fffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000d00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2756.242512][T17671] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2756.252151][T17671] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:00 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3e8, 0x0, 0x0, 0x300000000000506) 14:26:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000002500000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100041f000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000e00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:00 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9e0, 0x0, 0x0, 0x300000000000506) 14:26:00 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x960, 0x0, 0x0, 0x300000000000506) [ 2760.966621][T17681] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2760.972653][T17685] __nla_validate_parse: 2 callbacks suppressed [ 2760.972669][T17685] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2760.976262][T17681] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2760.982429][T17685] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:00 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9e2, 0x0, 0x0, 0x300000000000506) [ 2761.009552][T17685] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2761.020322][T17686] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2761.029740][T17686] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000f00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100051f000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2761.101294][T17691] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2761.110936][T17691] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000001100"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100061f000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2761.151666][T17693] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2761.161122][T17693] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2761.170455][T17693] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2761.205140][T17695] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2761.207564][T17698] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2761.214550][T17695] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2761.224059][T17698] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:06 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3e8, 0x0, 0x0, 0x300000000000506) 14:26:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004c00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000025000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000501100"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:06 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x969, 0x0, 0x0, 0x300000000000506) 14:26:06 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9eb, 0x0, 0x0, 0x300000000000506) 14:26:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000511100"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2767.405144][T17710] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2767.407405][T17712] __nla_validate_parse: 3 callbacks suppressed [ 2767.407492][T17712] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2767.414765][T17710] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2767.438867][T17712] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2767.450009][T17713] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2767.459462][T17713] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2767.468804][T17713] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2767.471519][T17715] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2767.487727][T17715] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000028000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000006000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000001200"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2767.579467][T17717] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2767.589019][T17717] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2767.598326][T17717] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2767.618986][T17719] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2767.628446][T17719] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001008847000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000586500000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2767.671214][T17721] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2767.680852][T17721] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:12 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9e2, 0x0, 0x0, 0x300000000000506) 14:26:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000048000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000006800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000002000"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:12 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9ec, 0x0, 0x0, 0x300000000000506) 14:26:12 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9a2, 0x0, 0x0, 0x300000000000506) [ 2773.712801][T17734] __nla_validate_parse: 5 callbacks suppressed [ 2773.712816][T17734] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2773.728397][T17734] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2773.737750][T17734] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2773.747368][T17739] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000002500"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000006c00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001001848000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2773.756777][T17739] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2773.767176][T17737] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2773.776810][T17737] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2773.817402][T17742] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2773.827026][T17742] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2773.840797][T17745] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2773.850221][T17745] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000003f00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2773.859896][T17746] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2773.869273][T17746] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2773.878561][T17746] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2773.906030][T17748] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:26:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000007400000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000004000"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2773.915685][T17748] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2773.981835][T17752] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2773.991611][T17752] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000007a00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:17 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9e2, 0x0, 0x0, 0x300000000000506) 14:26:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001008848000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000004800"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:17 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa00, 0x0, 0x0, 0x300000000000506) 14:26:17 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9fa, 0x0, 0x0, 0x300000000000506) [ 2778.722862][T17764] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2778.732555][T17764] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2778.743280][T17766] __nla_validate_parse: 2 callbacks suppressed [ 2778.743294][T17766] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2778.758942][T17766] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100004c000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000004c00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2778.768245][T17766] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2778.780086][T17767] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2778.789503][T17767] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000008100000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2778.814361][T17769] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2778.824063][T17769] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2778.835395][T17771] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2778.844812][T17771] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2778.854164][T17771] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001006558000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000060000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000005000"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2778.884819][T17773] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2778.894255][T17773] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2778.964884][T17779] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2778.974540][T17779] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:22 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9e2, 0x0, 0x0, 0x300000000000506) 14:26:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100ffffff8100000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001005865000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000115000"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:22 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa1c, 0x0, 0x0, 0x300000000000506) 14:26:22 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9fb, 0x0, 0x0, 0x300000000000506) [ 2783.752790][T17791] __nla_validate_parse: 6 callbacks suppressed [ 2783.752804][T17791] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2783.768430][T17791] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2783.777812][T17791] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2783.790238][T17793] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:26:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000478800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000115100"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2783.800007][T17793] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2783.809677][T17789] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2783.819047][T17789] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000068000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2783.861636][T17796] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2783.871093][T17796] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2783.891628][T17798] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2783.901254][T17798] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000488800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2783.903144][T17800] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2783.919126][T17800] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2783.928438][T17800] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100ffffa88800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100006c000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:27 