:52:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff91]}, 0x10) 08:52:43 executing program 1: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x4200) r1 = getpid() fcntl$lock(r0, 0x5, &(0x7f00000001c0)={0x1, 0x3, 0x9, 0xfffffffffffff669, r1}) socketpair(0x9, 0x80000, 0x8000, &(0x7f0000000200)={0xffffffffffffffff}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x7}}, 0xe5d, 0x9, 0x3, 0xfffffffffffffff9, 0x81}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f00000003c0)=r4, 0x4) tkill(r1, 0x1) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x2, 0x0, r0, 0x9, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000082000000761ec425e25cf9ffffff8844812c3329c68ba1b9d475f5582349883c527daf84a857a8a855da27240461b438a8684e21b72761ac66a49916fddd042112048cc86637788a66762d45b64fb86513b4ad09f87d2a3565e52c69da2817658b4fa58cc14699ccdff6d647bec3f19aa217c67c9a693781bb3c0491ae270b5120f320d528cb"], &(0x7f0000000180)=0xa6) openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x0, 0x0) 08:52:43 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x463}, 0x28) 08:52:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0xffffff7f00000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8bd}, 0x28) 08:52:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xff00]}}, 0x1c) close(r0) 08:52:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x88a}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:43 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c) 08:52:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0xffffff7f}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1506.726955] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1506.738861] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:43 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x12a}, 0x28) 08:52:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x392}, 0x28) 08:52:43 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x1, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x820}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xff0f000000000000]}}, 0x1c) close(r0) 08:52:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x2000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:43 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x80a}, 0x28) [ 1507.014627] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x10) 08:52:44 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802]}}, 0x1c) 08:52:44 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r1, 0x3f}, 0x8) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x100000001, 0x43, 0x23, 0xffffffffffffff9c, 0xff, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x897}, 0x28) 08:52:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x543}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x8000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x8000a0]}}, 0x1c) close(r0) 08:52:44 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x690}, 0x28) 08:52:44 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c) 08:52:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x6000000]}}, 0x1c) close(r0) 08:52:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:44 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x859}, 0x28) 08:52:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb0c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x78e}, 0x28) 08:52:44 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x80000001, 0x10000) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000580)={0x0, 0x6}) r1 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) finit_module(r1, &(0x7f0000000000)='\x00', 0x2) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001700)=@raw={'raw\x00', 0x9, 0x3, 0x130, 0x160, 0x160, 0x160, 0x0, 0x0, 0x330, 0x330, 0x330, 0x330, 0x330, 0x3, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xfffffffffffffede, 0x130, 0x0, {}, [@common=@frag={0x0, 'frag\x00', 0x0, {0x1ff, 0x1, 0x0, 0x2, 0x3}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x10, 0x5, 0xb10, 0x24000000, 'pptp\x00', 'syz0\x00', 0x1}}}, {{@uncond, 0x0, 0x188, 0x1d0, 0x0, {}, [@common=@unspec=@conntrack1={0xc0, 'conntrack\x00', 0x1, {{@ipv4=@dev={0xac, 0x14, 0x14, 0x19}, [0xffffffff, 0xffffffff, 0xffffffff, 0xffffff00], @ipv6=@dev={0xfe, 0x80, [], 0x13}, [0xff, 0xffffffff, 0xff000000, 0xffffffff], @ipv6=@mcast1, [0x0, 0xffffffff, 0x0, 0xff0000ff], @ipv6, [0x0, 0xff, 0xff000000, 0xffffff00], 0x1, 0x81, 0x6c, 0x4e22, 0x4e24, 0x4e24, 0x4e24, 0x2, 0x22}, 0x100, 0x2}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x7f, 'syz1\x00', 0xfffffffffffffffe}}}], {{[], 0x0, 0xa8, 0x36}, {0x28}}}}, 0xffffff92) [ 1507.843122] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1507.883729] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:45 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x541000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000040)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f0000000280)={0xa0, 0x19, 0x1, {0x1, {0x28, 0x1, 0x5}, 0x2, r1, r2, 0x0, 0x3ff, 0x8, 0x40, 0x7, 0x1, 0xfffffffffffffff9, 0x0, 0xa6cd, 0x100, 0x1, 0x5, 0x1, 0xfff, 0x67}}, 0xa0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x5, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x6d08335100000000]}}, 0x1c) close(r0) 08:52:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x10) 08:52:45 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x38a}, 0x28) 08:52:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xee}, 0x28) 08:52:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2f6}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1508.504112] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1508.573522] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:45 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c) 08:52:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x409}, 0x28) 08:52:45 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x559}, 0x28) 08:52:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6e3}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:45 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x18) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000100)) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x4002000000000000]}}, 0x1c) close(r0) 08:52:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0xffffff7f00000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1508.775400] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1508.799923] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:45 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x50000, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000040)) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb5d}, 0x28) 08:52:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x1000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa0018000]}, 0x10) 08:52:46 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa6c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:46 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa26}, 0x28) 08:52:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x4000000]}}, 0x1c) close(r0) 08:52:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x8000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:46 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0xfe, 0x0) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000003, 0x80, 0x40000) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x9, 0xa0000) connect$llc(r0, &(0x7f00000000c0)={0x1a, 0x300, 0xfffffffffffffff7, 0x10000, 0x2}, 0x10) [ 1509.372233] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1509.398037] mmap: syz-executor1 (3510) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 08:52:46 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54000000]}}, 0x1c) 08:52:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbd7}, 0x28) 08:52:46 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5bf}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:46 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000100)) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x3) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r0}) 08:52:46 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x354}, 0x28) 08:52:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x1f4]}}, 0x1c) close(r0) 08:52:46 executing program 1: 08:52:46 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9c}, 0x28) 08:52:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x178}, 0x28) [ 1509.732065] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x10) 08:52:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x50040000]}}, 0x1c) close(r0) 08:52:47 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2b6}, 0x28) 08:52:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8f6}, 0x28) 08:52:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x741}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1510.282450] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:47 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x124f8]}}, 0x1c) 08:52:47 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000000c0)={0x9, 0x8, 0x9, 0x80000001, 0xfff, 0x4}) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) 08:52:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8b3}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x365}, 0x28) 08:52:47 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x926}, 0x28) 08:52:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x2000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x142800]}}, 0x1c) close(r0) [ 1510.600533] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x947}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x154}, 0x28) 08:52:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x10) 08:52:48 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c) 08:52:48 executing program 1: r0 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0xa, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffff9c, 0x0, [0x24000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x8001, 0x1, 0xffffffff, 0x39, r0, 0x6}, 0x2c) 08:52:48 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6af}, 0x28) 08:52:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x600]}}, 0x1c) close(r0) 08:52:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2d0}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6a8}, 0x28) 08:52:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1511.167629] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1511.199983] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9fb}, 0x28) 08:52:48 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x387}, 0x28) 08:52:48 executing program 1: exit(0x0) open$dir(&(0x7f0000000340)="e91f7189591e9233614b00", 0x7ffa, 0x0) unlink(&(0x7f0000000380)="e91f7189591e9233614b2f66696c65302f66696c653000") 08:52:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x53b}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xf401]}}, 0x1c) close(r0) 08:52:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:48 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x364}, 0x28) 08:52:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x760}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:48 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}}, 0x1c) 08:52:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x279}, 0x28) 08:52:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xaaaa]}}, 0x1c) close(r0) 08:52:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x0, 0xffffff7f00000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x10) 08:52:48 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x36d}, 0x28) 08:52:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x94e}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:49 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4ce}, 0x28) 08:52:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x85f}, 0x28) [ 1512.115293] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:49 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 08:52:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5000000000000]}}, 0x1c) close(r0) 08:52:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9ff}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1f3}, 0x28) 08:52:49 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1cd}, 0x28) [ 1512.323267] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:49 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}, 0x1c) 08:52:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x8dffffff]}}, 0x1c) close(r0) 08:52:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x63f}, 0x28) 08:52:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x425}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f0000]}, 0x10) 08:52:49 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8a}, 0x28) 08:52:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') preadv(r0, &(0x7f0000002580)=[{&(0x7f0000000280)=""/244, 0xf4}], 0x1, 0x0) 08:52:49 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000080)=""/23) 08:52:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x29d}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:50 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8cb}, 0x28) 08:52:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfec00000]}}, 0x1c) close(r0) [ 1513.045415] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3ee}, 0x28) 08:52:50 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1513.199774] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa52}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:50 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f]}}, 0x1c) 08:52:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x82c}, 0x28) 08:52:50 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xe5}, 0x28) 08:52:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x496}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x55550000]}}, 0x1c) close(r0) 08:52:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff91]}, 0x10) 08:52:50 executing program 1: io_setup(0x20, &(0x7f0000000180)=0x0) io_cancel(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)}, &(0x7f00000002c0)) 08:52:50 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 1513.924096] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:50 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x197}, 0x28) 08:52:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5a}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:51 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, 0x1c) [ 1513.996310] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x561}, 0x28) 08:52:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffffe) 08:52:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x9]}}, 0x1c) close(r0) 08:52:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x2000000, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:51 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c) 08:52:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xac5}, 0x28) 08:52:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5e5}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:51 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x653}, 0x28) 08:52:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9ff}, 0x28) [ 1514.351940] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0xffffff7f, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, 0x10) 08:52:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x936}, 0x28) 08:52:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xe803000000000000]}}, 0x1c) close(r0) 08:52:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2ed}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:51 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb85}, 0x28) 08:52:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x322}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x8, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1514.723993] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1514.791749] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x68c}, 0x28) 08:52:51 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x13b}, 0x28) 08:52:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x100000000000000, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:52 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}, 0x1c) 08:52:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfc000000]}}, 0x1c) close(r0) 08:52:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8f0}, 0x28) 08:52:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x471}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8fe}, 0x28) 08:52:52 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x918}, 0x28) [ 1515.202947] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1515.255552] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x10) 08:52:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x800000000000000, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:52 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb23}, 0x28) 08:52:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x90d}, 0x28) 08:52:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb91}, 0x28) 08:52:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfc00]}}, 0x1c) close(r0) 08:52:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x933}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1515.681778] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1c2}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x1000000, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:52 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8dc}, 0x28) 08:52:53 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x493e0]}}, 0x1c) 08:52:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xffffff91]}}, 0x1c) close(r0) 08:52:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8ba}, 0x28) 08:52:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x4]}}, 0x1c) close(r0) 08:52:53 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5e0}, 0x28) 08:52:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbd5}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x10) 08:52:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x8000000, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x701}, 0x28) 08:52:53 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103080]}}, 0x1c) 08:52:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xffffffff00000000]}}, 0x1c) close(r0) 08:52:53 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7d3}, 0x28) 08:52:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5a5}, 0x28) 08:52:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xae4}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1516.509140] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:53 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15728]}}, 0x1c) 08:52:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x2, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:53 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x215}, 0x28) 08:52:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe8030000]}}, 0x1c) close(r0) [ 1516.585630] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x491}, 0x28) 08:52:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x4000]}}, 