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9fb, 0x0, 0x0, 0x300000000000506) 14:26:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000fe5e00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000270000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100ffffff9e00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:27 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa00, 0x0, 0x0, 0x300000000000506) 14:26:27 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xb65, 0x0, 0x0, 0x300000000000506) [ 2788.802776][T17815] __nla_validate_parse: 7 callbacks suppressed [ 2788.802795][T17815] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2788.810116][T17818] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2788.818432][T17815] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2788.828010][T17818] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000074000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2788.837306][T17815] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2788.855513][T17819] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2788.864901][T17819] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000020af00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2788.930905][T17823] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2788.940318][T17823] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2788.949637][T17823] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000006000"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000020b000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2788.980209][T17825] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2788.989582][T17825] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100007a000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100ffffffea00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2789.051126][T17827] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2789.060825][T17827] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:34 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9fb, 0x0, 0x0, 0x300000000000506) 14:26:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000081000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100ffffffef00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000006800"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:34 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xb82, 0x0, 0x0, 0x300000000000506) 14:26:34 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa38, 0x0, 0x0, 0x300000000000506) [ 2795.221107][T17840] __nla_validate_parse: 7 callbacks suppressed [ 2795.221124][T17840] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2795.236807][T17840] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2795.246138][T17840] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2795.255512][T17845] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100fffffff000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2795.264895][T17845] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2795.275139][T17846] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2795.284850][T17846] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001004788000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000006c00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2795.325111][T17849] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2795.334653][T17849] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100fffffffe00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2795.373088][T17851] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2795.382514][T17851] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2795.391911][T17851] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2795.403883][T17853] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2795.413554][T17853] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010088a8ffff00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000007400"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2795.511311][T17859] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2795.520941][T17859] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:39 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9fb, 0x0, 0x0, 0x300000000000506) 14:26:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001004888000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001007fffffff00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000007a00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:39 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc00, 0x0, 0x0, 0x300000000000506) 14:26:39 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa39, 0x0, 0x0, 0x300000000000506) [ 2800.265677][T17870] __nla_validate_parse: 4 callbacks suppressed [ 2800.265693][T17870] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2800.281419][T17870] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2800.290753][T17870] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2800.300234][T17869] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000040030000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010081ffffff00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2800.309635][T17869] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2800.330692][T17872] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2800.340321][T17872] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000007c00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000003400000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2800.364960][T17875] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2800.374436][T17875] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2800.383800][T17875] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2800.393220][T17877] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2800.402670][T17877] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100ffffe00000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2800.440758][T17879] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2800.450447][T17879] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000100000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:45 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xb65, 0x0, 0x0, 0x300000000000506) 14:26:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001009effffff00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000fe8000"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000200000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:45 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc02, 0x0, 0x0, 0x300000000000506) 14:26:45 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa3a, 0x0, 0x0, 0x300000000000506) [ 2806.727596][T17894] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2806.737241][T17894] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2806.737299][T17899] __nla_validate_parse: 9 callbacks suppressed [ 2806.737310][T17899] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2806.761296][T17899] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2806.770604][T17899] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2806.780597][T17897] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2806.790015][T17897] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000005a000"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000300000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100eaffffff00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2806.881075][T17902] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2806.885053][T17904] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2806.890698][T17902] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2806.899998][T17904] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2806.917923][T17904] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000008b400"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2806.947202][T17906] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2806.956590][T17906] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000400000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100efffffff00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2807.031519][T17908] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2807.041159][T17908] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:50 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xb65, 0x0, 0x0, 0x300000000000506) 14:26:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000001f0400000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100f0ffffff00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000004fb00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:50 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xca9, 0x0, 0x0, 0x300000000000506) 14:26:50 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa3b, 0x0, 0x0, 0x300000000000506) [ 2811.767073][T17921] __nla_validate_parse: 5 callbacks suppressed [ 2811.767088][T17921] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2811.778950][T17926] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2811.782685][T17921] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2811.792197][T17926] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100feffffff00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2811.801542][T17921] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2811.857372][T17930] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2811.866766][T17930] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000034000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000080fe00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000500000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2811.947542][T17933] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2811.957001][T17933] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2811.969427][T17935] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2811.970732][T17936] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2811.978821][T17935] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000008ff00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000001000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2811.988384][T17936] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2812.006204][T17935] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2812.053172][T17940] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2812.062812][T17940] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:58 