0x1c) close(r0) [ 1516.695091] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x711}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x200000000000000, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1516.869365] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1516.929199] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002]}, 0x10) 08:52:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x620}, 0x28) 08:52:54 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55550000]}}, 0x1c) 08:52:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9b}, 0x28) 08:52:54 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x885}, 0x28) 08:52:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x367}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0xffffff7f00000000, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x10]}}, 0x1c) close(r0) 08:52:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x1000000, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x11]}}, 0x1c) close(r0) [ 1517.417468] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:54 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8bd}, 0x28) 08:52:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x744}, 0x28) 08:52:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x4002000000000000]}}, 0x1c) close(r0) 08:52:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbbe}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x2, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:54 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4b0}, 0x28) [ 1517.621463] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x10) 08:52:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x450]}}, 0x1c) close(r0) 08:52:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb7c}, 0x28) 08:52:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x100000000000000, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x10e}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:55 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x26b}, 0x28) 08:52:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x33d}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:55 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002]}}, 0x1c) 08:52:55 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x704}, 0x28) 08:52:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x153}, 0x28) 08:52:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x885a010000000000]}}, 0x1c) close(r0) 08:52:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x800000000000000, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:55 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}}, 0x1c) 08:52:55 executing program 1 (fault-call:3 fault-nth:0): r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:52:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7e8}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:55 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbdb}, 0x28) [ 1518.562001] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1518.563264] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1518.599106] FAULT_INJECTION: forcing a failure. [ 1518.599106] name failslab, interval 1, probability 0, space 0, times 0 [ 1518.610447] CPU: 0 PID: 4169 Comm: syz-executor1 Not tainted 4.18.0-next-20180821+ #44 [ 1518.618524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1518.627886] Call Trace: [ 1518.630497] dump_stack+0x1c9/0x2b4 [ 1518.634136] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1518.639353] ? perf_trace_lock+0xde/0x920 [ 1518.643537] should_fail.cold.4+0xa/0x11 [ 1518.647620] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1518.652754] ? zap_class+0x740/0x740 [ 1518.656487] ? graph_lock+0x170/0x170 [ 1518.660306] ? graph_lock+0x170/0x170 [ 1518.664124] ? find_held_lock+0x36/0x1c0 [ 1518.668222] ? check_same_owner+0x340/0x340 [ 1518.672560] ? rcu_note_context_switch+0x680/0x680 [ 1518.677501] ? _raw_spin_unlock_bh+0x30/0x40 [ 1518.681940] __should_failslab+0x124/0x180 [ 1518.686189] should_failslab+0x9/0x14 [ 1518.690004] kmem_cache_alloc_node+0x256/0x720 [ 1518.694603] ? __local_bh_enable_ip+0x161/0x230 [ 1518.699292] ? _raw_spin_unlock_bh+0x30/0x40 [ 1518.703719] __alloc_skb+0x119/0x770 [ 1518.707453] ? skb_scrub_packet+0x490/0x490 [ 1518.711789] ? netlink_insert+0x15d/0x3f0 [ 1518.715955] ? __netlink_insert+0x13d0/0x13d0 [ 1518.720474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1518.726024] ? netlink_autobind.isra.34+0x23b/0x320 [ 1518.731075] netlink_sendmsg+0xb29/0xfc0 [ 1518.735154] ? netlink_unicast+0x760/0x760 [ 1518.739401] ? move_addr_to_kernel.part.18+0x100/0x100 [ 1518.744699] ? security_socket_sendmsg+0x94/0xc0 [ 1518.749470] ? netlink_unicast+0x760/0x760 [ 1518.753719] sock_sendmsg+0xd5/0x120 [ 1518.757461] ___sys_sendmsg+0x7fd/0x930 [ 1518.761452] ? copy_msghdr_from_user+0x580/0x580 [ 1518.766217] ? lock_downgrade+0x8f0/0x8f0 [ 1518.770411] ? proc_fail_nth_write+0x9e/0x210 [ 1518.774924] ? __fget_light+0x2f7/0x440 [ 1518.778910] ? fget_raw+0x20/0x20 [ 1518.782382] ? find_held_lock+0x36/0x1c0 [ 1518.786462] ? kasan_check_write+0x14/0x20 [ 1518.790707] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1518.795649] ? wait_for_completion+0x8d0/0x8d0 [ 1518.800254] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1518.805799] ? sockfd_lookup_light+0xc5/0x160 [ 1518.810305] __sys_sendmsg+0x11d/0x290 [ 1518.814203] ? __ia32_sys_shutdown+0x80/0x80 [ 1518.818623] ? __sb_end_write+0xac/0xe0 [ 1518.822626] ? fput+0x130/0x1a0 [ 1518.825918] ? do_syscall_64+0x9a/0x820 [ 1518.829905] ? do_syscall_64+0x9a/0x820 [ 1518.833901] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 1518.839019] __x64_sys_sendmsg+0x78/0xb0 [ 1518.843087] do_syscall_64+0x1b9/0x820 [ 1518.846980] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1518.852354] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1518.857288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1518.862135] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 1518.867163] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1518.872201] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1518.877059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.882252] RIP: 0033:0x457089 [ 1518.885456] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1518.904369] RSP: 002b:00007f260036ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1518.912090] RAX: ffffffffffffffda RBX: 00007f260036b6d4 RCX: 0000000000457089 [ 1518.919389] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 1518.926672] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1518.933945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1518.941217] R13: 00000000004d4088 R14: 00000000004c8ab0 R15: 0000000000000000 08:52:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x10) 08:52:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0xffffff7f, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1ab}, 0x28) 08:52:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5b4}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfc00000000000000]}}, 0x1c) close(r0) 08:52:56 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7ed}, 0x28) 08:52:56 executing program 1 (fault-call:3 fault-nth:1): r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) [ 1519.194250] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1519.197980] FAULT_INJECTION: forcing a failure. [ 1519.197980] name failslab, interval 1, probability 0, space 0, times 0 [ 1519.215979] CPU: 0 PID: 4198 Comm: syz-executor1 Not tainted 4.18.0-next-20180821+ #44 [ 1519.224043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1519.233404] Call Trace: [ 1519.236004] dump_stack+0x1c9/0x2b4 [ 1519.239662] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1519.244885] ? perf_trace_lock+0xde/0x920 [ 1519.249047] should_fail.cold.4+0xa/0x11 [ 1519.253118] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1519.258228] ? __save_stack_trace+0x8d/0xf0 [ 1519.262574] ? save_stack+0x43/0xd0 [ 1519.266218] ? find_held_lock+0x36/0x1c0 [ 1519.270311] ? check_same_owner+0x340/0x340 [ 1519.274650] ? rcu_note_context_switch+0x680/0x680 [ 1519.279592] ? kmem_cache_alloc_node+0x217/0x720 [ 1519.284381] __should_failslab+0x124/0x180 [ 1519.288634] should_failslab+0x9/0x14 [ 1519.292443] kmem_cache_alloc_node_trace+0x259/0x720 [ 1519.297594] __kmalloc_node_track_caller+0x33/0x70 [ 1519.302563] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 1519.307364] __alloc_skb+0x155/0x770 [ 1519.311104] ? skb_scrub_packet+0x490/0x490 [ 1519.315449] ? netlink_insert+0x15d/0x3f0 [ 1519.319645] ? __netlink_insert+0x13d0/0x13d0 [ 1519.324164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1519.329737] ? netlink_autobind.isra.34+0x23b/0x320 [ 1519.334767] netlink_sendmsg+0xb29/0xfc0 [ 1519.338844] ? netlink_unicast+0x760/0x760 [ 1519.343092] ? move_addr_to_kernel.part.18+0x100/0x100 [ 1519.348380] ? security_socket_sendmsg+0x94/0xc0 [ 1519.353157] ? netlink_unicast+0x760/0x760 [ 1519.357406] sock_sendmsg+0xd5/0x120 [ 1519.361152] ___sys_sendmsg+0x7fd/0x930 [ 1519.365141] ? copy_msghdr_from_user+0x580/0x580 [ 1519.369955] ? lock_downgrade+0x8f0/0x8f0 [ 1519.374118] ? proc_fail_nth_write+0x9e/0x210 [ 1519.378632] ? __fget_light+0x2f7/0x440 [ 1519.382625] ? fget_raw+0x20/0x20 [ 1519.386083] ? find_held_lock+0x36/0x1c0 [ 1519.390155] ? kasan_check_write+0x14/0x20 [ 1519.394426] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1519.399365] ? wait_for_completion+0x8d0/0x8d0 [ 1519.403993] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1519.409568] ? sockfd_lookup_light+0xc5/0x160 [ 1519.414077] __sys_sendmsg+0x11d/0x290 [ 1519.417971] ? __ia32_sys_shutdown+0x80/0x80 [ 1519.422390] ? __sb_end_write+0xac/0xe0 [ 1519.426383] ? fput+0x130/0x1a0 [ 1519.429672] ? do_syscall_64+0x9a/0x820 [ 1519.433655] ? do_syscall_64+0x9a/0x820 [ 1519.437661] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 1519.442785] __x64_sys_sendmsg+0x78/0xb0 [ 1519.446859] do_syscall_64+0x1b9/0x820 [ 1519.450757] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1519.456128] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1519.461078] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 1519.466108] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1519.471144] ? recalc_sigpending_tsk+0x180/0x180 [ 1519.475913] ? kasan_check_write+0x14/0x20 [ 1519.480173] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1519.485059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1519.490257] RIP: 0033:0x457089 [ 1519.493457] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1519.512414] RSP: 002b:00007f260036ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1519.520142] RAX: ffffffffffffffda RBX: 00007f260036b6d4 RCX: 0000000000457089 [ 1519.527418] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 1519.534695] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1519.541972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1519.549253] R13: 00000000004d4088 R14: 00000000004c8ab0 R15: 0000000000000001 [ 1519.585663] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3c2}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:56 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xe2}, 0x28) 08:52:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x8000000, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:56 executing program 1 (fault-call:3 fault-nth:2): r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:52:56 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaaaa000000000000]}}, 0x1c) 08:52:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xc000000]}}, 0x1c) close(r0) [ 1519.735175] FAULT_INJECTION: forcing a failure. [ 1519.735175] name failslab, interval 1, probability 0, space 0, times 0 [ 1519.746871] CPU: 0 PID: 4222 Comm: syz-executor1 Not tainted 4.18.0-next-20180821+ #44 [ 1519.754944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1519.764302] Call Trace: [ 1519.766943] dump_stack+0x1c9/0x2b4 [ 1519.770601] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1519.775812] ? __lock_acquire+0x7fc/0x5020 [ 1519.780074] should_fail.cold.4+0xa/0x11 [ 1519.784150] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1519.789272] ? mark_held_locks+0x160/0x160 [ 1519.793532] ? rcu_note_context_switch+0x680/0x680 [ 1519.798471] ? graph_lock+0x170/0x170 [ 1519.802320] ? find_held_lock+0x36/0x1c0 [ 1519.806397] ? __lock_is_held+0xb5/0x140 [ 1519.810505] ? check_same_owner+0x340/0x340 [ 1519.814846] ? rcu_note_context_switch+0x680/0x680 [ 1519.819805] __should_failslab+0x124/0x180 [ 1519.824052] should_failslab+0x9/0x14 [ 1519.827863] kmem_cache_alloc_node+0x256/0x720 [ 1519.832467] ? lock_downgrade+0x8f0/0x8f0 [ 1519.836639] __alloc_skb+0x119/0x770 [ 1519.840386] ? skb_scrub_packet+0x490/0x490 [ 1519.844761] ? kasan_check_write+0x14/0x20 [ 1519.849006] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1519.853955] ? wait_for_completion+0x8d0/0x8d0 [ 1519.858562] ? lock_downgrade+0x8f0/0x8f0 [ 1519.862754] netlink_dump+0x6e3/0xd50 [ 1519.866566] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 1519.871248] ? netlink_broadcast+0x50/0x50 [ 1519.875509] __netlink_dump_start+0x4f1/0x6f0 [ 1519.880039] ? kasan_check_read+0x11/0x20 [ 1519.884253] tipc_sock_diag_handler_dump+0x234/0x340 [ 1519.889381] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 1519.894060] ? tipc_unregister_sysctl+0x20/0x20 [ 1519.898743] ? netlink_deliver_tap+0x356/0xfb0 [ 1519.903350] sock_diag_rcv_msg+0x31d/0x410 [ 1519.907614] netlink_rcv_skb+0x172/0x440 [ 1519.911693] ? sock_diag_bind+0x80/0x80 [ 1519.915687] ? netlink_ack+0xbe0/0xbe0 [ 1519.919583] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 1519.924307] sock_diag_rcv+0x2a/0x40 [ 1519.928032] netlink_unicast+0x5a0/0x760 [ 1519.932119] ? netlink_attachskb+0x9a0/0x9a0 [ 1519.936564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1519.942109] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1519.947137] netlink_sendmsg+0xa18/0xfc0 [ 1519.951214] ? netlink_unicast+0x760/0x760 [ 1519.955462] ? move_addr_to_kernel.part.18+0x100/0x100 [ 1519.960765] ? security_socket_sendmsg+0x94/0xc0 [ 1519.965525] ? netlink_unicast+0x760/0x760 [ 1519.969767] sock_sendmsg+0xd5/0x120 [ 1519.973492] ___sys_sendmsg+0x7fd/0x930 [ 1519.977482] ? copy_msghdr_from_user+0x580/0x580 [ 1519.982245] ? lock_downgrade+0x8f0/0x8f0 [ 1519.986406] ? proc_fail_nth_write+0x9e/0x210 [ 1519.990917] ? __fget_light+0x2f7/0x440 [ 1519.994907] ? fget_raw+0x20/0x20 [ 1519.998363] ? find_held_lock+0x36/0x1c0 [ 1520.002463] ? kasan_check_write+0x14/0x20 [ 1520.006707] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1520.011684] ? wait_for_completion+0x8d0/0x8d0 [ 1520.016290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1520.021833] ? sockfd_lookup_light+0xc5/0x160 [ 1520.026339] __sys_sendmsg+0x11d/0x290 [ 1520.030235] ? __ia32_sys_shutdown+0x80/0x80 [ 1520.034650] ? __sb_end_write+0xac/0xe0 [ 1520.038648] ? fput+0x130/0x1a0 [ 1520.041946] ? do_syscall_64+0x9a/0x820 [ 1520.045941] ? do_syscall_64+0x9a/0x820 [ 1520.049950] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 1520.055069] __x64_sys_sendmsg+0x78/0xb0 [ 1520.059195] do_syscall_64+0x1b9/0x820 [ 1520.063104] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1520.068473] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1520.073418] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 1520.078450] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1520.083502] ? recalc_sigpending_tsk+0x180/0x180 [ 1520.088264] ? kasan_check_write+0x14/0x20 [ 1520.092510] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1520.097370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1520.102567] RIP: 0033:0x457089 [ 1520.105766] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1520.124669] RSP: 002b:00007f260036ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 08:52:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x804}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1520.132411] RAX: ffffffffffffffda RBX: 00007f260036b6d4 RCX: 0000000000457089 [ 1520.139701] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 1520.146971] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1520.154258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1520.161527] R13: 00000000004d4088 R14: 00000000004c8ab0 R15: 0000000000000002 08:52:57 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5d9}, 0x28) [ 1520.201063] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1520.212636] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x8, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x10) 08:52:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xef}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb05}, 0x28) 08:52:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x200000000000000, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:57 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8d3}, 0x28) 08:52:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb3b}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:57 executing program 1 (fault-call:3 fault-nth:3): r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:52:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0xffffff7f00000000, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5455010000000000]}}, 0x1c) close(r0) 08:52:57 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x96a}, 0x28) [ 1520.647066] FAULT_INJECTION: forcing a failure. [ 1520.647066] name failslab, interval 1, probability 0, space 0, times 0 [ 1520.658449] CPU: 1 PID: 4269 Comm: syz-executor1 Not tainted 4.18.0-next-20180821+ #44 [ 1520.666541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1520.675907] Call Trace: [ 1520.678524] dump_stack+0x1c9/0x2b4 [ 1520.682170] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1520.687398] should_fail.cold.4+0xa/0x11 [ 1520.691477] ? __kernel_text_address+0xd/0x40 [ 1520.695988] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1520.701100] ? __save_stack_trace+0x8d/0xf0 [ 1520.705441] ? graph_lock+0x170/0x170 [ 1520.709255] ? save_stack+0x43/0xd0 [ 1520.712889] ? kasan_kmalloc+0xc4/0xe0 [ 1520.716836] ? find_held_lock+0x36/0x1c0 [ 1520.720908] ? __lock_is_held+0xb5/0x140 [ 1520.724995] ? check_same_owner+0x340/0x340 [ 1520.729330] ? mark_held_locks+0xc9/0x160 [ 1520.733486] ? rcu_note_context_switch+0x680/0x680 [ 1520.738428] ? kmem_cache_alloc_node+0x217/0x720 [ 1520.743217] __should_failslab+0x124/0x180 [ 1520.747471] should_failslab+0x9/0x14 [ 1520.751285] kmem_cache_alloc_node_trace+0x259/0x720 [ 1520.756420] __kmalloc_node_track_caller+0x33/0x70 [ 1520.761364] __kmalloc_reserve.isra.41+0x3a/0xe0 [ 1520.766132] __alloc_skb+0x155/0x770 [ 1520.769859] ? skb_scrub_packet+0x490/0x490 [ 1520.774196] ? kasan_check_write+0x14/0x20 [ 1520.778439] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1520.783378] ? wait_for_completion+0x8d0/0x8d0 [ 1520.787977] ? lock_downgrade+0x8f0/0x8f0 [ 1520.792140] netlink_dump+0x6e3/0xd50 [ 1520.795951] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 1520.800639] ? netlink_broadcast+0x50/0x50 [ 1520.804894] __netlink_dump_start+0x4f1/0x6f0 [ 1520.809404] ? kasan_check_read+0x11/0x20 [ 1520.813568] tipc_sock_diag_handler_dump+0x234/0x340 [ 