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xb65, 0x0, 0x0, 0x300000000000506) 14:26:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000002000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000004"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:26:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000001f0500000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:58 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe00, 0x0, 0x0, 0x300000000000506) 14:26:58 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa3e, 0x0, 0x0, 0x300000000000506) [ 2818.966294][T17949] __nla_validate_parse: 2 callbacks suppressed [ 2818.966309][T17949] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2818.971291][T17951] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2818.972555][T17949] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2818.981799][T17951] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:26:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000003000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:26:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000ffffe0"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2818.991347][T17949] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2819.030006][T17946] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2819.039602][T17946] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2819.090971][T17955] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2819.100643][T17955] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2819.116528][T17957] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2819.125935][T17957] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:26:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000600000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:26:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000004000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2819.182274][T17959] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2819.192054][T17959] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2819.208508][T17961] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2819.217969][T17961] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2819.227297][T17961] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2819.247305][T17965] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2819.256935][T17965] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:04 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9a2, 0x0, 0x0, 0x300000000000506) 14:27:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000005000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000001f0600000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:04 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xb00, 0x0, 0x0, 0x300000000000506) 14:27:04 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xf00, 0x0, 0x0, 0x300000000000506) [ 2825.397057][T17974] __nla_validate_parse: 2 callbacks suppressed [ 2825.397071][T17974] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2825.406735][T17978] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2825.412640][T17974] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2825.422201][T17978] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2825.431483][T17974] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2825.449239][T17977] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2825.458579][T17977] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:27:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000006000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000700000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000000000fb"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2825.553847][T17981] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2825.563512][T17981] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2825.566973][T17983] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2825.581390][T17983] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:27:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000007000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2825.615390][T17986] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2825.624866][T17986] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2825.634283][T17986] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2825.646577][T17987] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2825.656243][T17987] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2825.708479][T17990] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2825.718100][T17990] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:09 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9a2, 0x0, 0x0, 0x300000000000506) 14:27:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000008000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000800000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:09 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1200, 0x0, 0x0, 0x300000000000506) 14:27:09 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xb65, 0x0, 0x0, 0x300000000000506) [ 2830.477676][T17999] __nla_validate_parse: 2 callbacks suppressed [ 2830.477691][T17999] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2830.481357][T18002] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2830.483943][T17999] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2830.493177][T18002] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000900000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000009000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2830.521873][T18001] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2830.531299][T18001] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2830.540635][T18001] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2830.598868][T18007] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2830.608366][T18007] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2830.617693][T18007] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:27:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000a00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000b00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2830.646351][T18009] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2830.655837][T18009] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2830.668837][T18011] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2830.678699][T18011] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2830.744968][T18016] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2830.754580][T18016] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:13 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x9a2, 0x0, 0x0, 0x300000000000506) 14:27:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000a000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000c00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:13 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1300, 0x0, 0x0, 0x300000000000506) 14:27:13 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc00, 0x0, 0x0, 0x300000000000506) 14:27:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000d00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000b000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000c000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2834.667081][T18029] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2834.676736][T18029] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000e00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000d000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2834.783210][T18042] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2834.792827][T18042] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000e000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000f00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:17 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x960, 0x0, 0x0, 0x300000000000506) 14:27:17 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1800, 0x0, 0x0, 0x300000000000506) 14:27:17 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc02, 0x0, 0x0, 0x300000000000506) [ 2838.909435][T18053] __nla_validate_parse: 23 callbacks suppressed [ 2838.909450][T18053] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2838.925185][T18053] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2838.934570][T18050] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2838.943938][T18050] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:27:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2838.953249][T18050] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2838.963820][T18055] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2838.973559][T18055] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000f000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2839.015100][T18057] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2839.024587][T18057] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2839.034079][T18057] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:27:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001100000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2839.070726][T18060] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2839.080108][T18060] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2839.082978][T18061] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2839.099053][T18061] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001200000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000010000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001c00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000002500000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2839.190750][T18067] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2839.200371][T18067] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:22 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x960, 0x0, 0x0, 0x300000000000506) 14:27:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000002800000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000011000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:22 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1802, 0x0, 0x0, 0x300000000000506) 14:27:22 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc80, 0x0, 0x0, 0x300000000000506) [ 2843.925283][T18085] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2843.927222][T18087] __nla_validate_parse: 14 callbacks suppressed [ 2843.927253][T18087] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2843.934881][T18085] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2843.958990][T18087] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:27:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2843.968284][T18087] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2843.981162][T18083] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2843.990713][T18083] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2843.993423][T18089] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2844.009594][T18089] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000012000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004800000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2844.066020][T18091] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2844.075649][T18091] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2844.100192][T18094] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:27:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2844.109576][T18094] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2844.130542][T18096] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2844.140026][T18096] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2844.149356][T18096] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:27:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000001722000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2844.200320][T18098] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2844.209968][T18098] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:29 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x960, 0x0, 0x0, 0x300000000000506) 14:27:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000025000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000184800000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:29 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1c0a, 0x0, 0x0, 0x300000000000506) 14:27:29 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xca9, 0x0, 0x0, 0x300000000000506) [ 2850.355149][T18110] __nla_validate_parse: 2 callbacks suppressed [ 2850.355165][T18110] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2850.358333][T18112] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2850.361389][T18110] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2850.370656][T18112] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004c00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2850.398074][T18110] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2850.407570][T18113] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2850.417049][T18113] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:27:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000048000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2850.449670][T18118] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2850.459113][T18118] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2850.468409][T18118] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2850.478181][T18116] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2850.487843][T18116] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000006000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000586500000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2850.522193][T18120] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2850.531639][T18120] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2850.596656][T18126] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2850.606281][T18126] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:36 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3c, 0x0, 0x0, 0x300000000000506) 14:27:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000006800000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000004c000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:36 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1e00, 0x0, 0x0, 0x300000000000506) 14:27:36 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xcab, 0x0, 0x0, 0x300000000000506) [ 2857.525801][T18133] __nla_validate_parse: 6 callbacks suppressed [ 2857.525816][T18133] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2857.532528][T18137] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2857.541521][T18133] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2857.560428][T18137] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000060000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2857.581110][T18139] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2857.590506][T18139] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2857.599852][T18139] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:27:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000006c00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2857.639379][T18141] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2857.648713][T18141] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2857.698805][T18143] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2857.708241][T18143] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2857.717611][T18143] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:27:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000027000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000005865000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2857.740050][T18145] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2857.749714][T18145] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000007400000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:41 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3c, 0x0, 0x0, 0x300000000000506) 14:27:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000007a00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:41 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2000, 0x0, 0x0, 0x300000000000506) 14:27:41 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xce0, 0x0, 0x0, 0x300000000000506) 14:27:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000068000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2862.648924][T18160] __nla_validate_parse: 8 callbacks suppressed [ 2862.648939][T18160] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2862.654941][T18163] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2862.655210][T18160] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2862.664526][T18163] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000006c000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2862.674152][T18160] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2862.706995][T18166] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2862.716366][T18166] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:27:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000008100000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000074000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2862.783040][T18168] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2862.792490][T18168] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2862.813582][T18170] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2862.823270][T18170] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000007a000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2862.871225][T18173] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2862.880627][T18173] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2862.889940][T18173] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2862.937794][T18176] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2862.947429][T18176] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:48 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3c, 0x0, 0x0, 0x300000000000506) 14:27:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100ffffff8100000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000081000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000011"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:48 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2400, 0x0, 0x0, 0x300000000000506) 14:27:48 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xce1, 0x0, 0x0, 0x300000000000506) [ 2869.745750][T18187] __nla_validate_parse: 4 callbacks suppressed [ 2869.745766][T18187] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2869.752978][T18190] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2869.761302][T18187] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2869.761318][T18187] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:27:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000011"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2869.768424][T18192] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2869.770910][T18190] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2869.807481][T18192] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:27:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000478800000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2869.880533][T18194] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2869.890198][T18194] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2869.909751][T18196] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2869.919125][T18196] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:27:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffff81000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2869.928423][T18196] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:27:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2869.972122][T18199] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2869.981542][T18199] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2870.008119][T18201] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:27:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000488800000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2870.017755][T18201] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000004788000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:53 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1e, 0x0, 0x0, 0x300000000000506) 14:27:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000004888000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100ffffa88800000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:53 