1520.818684] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 1520.823366] ? tipc_unregister_sysctl+0x20/0x20 [ 1520.828050] ? netlink_deliver_tap+0x356/0xfb0 [ 1520.832658] sock_diag_rcv_msg+0x31d/0x410 [ 1520.836909] netlink_rcv_skb+0x172/0x440 [ 1520.840978] ? sock_diag_bind+0x80/0x80 [ 1520.844958] ? netlink_ack+0xbe0/0xbe0 [ 1520.848845] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 1520.853528] sock_diag_rcv+0x2a/0x40 [ 1520.857244] netlink_unicast+0x5a0/0x760 [ 1520.861333] ? netlink_attachskb+0x9a0/0x9a0 [ 1520.865747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1520.871290] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1520.876313] netlink_sendmsg+0xa18/0xfc0 [ 1520.880385] ? netlink_unicast+0x760/0x760 [ 1520.884644] ? move_addr_to_kernel.part.18+0x100/0x100 [ 1520.889930] ? security_socket_sendmsg+0x94/0xc0 [ 1520.894687] ? netlink_unicast+0x760/0x760 [ 1520.898928] sock_sendmsg+0xd5/0x120 [ 1520.902649] ___sys_sendmsg+0x7fd/0x930 [ 1520.906644] ? copy_msghdr_from_user+0x580/0x580 [ 1520.911412] ? lock_downgrade+0x8f0/0x8f0 [ 1520.915564] ? proc_fail_nth_write+0x9e/0x210 [ 1520.920066] ? __fget_light+0x2f7/0x440 [ 1520.924044] ? fget_raw+0x20/0x20 [ 1520.927498] ? find_held_lock+0x36/0x1c0 [ 1520.931577] ? kasan_check_write+0x14/0x20 [ 1520.935824] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1520.940763] ? wait_for_completion+0x8d0/0x8d0 [ 1520.945360] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1520.950901] ? sockfd_lookup_light+0xc5/0x160 [ 1520.955408] __sys_sendmsg+0x11d/0x290 [ 1520.959304] ? __ia32_sys_shutdown+0x80/0x80 [ 1520.963717] ? __sb_end_write+0xac/0xe0 [ 1520.967699] ? fput+0x130/0x1a0 [ 1520.970984] ? do_syscall_64+0x9a/0x820 [ 1520.974961] ? do_syscall_64+0x9a/0x820 [ 1520.978944] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 1520.984053] __x64_sys_sendmsg+0x78/0xb0 [ 1520.988119] do_syscall_64+0x1b9/0x820 [ 1520.992011] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1520.997387] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1521.002321] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 1521.007558] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1521.012575] ? recalc_sigpending_tsk+0x180/0x180 [ 1521.017339] ? kasan_check_write+0x14/0x20 [ 1521.021580] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1521.026443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1521.031638] RIP: 0033:0x457089 08:52:58 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8240100]}}, 0x1c) [ 1521.034837] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1521.053734] RSP: 002b:00007f260036ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1521.061443] RAX: ffffffffffffffda RBX: 00007f260036b6d4 RCX: 0000000000457089 [ 1521.068719] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 1521.075987] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1521.083253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1521.090522] R13: 00000000004d4088 R14: 00000000004c8ab0 R15: 0000000000000003 08:52:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xaed}, 0x28) 08:52:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xfe}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x2000000, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x10) 08:52:58 executing program 1 (fault-call:3 fault-nth:4): r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) [ 1521.218746] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1521.252547] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:58 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6ec}, 0x28) 08:52:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x8, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb15}, 0x28) 08:52:58 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:52:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xc}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:58 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x416}, 0x28) 08:52:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb08}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:58 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7cf}, 0x28) 08:52:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xa0008000]}}, 0x1c) close(r0) 08:52:58 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0xec0}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) [ 1521.700115] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4a6}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x200000000000000, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x984}, 0x28) 08:52:58 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x877}, 0x28) 08:52:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x10) 08:52:59 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c) 08:52:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x91ffffff]}}, 0x1c) close(r0) 08:52:59 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x2000d389}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:52:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x800000000000000, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:59 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x720}, 0x28) 08:52:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x179}, 0x28) 08:52:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6f8}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:59 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x597}, 0x28) [ 1522.209897] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:52:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x15a88]}}, 0x1c) close(r0) 08:52:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0xffffff7f00000000, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:52:59 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x218}, 0x28) 08:52:59 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x9}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:52:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x63d}, 0x28) 08:52:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x783}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:52:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xe803]}}, 0x1c) close(r0) 08:53:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x8000000, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:00 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xc00e000000000000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f0000]}, 0x10) 08:53:00 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb0f}, 0x28) 08:53:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x218}, 0x28) 08:53:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x240]}}, 0x1c) close(r0) 08:53:00 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0930400]}}, 0x1c) 08:53:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa3d}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1523.118272] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:00 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa4d}, 0x28) 08:53:00 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf000000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xc0fe]}}, 0x1c) close(r0) 08:53:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x2, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9bf}, 0x28) 08:53:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa0b}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:00 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xc00e}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x100000000000000, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4d9}, 0x28) 08:53:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5400000000000000]}}, 0x1c) close(r0) [ 1523.512176] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1523.571801] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x10) 08:53:00 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa93}, 0x28) 08:53:00 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf0ffffffffffff}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x191}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x1000000, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:00 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cf20400]}}, 0x1c) 08:53:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x322}, 0x28) 08:53:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xc00000000000000]}}, 0x1c) close(r0) 08:53:01 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2d1}, 0x28) 08:53:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x504}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1524.010550] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:01 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf0ffffff00000000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) [ 1524.078407] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x2000000, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb0b}, 0x28) 08:53:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x18020000]}}, 0x1c) close(r0) 08:53:01 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4f9}, 0x28) 08:53:01 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xfffffffffffff000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) [ 1524.262430] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1524.331544] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x10) 08:53:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x89}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0xffffff7f, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7e0}, 0x28) 08:53:01 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x659}, 0x28) 08:53:01 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeef]}}, 