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2a00, 0x0, 0x0, 0x300000000000506) 14:27:53 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xce6, 0x0, 0x0, 0x300000000000506) [ 2874.873448][T18213] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2874.883077][T18213] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2874.883852][T18218] __nla_validate_parse: 5 callbacks suppressed [ 2874.883865][T18218] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2874.907062][T18218] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:27:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2874.916389][T18218] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2874.926994][T18216] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2874.936443][T18216] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:27:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffa888000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2874.977546][T18221] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2874.987190][T18221] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100ffffff9e00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2875.035163][T18223] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2875.044530][T18223] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2875.072750][T18225] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:27:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffff9e000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100ffffffea00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2875.082373][T18225] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2875.086820][T18227] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2875.100275][T18227] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2875.109621][T18227] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2875.195182][T18233] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2875.204893][T18233] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:58 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1e, 0x0, 0x0, 0x300000000000506) 14:27:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000020af000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100ffffffef00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:27:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:58 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xce7, 0x0, 0x0, 0x300000000000506) 14:27:58 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2ee0, 0x0, 0x0, 0x300000000000506) [ 2879.915695][T18247] __nla_validate_parse: 5 callbacks suppressed [ 2879.915710][T18247] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2879.931309][T18247] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2879.940619][T18247] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2879.951589][T18249] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2879.960977][T18249] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:27:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000020b0000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100fffffff000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2879.990301][T18246] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2879.999925][T18246] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:27:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000ffffff"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:27:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffffea000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:27:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100fffffffe00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2880.034689][T18251] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2880.044103][T18251] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2880.055976][T18253] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2880.065366][T18253] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2880.074689][T18253] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:27:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffffef000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2880.125529][T18257] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2880.135143][T18257] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:04 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1e, 0x0, 0x0, 0x300000000000506) 14:28:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010088a8ffff00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000fffffff0000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000005"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:04 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3000, 0x0, 0x0, 0x300000000000506) 14:28:04 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe00, 0x0, 0x0, 0x300000000000506) [ 2884.968773][T18272] __nla_validate_parse: 7 callbacks suppressed [ 2884.968788][T18272] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2884.976062][T18276] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2884.984495][T18272] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2884.994055][T18276] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000008"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000e0ffff00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2885.003331][T18272] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2885.026305][T18271] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2885.035760][T18271] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:28:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000fffffffe000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2885.116021][T18281] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2885.125488][T18281] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2885.134847][T18281] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2885.144837][T18279] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2885.154559][T18279] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001007fffffff00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010081ffffff00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2885.181976][T18283] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2885.191354][T18283] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:28:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000ffffff"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2885.269546][T18288] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2885.279278][T18288] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001009effffff00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000007fffffff000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:09 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa, 0x0, 0x0, 0x300000000000506) 14:28:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000005e"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:09 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3600, 0x0, 0x0, 0x300000000000506) 14:28:09 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xf00, 0x0, 0x0, 0x300000000000506) [ 2889.996172][T18299] __nla_validate_parse: 6 callbacks suppressed [ 2889.996225][T18299] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2890.011838][T18299] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2890.021876][T18301] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2890.031273][T18301] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:28:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffffff000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2890.040779][T18301] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2890.051036][T18303] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2890.060645][T18303] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000080"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100eaffffff00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2890.115159][T18305] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2890.124712][T18305] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2890.146090][T18307] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2890.155787][T18307] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000008"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2890.192146][T18309] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2890.201535][T18309] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2890.210860][T18309] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:28:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000002000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000003000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2890.241733][T18311] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2890.251405][T18311] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100efffffff00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000e0ff"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2890.334778][T18318] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2890.344471][T18318] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:13 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa, 0x0, 0x0, 0x300000000000506) 14:28:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000004000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000008dffff"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100f0ffffff00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:13 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1200, 0x0, 0x0, 0x300000000000506) 14:28:13 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3c00, 0x0, 0x0, 0x300000000000506) 14:28:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100feffffff00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000005000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000006000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2894.189143][T18329] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2894.198750][T18329] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000f5ffff"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000034000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000007000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2894.311606][T18344] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2894.321240][T18344] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:21 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa, 0x0, 0x0, 0x300000000000506) 