0x1c) 08:53:01 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xfeffffff00000000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x6]}}, 0x1c) close(r0) 08:53:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9a0}, 0x28) 08:53:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x2, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x67b}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:01 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x671}, 0x28) 08:53:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x11000000]}}, 0x1c) close(r0) 08:53:02 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xfeffffff}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x56b}, 0x28) 08:53:02 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x929}, 0x28) [ 1525.171446] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1525.244716] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91ffffff]}, 0x10) 08:53:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x100000000000000, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:02 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c) 08:53:02 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x558}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:02 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf0ffff}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:02 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x668}, 0x28) 08:53:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x741}, 0x28) 08:53:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xf4010000]}}, 0x1c) close(r0) 08:53:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x200000000000000, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1525.681120] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:02 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x34000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:02 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x18}, 0x28) 08:53:02 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2000000]}}, 0x1c) 08:53:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x29f}, 0x28) [ 1525.803929] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:02 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x32f}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) [ 1525.874004] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:02 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x4002]}}, 0x1c) close(r0) 08:53:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x10) 08:53:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x800000000000000, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:03 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb9e}, 0x28) 08:53:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x77f}, 0x28) 08:53:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4cd}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:03 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf0ffffff}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x900000000000000]}}, 0x1c) close(r0) [ 1526.526671] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xbfd}, 0x28) 08:53:03 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xc00e0000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0xffffff7f00000000, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x279}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:03 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}}, 0x1c) 08:53:03 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2f5}, 0x28) 08:53:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5004000000000000]}}, 0x1c) close(r0) 08:53:03 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf00}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6c4}, 0x28) [ 1526.834130] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1526.884952] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x10) 08:53:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x2000000, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x284}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:04 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x2}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:04 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x599}, 0x28) 08:53:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x600000000000000]}}, 0x1c) close(r0) 08:53:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb9}, 0x28) [ 1527.401728] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x8000000, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x682}, 0x28) 08:53:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6fd}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:04 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xa7c}, 0x28) 08:53:04 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8ff000000000000]}}, 0x1c) 08:53:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xc]}}, 0x1c) close(r0) 08:53:04 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xfffff000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x8, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x699}, 0x28) [ 1527.792907] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x10) 08:53:05 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8bb}, 0x28) 08:53:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xabe}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:05 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xffffffffa0040000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x2000000000000000]}}, 0x1c) close(r0) 08:53:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x27e}, 0x28) 08:53:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0xffffff7f, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1528.260195] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xab}, 0x28) 08:53:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x1000000, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:05 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x9effffff}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:05 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb2d}, 0x28) 08:53:05 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}}, 0x1c) 08:53:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xaf}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x8000000]}}, 0x1c) close(r0) 08:53:05 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xffffff7f}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4c1}, 0x28) [ 1528.653861] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1528.668789] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1528.730804] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x218]}, 0x10) 08:53:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260603dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:06 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x26d}, 0x28) 08:53:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x26c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:06 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x3120}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x4e}, 0x28) 08:53:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xe000000]}}, 0x1c) close(r0) [ 1529.128262] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:06 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x2031}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260703dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x61c}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:06 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x456}, 0x28) [ 1529.202895] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:06 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91ffffff]}}, 0x1c) 08:53:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7f4}, 0x28) 08:53:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x900]}}, 0x1c) close(r0) 08:53:06 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xfffffff0}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260203dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) [ 1529.519641] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x10) 08:53:06 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x330}, 0x28) 08:53:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x423}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:06 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x4a0ffffffff}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260303dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x2f0}, 0x28) 08:53:06 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c) 08:53:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5000000]}}, 0x1c) close(r0) [ 1530.009245] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:07 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf00000000000000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260403dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:07 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x1c) [ 1530.086435] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x92f}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x75}, 0x28) 08:53:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5400]}}, 0x1c) close(r0) 08:53:07 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x15a}, 0x28) 08:53:07 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xfcffffff00000000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) [ 1530.293185] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x10) 08:53:07 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc2]}}, 0x1c) 08:53:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260502dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}}, 0x0) 08:53:07 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x45b}, 0x28) 08:53:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x6e8}, 0x28) 08:53:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xaf4}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x7]}}, 0x1c) close(r0) 08:53:07 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x4a0}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:07 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xf000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:07 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9}, 0x28) 08:53:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xff00000000000000]}}, 0x1c) close(r0) 08:53:07 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe093040000000000]}}, 0x1c) 08:53:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb0b}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x38}}, 0x0) 08:53:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xad3}, 0x28) 08:53:08 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xfffffffc}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) [ 1531.131283] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1531.153095] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x10) 08:53:08 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x9f0}, 0x28) 08:53:08 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xfffffffe}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb6f}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x3e6}, 0x28) 08:53:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x20000240}}, 0x0) 08:53:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xf5ffffff00000000]}}, 0x1c) close(r0) [ 1531.808420] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:08 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xa0040000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:08 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0xb48}, 0x28) 08:53:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x7ffff000}}, 0x0) 08:53:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x8d8}, 0x28) 08:53:08 executing program 0: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1a) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce000000]}}, 0x1c) 08:53:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x14280000000000]}}, 0x1c) close(r0) 08:53:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5ff}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:08 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x400300}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x37}}, 0x0) [ 1532.098527] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1532.114115] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1532.177001] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x10) 08:53:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x5e4}, 0x28) 08:53:09 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x7a2}, 0x28) 08:53:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa0008000, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x1e3}, 0x28) dup3(0xffffffffffffffff, r0, 0x0) 08:53:09 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xffffffff00000000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0xfffffdef}}, 0x0) 08:53:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x4000000000000000]}}, 0x1c) close(r0) [ 1532.664840] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:53:09 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000180)=@req3={0xfffffffffffffffd, 0x0, 0x2}, 0x10e) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x100000000000000}, 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:53:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0xffffffffa000867e, 0xe, 0x1000, &(0x7f00000001c0)="e84373f460e0f11c39f9b7a31ba2", &(0x7f0000000500)=""/4096, 0x15c}, 0x28) 08:53:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000000)={&(0x7f0000004000), 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b100"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00005e4000)={&(0x7f00002ccff0), 0x10, &(0x7f0000728000)={&(0x7f00000001c0)={0x5, 0x900, 0x0, {0x0, 0x7530}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}, 0x2}, 0x0) 08:53:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x20000000]}}, 0x1c) close(r0) [ 1532.841293] ================================================================== [ 1532.848919] BUG: KASAN: use-after-free in tipc_group_fill_sock_diag+0x7b9/0x84b [ 1532.856379] Read of size 4 at addr ffff8801d81ad15c by task syz-executor1/5153 [ 1532.863739] [ 1532.865379] CPU: 0 PID: 5153 Comm: syz-executor1 Not tainted 4.18.0-next-20180821+ #44 [ 1532.873436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1532.882814] Call Trace: [ 1532.885418] dump_stack+0x1c9/0x2b4 [ 1532.889059] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1532.894258] ? printk+0xa7/0xcf [ 1532.897549] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1532.902324] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 1532.907441] print_address_description+0x6c/0x20b [ 1532.912296] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 1532.917408] kasan_report.cold.7+0x242/0x30d [ 1532.921833] __asan_report_load4_noabort+0x14/0x20 [ 1532.926776] tipc_group_fill_sock_diag+0x7b9/0x84b [ 1532.931717] ? tipc_group_member_evt+0xe30/0xe30 [ 1532.936489] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1532.941515] ? skb_put+0x17b/0x1e0 [ 1532.945065] ? memset+0x31/0x40 [ 1532.948357] ? memcpy+0x45/0x50 [ 1532.951658] ? __nla_put+0x37/0x40 [ 1532.955220] ? nla_put+0x11a/0x150 [ 1532.958778] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 1532.963455] ? tipc_diag_dump+0x30/0x30 [ 1532.967458] ? tipc_getname+0x7f0/0x7f0 [ 1532.971443] ? zap_class+0x740/0x740 [ 1532.975170] ? save_stack+0xa9/0xd0 [ 1532.978899] ? save_stack+0x43/0xd0 [ 1532.982533] ? kasan_kmalloc+0xc4/0xe0 [ 1532.986431] ? __kmalloc_node_track_caller+0x47/0x70 [ 1532.991541] ? graph_lock+0x170/0x170 [ 1532.995355] ? __netlink_dump_start+0x4f1/0x6f0 [ 1533.000036] ? sock_diag_rcv_msg+0x31d/0x410 [ 1533.004456] ? netlink_rcv_skb+0x172/0x440 [ 1533.008914] ? sock_diag_rcv+0x2a/0x40 [ 1533.012809] ? netlink_unicast+0x5a0/0x760 [ 1533.017053] ? netlink_sendmsg+0xa18/0xfc0 [ 1533.021302] ? sock_sendmsg+0xd5/0x120 [ 1533.025225] ? ___sys_sendmsg+0x7fd/0x930 [ 1533.029386] ? do_syscall_64+0x1b9/0x820 [ 1533.033458] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1533.038827] ? mark_held_locks+0xc9/0x160 [ 1533.042994] ? lock_acquire+0x1e4/0x4f0 [ 1533.046970] ? tipc_nl_sk_walk+0x60a/0xd30 [ 1533.051206] ? tipc_nl_sk_walk+0x311/0xd30 [ 1533.055455] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1533.060477] ? skb_put+0x17b/0x1e0 [ 1533.064029] ? __nlmsg_put+0x14c/0x1b0 [ 1533.067934] __tipc_add_sock_diag+0x22f/0x360 [ 1533.072444] tipc_nl_sk_walk+0x68d/0xd30 [ 1533.076607] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 1533.081910] ? __tipc_nl_add_sk+0x400/0x400 [ 1533.086237] ? skb_scrub_packet+0x490/0x490 [ 1533.090576] ? kasan_check_write+0x14/0x20 [ 1533.094818] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1533.099758] ? lock_downgrade+0x8f0/0x8f0 [ 1533.103919] tipc_diag_dump+0x24/0x30 [ 1533.107729] netlink_dump+0x519/0xd50 [ 1533.111542] ? netlink_broadcast+0x50/0x50 [ 1533.115812] __netlink_dump_start+0x4f1/0x6f0 [ 1533.120320] tipc_sock_diag_handler_dump+0x234/0x340 [ 1533.125429] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 1533.130105] ? tipc_unregister_sysctl+0x20/0x20 [ 1533.134779] ? netlink_deliver_tap+0x356/0xfb0 [ 1533.139606] sock_diag_rcv_msg+0x31d/0x410 [ 1533.143865] netlink_rcv_skb+0x172/0x440 [ 1533.147944] ? sock_diag_bind+0x80/0x80 [ 1533.151929] ? netlink_ack+0xbe0/0xbe0 [ 1533.155823] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 1533.160511] sock_diag_rcv+0x2a/0x40 [ 1533.164233] netlink_unicast+0x5a0/0x760 [ 1533.168309] ? netlink_attachskb+0x9a0/0x9a0 [ 1533.172729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1533.178276] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1533.183302] netlink_sendmsg+0xa18/0xfc0 [ 1533.187377] ? netlink_unicast+0x760/0x760 [ 1533.191633] ? move_addr_to_kernel.part.18+0x100/0x100 [ 1533.196930] ? security_socket_sendmsg+0x94/0xc0 [ 1533.201691] ? netlink_unicast+0x760/0x760 [ 1533.206072] sock_sendmsg+0xd5/0x120 [ 1533.209796] ___sys_sendmsg+0x7fd/0x930 [ 1533.213782] ? copy_msghdr_from_user+0x580/0x580 [ 1533.218549] ? _raw_spin_unlock_bh+0x30/0x40 [ 1533.222961] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 1533.228071] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1533.232485] ? __release_sock+0x276/0x3a0 [ 1533.236653] ? __fget_light+0x2f7/0x440 [ 1533.240644] ? __local_bh_enable_ip+0x161/0x230 [ 1533.245320] ? fget_raw+0x20/0x20 [ 1533.248785] ? __release_sock+0x3a0/0x3a0 [ 1533.252941] ? tipc_nametbl_build_group+0x279/0x360 [ 1533.257970] ? tipc_setsockopt+0x726/0xd70 [ 1533.262217] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1533.267762] ? sockfd_lookup_light+0xc5/0x160 [ 1533.272265] __sys_sendmsg+0x11d/0x290 [ 1533.276247] ? __ia32_sys_shutdown+0x80/0x80 [ 1533.280661] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1533.286205] ? fput+0x130/0x1a0 [ 1533.289500] ? __x64_sys_futex+0x47f/0x6a0 [ 1533.293743] ? do_syscall_64+0x9a/0x820 [ 1533.297722] ? do_syscall_64+0x9a/0x820 [ 1533.301711] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 1533.306827] __x64_sys_sendmsg+0x78/0xb0 [ 1533.310898] do_syscall_64+0x1b9/0x820 [ 