14:28:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffe000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000008000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:21 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x4000, 0x0, 0x0, 0x300000000000506) 14:28:21 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1800, 0x0, 0x0, 0x300000000000506) [ 2902.660856][T18355] __nla_validate_parse: 24 callbacks suppressed [ 2902.660871][T18355] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2902.676620][T18355] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2902.690605][T18361] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2902.700000][T18361] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:28:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000009000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000001000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2902.709325][T18361] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2902.720745][T18356] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2902.730368][T18356] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2902.797311][T18363] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2902.806822][T18363] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2902.821805][T18365] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2902.831213][T18365] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:28:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000a000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000002000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2902.840547][T18365] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2902.853419][T18367] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2902.863079][T18367] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000003000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:30 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xf00, 0x0, 0x0, 0x300000000000506) 14:28:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000b000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000004000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:30 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x4001, 0x0, 0x0, 0x300000000000506) 14:28:30 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1802, 0x0, 0x0, 0x300000000000506) [ 2911.154018][T18381] __nla_validate_parse: 8 callbacks suppressed [ 2911.154035][T18381] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2911.161597][T18385] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2911.169650][T18381] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2911.169668][T18381] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:28:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000c000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000001f04000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2911.197946][T18385] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2911.207433][T18384] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2911.216912][T18384] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:28:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2911.258139][T18389] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2911.267608][T18389] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2911.278380][T18391] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2911.287750][T18391] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2911.297142][T18391] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:28:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000d000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000e000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000005000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2911.311450][T18393] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2911.321084][T18393] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:35 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xf00, 0x0, 0x0, 0x300000000000506) 14:28:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000001f05000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000f000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:35 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x4102, 0x0, 0x0, 0x300000000000506) 14:28:35 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1e00, 0x0, 0x0, 0x300000000000506) [ 2916.252073][T18409] __nla_validate_parse: 7 callbacks suppressed [ 2916.252089][T18409] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2916.256867][T18412] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2916.258342][T18409] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2916.267562][T18412] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:35 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x5800, 0x0, 0x0, 0x300000000000506) 14:28:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000010000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2916.277144][T18409] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2916.304322][T18411] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2916.313711][T18411] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:28:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000011000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2916.395875][T18419] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2916.405338][T18419] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2916.425113][T18421] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2916.434827][T18421] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000006000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2916.488372][T18423] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2916.497899][T18423] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2916.529794][T18425] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2916.533982][T18427] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2916.548903][T18427] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:39 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xf00, 0x0, 0x0, 0x300000000000506) 14:28:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000012000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000001f06000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:39 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x650b, 0x0, 0x0, 0x300000000000506) 14:28:39 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1f00, 0x0, 0x0, 0x300000000000506) 14:28:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000007000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000025000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000048000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2920.511975][T18438] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2920.521614][T18438] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000008000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100004c000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2920.613626][T18449] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2920.623299][T18449] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:47 executing program 5: ioprio_set$pid(0x3, 0x0, 0x0) syz_clone(0x104000, &(0x7f0000000140)="75fd8f0c9ba60d37cf5f59b8668905767fd7fbd7aa8fef493811573e7f16b6c540219512ca3cd0a956e239ba20204e036eba81e9325fcac4e71e5fd75dac187f8466c54ddc7da226b7638d4dc78c4b8379905d295accb119617aae3ecb01807c29b3c23d4e1eb0964a713532c93f10d3bfdd7eca7ac4960193130229fe87c434cba678bf5faddcb2a411c8060400815dc852dc8d5c222dde6d428b013950aff4b6", 0xa1, &(0x7f0000000200), &(0x7f0000000240), 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0x0) 14:28:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000009000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000060000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:47 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x7e97, 0x0, 0x0, 0x300000000000506) 14:28:47 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2000, 0x0, 0x0, 0x300000000000506) [ 2928.915402][T18459] __nla_validate_parse: 19 callbacks suppressed [ 2928.915416][T18459] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2928.925062][T18464] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2928.931113][T18459] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2928.940674][T18464] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2928.958496][T18463] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2928.967893][T18463] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2928.977228][T18463] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:28:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000a000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2929.015609][T18467] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2929.025258][T18467] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000068000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2929.057697][T18469] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2929.067119][T18469] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2929.076441][T18469] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2929.093103][T18471] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:28:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000b000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2929.102748][T18471] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2929.114262][T18474] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2929.123648][T18474] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2929.156268][T18477] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2929.165993][T18477] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:54 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000100)=@framed={{}, [@map_val, @kfunc]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:28:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100006c000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2935.389349][T18491] __nla_validate_parse: 3 callbacks suppressed [ 2935.389364][T18491] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2935.396678][T18494] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2935.404934][T18491] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2935.414503][T18494] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:28:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000c000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:28:54 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2400, 0x0, 0x0, 0x300000000000506) 14:28:54 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x7f00, 