1533.314796] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1533.320171] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1533.325110] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 1533.330133] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1533.335156] ? recalc_sigpending_tsk+0x180/0x180 [ 1533.339920] ? kasan_check_write+0x14/0x20 [ 1533.344167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1533.349024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1533.354217] RIP: 0033:0x457089 [ 1533.357419] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1533.376331] RSP: 002b:00007f260036ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1533.384054] RAX: ffffffffffffffda RBX: 00007f260036b6d4 RCX: 0000000000457089 [ 1533.391324] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 1533.398597] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1533.405892] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1533.413163] R13: 00000000004d4088 R14: 00000000004c8ab0 R15: 0000000000000000 [ 1533.420450] [ 1533.422077] Allocated by task 5153: [ 1533.425715] save_stack+0x43/0xd0 [ 1533.429173] kasan_kmalloc+0xc4/0xe0 [ 1533.432894] kmem_cache_alloc_trace+0x152/0x730 [ 1533.437567] tipc_group_create+0x155/0xa70 [ 1533.441813] tipc_setsockopt+0x2d1/0xd70 [ 1533.445878] __sys_setsockopt+0x1c5/0x3b0 [ 1533.450035] __x64_sys_setsockopt+0xbe/0x150 [ 1533.454446] do_syscall_64+0x1b9/0x820 [ 1533.458342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1533.463527] [ 1533.465151] Freed by task 5149: [ 1533.468433] save_stack+0x43/0xd0 [ 1533.471893] __kasan_slab_free+0x11a/0x170 [ 1533.476131] kasan_slab_free+0xe/0x10 [ 1533.479931] kfree+0xd9/0x210 [ 1533.483040] tipc_group_delete+0x2e5/0x3f0 [ 1533.487277] tipc_sk_leave+0x113/0x220 [ 1533.491165] tipc_release+0x14e/0x12b0 [ 1533.495054] __sock_release+0xd7/0x250 [ 1533.498939] sock_close+0x19/0x20 [ 1533.502396] __fput+0x376/0x8a0 [ 1533.505676] ____fput+0x15/0x20 [ 1533.508961] task_work_run+0x1e8/0x2a0 [ 1533.512855] exit_to_usermode_loop+0x318/0x380 [ 1533.517445] do_syscall_64+0x6be/0x820 [ 1533.521337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1533.526520] [ 1533.528152] The buggy address belongs to the object at ffff8801d81ad100 [ 1533.528152] which belongs to the cache kmalloc-192 of size 192 [ 1533.540815] The buggy address is located 92 bytes inside of [ 1533.540815] 192-byte region [ffff8801d81ad100, ffff8801d81ad1c0) [ 1533.552690] The buggy address belongs to the page: [ 1533.557634] page:ffffea0007606b40 count:1 mapcount:0 mapping:ffff8801dac00040 index:0x0 [ 1533.565782] flags: 0x2fffc0000000100(slab) [ 1533.570023] raw: 02fffc0000000100 ffffea0006d6ab08 ffffea0006f9dbc8 ffff8801dac00040 [ 1533.577915] raw: 0000000000000000 ffff8801d81ad000 0000000100000010 0000000000000000 [ 1533.585792] page dumped because: kasan: bad access detected [ 1533.591495] [ 1533.593118] Memory state around the buggy address: [ 1533.598047] ffff8801d81ad000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1533.605423] ffff8801d81ad080: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1533.612809] >ffff8801d81ad100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1533.620164] ^ [ 1533.626398] ffff8801d81ad180: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1533.633774] ffff8801d81ad200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1533.641132] ================================================================== [ 1533.648493] Disabling lock debugging due to kernel taint [ 1533.654071] Kernel panic - not syncing: panic_on_warn set ... [ 1533.654071] [ 1533.661449] CPU: 0 PID: 5153 Comm: syz-executor1 Tainted: G B 4.18.0-next-20180821+ #44 [ 1533.670898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1533.680252] Call Trace: [ 1533.682860] dump_stack+0x1c9/0x2b4 [ 1533.686497] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1533.691695] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1533.696463] panic+0x238/0x4e7 [ 1533.699682] ? add_taint.cold.5+0x16/0x16 [ 1533.703836] ? trace_hardirqs_on+0xb4/0x2c0 [ 1533.708177] ? tipc_group_fill_sock_diag+0x7b9/0x84b [ 1533.713284] kasan_end_report+0x47/0x4f [ 1533.717264] kasan_report.cold.7+0x76/0x30d [ 1533.721591] __asan_report_load4_noabort+0x14/0x20 [ 1533.726528] tipc_group_fill_sock_diag+0x7b9/0x84b [ 1533.731464] ? tipc_group_member_evt+0xe30/0xe30 [ 1533.736223] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1533.741238] ? skb_put+0x17b/0x1e0 [ 1533.744781] ? memset+0x31/0x40 [ 1533.748065] ? memcpy+0x45/0x50 [ 1533.751361] ? __nla_put+0x37/0x40 [ 1533.754933] ? nla_put+0x11a/0x150 [ 1533.758483] tipc_sk_fill_sock_diag+0x9f8/0xdb0 [ 1533.763158] ? tipc_diag_dump+0x30/0x30 [ 1533.767143] ? tipc_getname+0x7f0/0x7f0 [ 1533.771126] ? zap_class+0x740/0x740 [ 1533.774843] ? save_stack+0xa9/0xd0 [ 1533.778475] ? save_stack+0x43/0xd0 [ 1533.782102] ? kasan_kmalloc+0xc4/0xe0 [ 1533.786007] ? __kmalloc_node_track_caller+0x47/0x70 [ 1533.791108] ? graph_lock+0x170/0x170 [ 1533.794917] ? __netlink_dump_start+0x4f1/0x6f0 [ 1533.799591] ? sock_diag_rcv_msg+0x31d/0x410 [ 1533.804005] ? netlink_rcv_skb+0x172/0x440 [ 1533.808242] ? sock_diag_rcv+0x2a/0x40 [ 1533.812139] ? netlink_unicast+0x5a0/0x760 [ 1533.816373] ? netlink_sendmsg+0xa18/0xfc0 [ 1533.820610] ? sock_sendmsg+0xd5/0x120 [ 1533.824507] ? ___sys_sendmsg+0x7fd/0x930 [ 1533.828658] ? do_syscall_64+0x1b9/0x820 [ 1533.832722] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1533.838085] ? mark_held_locks+0xc9/0x160 [ 1533.842242] ? lock_acquire+0x1e4/0x4f0 [ 1533.846215] ? tipc_nl_sk_walk+0x60a/0xd30 [ 1533.850448] ? tipc_nl_sk_walk+0x311/0xd30 [ 1533.854690] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1533.859720] ? skb_put+0x17b/0x1e0 [ 1533.863261] ? __nlmsg_put+0x14c/0x1b0 [ 1533.867160] __tipc_add_sock_diag+0x22f/0x360 [ 1533.871661] tipc_nl_sk_walk+0x68d/0xd30 [ 1533.875760] ? tipc_sock_diag_handler_dump+0x340/0x340 [ 1533.881034] ? __tipc_nl_add_sk+0x400/0x400 [ 1533.885360] ? skb_scrub_packet+0x490/0x490 [ 1533.889691] ? kasan_check_write+0x14/0x20 [ 1533.893927] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1533.898884] ? lock_downgrade+0x8f0/0x8f0 [ 1533.903045] tipc_diag_dump+0x24/0x30 [ 1533.906850] netlink_dump+0x519/0xd50 [ 1533.910656] ? netlink_broadcast+0x50/0x50 [ 1533.914909] __netlink_dump_start+0x4f1/0x6f0 [ 1533.919415] tipc_sock_diag_handler_dump+0x234/0x340 [ 1533.924523] ? __tipc_diag_gen_cookie+0xc0/0xc0 [ 1533.929194] ? tipc_unregister_sysctl+0x20/0x20 [ 1533.933866] ? netlink_deliver_tap+0x356/0xfb0 [ 1533.938481] sock_diag_rcv_msg+0x31d/0x410 [ 1533.942723] netlink_rcv_skb+0x172/0x440 [ 1533.946790] ? sock_diag_bind+0x80/0x80 [ 1533.950770] ? netlink_ack+0xbe0/0xbe0 [ 1533.954657] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 1533.959339] sock_diag_rcv+0x2a/0x40 [ 1533.963055] netlink_unicast+0x5a0/0x760 [ 1533.967124] ? netlink_attachskb+0x9a0/0x9a0 [ 1533.971541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1533.977080] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1533.982104] netlink_sendmsg+0xa18/0xfc0 [ 1533.986173] ? netlink_unicast+0x760/0x760 [ 1533.990518] ? move_addr_to_kernel.part.18+0x100/0x100 [ 1533.995801] ? security_socket_sendmsg+0x94/0xc0 [ 1534.000560] ? netlink_unicast+0x760/0x760 [ 1534.004795] sock_sendmsg+0xd5/0x120 [ 1534.008732] ___sys_sendmsg+0x7fd/0x930 [ 1534.012711] ? copy_msghdr_from_user+0x580/0x580 [ 1534.017469] ? _raw_spin_unlock_bh+0x30/0x40 [ 1534.021880] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 1534.026991] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1534.031400] ? __release_sock+0x276/0x3a0 [ 1534.035568] ? __fget_light+0x2f7/0x440 [ 1534.039545] ? __local_bh_enable_ip+0x161/0x230 [ 1534.044216] ? fget_raw+0x20/0x20 [ 1534.047674] ? __release_sock+0x3a0/0x3a0 [ 1534.051829] ? tipc_nametbl_build_group+0x279/0x360 [ 1534.056866] ? tipc_setsockopt+0x726/0xd70 [ 1534.061111] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1534.066649] ? sockfd_lookup_light+0xc5/0x160 [ 1534.071149] __sys_sendmsg+0x11d/0x290 [ 1534.075039] ? __ia32_sys_shutdown+0x80/0x80 [ 1534.079454] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1534.084991] ? fput+0x130/0x1a0 [ 1534.088278] ? __x64_sys_futex+0x47f/0x6a0 [ 1534.092518] ? do_syscall_64+0x9a/0x820 [ 1534.096494] ? do_syscall_64+0x9a/0x820 [ 1534.100478] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 1534.105588] __x64_sys_sendmsg+0x78/0xb0 [ 1534.109663] do_syscall_64+0x1b9/0x820 [ 1534.113554] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1534.118922] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1534.123858] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 1534.128883] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1534.133910] ? recalc_sigpending_tsk+0x180/0x180 [ 1534.138671] ? kasan_check_write+0x14/0x20 [ 1534.142920] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1534.147775] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1534.152968] RIP: 0033:0x457089 [ 1534.156164] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1534.175069] RSP: 002b:00007f260036ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1534.182781] RAX: ffffffffffffffda RBX: 00007f260036b6d4 RCX: 0000000000457089 [ 1534.190047] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 1534.197313] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1534.204578] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1534.211844] R13: 00000000004d4088 R14: 00000000004c8ab0 R15: 0000000000000000 [ 1534.219173] Dumping ftrace buffer: [ 1534.222695] (ftrace buffer empty) [ 1534.226386] Kernel Offset: disabled [ 1534.229998] Rebooting in 86400 seconds..