0x0, 0x0, 0x300000000000506) 14:28:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000074000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2935.423793][T18491] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2935.446428][T18492] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2935.455829][T18492] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:28:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:28:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000d000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2935.531132][T18498] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2935.540574][T18498] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:28:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100007a000000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2935.572167][T18500] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2935.579113][T18502] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2935.581827][T18500] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2935.591197][T18502] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2935.609104][T18502] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:28:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000030000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:28:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000e000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:13 executing program 5: socketpair(0x32, 0x0, 0x0, &(0x7f00000004c0)) 14:29:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000f000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000050000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:29:13 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2a00, 0x0, 0x0, 0x300000000000506) 14:29:13 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x820b, 0x0, 0x0, 0x300000000000506) [ 2953.948452][T18518] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2953.958144][T18518] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2953.968543][T18516] __nla_validate_parse: 7 callbacks suppressed [ 2953.968557][T18516] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2953.984149][T18516] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000060000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2953.993942][T18522] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2954.003366][T18522] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2954.012748][T18522] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:29:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2954.040516][T18524] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2954.044299][T18526] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2954.050201][T18524] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2954.068015][T18526] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000010000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2954.093558][T18528] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2954.103181][T18528] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2954.134633][T18530] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2954.144102][T18530] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2954.153465][T18530] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:29:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000070000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2954.184901][T18532] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2954.194600][T18532] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:19 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000240)={{0xda}}) 14:29:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000011000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000090000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:29:19 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2ee0, 0x0, 0x0, 0x300000000000506) 14:29:19 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x977e, 0x0, 0x0, 0x300000000000506) [ 2960.196596][T18544] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2960.206220][T18544] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2960.215611][T18547] __nla_validate_parse: 2 callbacks suppressed [ 2960.215624][T18547] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2960.231178][T18547] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:29:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000a0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2960.240514][T18547] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2960.252629][T18542] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2960.262020][T18542] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000b0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000012000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2960.315379][T18550] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2960.315811][T18551] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2960.324819][T18550] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2960.334332][T18551] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000c0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2960.400313][T18553] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2960.409689][T18553] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2960.419026][T18553] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2960.476012][T18559] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2960.485649][T18559] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:23 executing program 5: r0 = fsopen(&(0x7f0000000040)='efivarfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 14:29:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000d0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000001c000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:29:23 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3000, 0x0, 0x0, 0x300000000000506) 14:29:23 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa309, 0x0, 0x0, 0x300000000000506) 14:29:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000025000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000e0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000f0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000028000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2964.380573][T18571] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2964.390218][T18571] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:29:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000110000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2964.477040][T18582] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2964.486681][T18582] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001380)=@base={0x16, 0x0, 0x100, 0xfffeffff}, 0x48) 14:29:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000048000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000120000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:29:27 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa90c, 0x0, 0x0, 0x300000000000506) 14:29:27 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3600, 0x0, 0x0, 0x300000000000506) [ 2968.540250][T18597] __nla_validate_parse: 21 callbacks suppressed [ 2968.540265][T18597] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2968.555924][T18597] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2968.565348][T18597] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2968.576171][T18598] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:29:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000001848000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2968.585779][T18598] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2968.594702][T18596] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2968.604023][T18596] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2968.613650][T18601] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2968.623018][T18601] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:29:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2968.632420][T18601] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:29:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000004c000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000022170000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2968.686010][T18603] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2968.695706][T18603] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000af200000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2968.730484][T18607] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2968.739950][T18607] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:29:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000b0200000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2968.792782][T18610] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2968.802403][T18610] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x0, 0x6, 0x3, 0xc40}, 0x48) 14:29:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000060000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:29:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000017220000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:31 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xd7ff, 0x0, 0x0, 0x300000000000506) 14:29:31 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x380a, 0x0, 0x0, 0x300000000000506) 14:29:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000005865000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000250000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000068000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2972.744099][T18619] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2972.753716][T18619] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000088470000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000006c000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2972.863858][T18637] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2972.873510][T18637] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:48 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x0, 0x0) 14:29:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000480000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000270000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:29:48 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x390a, 0x0, 0x0, 0x300000000000506) 14:29:48 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe009, 0x0, 0x0, 0x300000000000506) [ 2989.392367][T18646] __nla_validate_parse: 25 callbacks suppressed [ 2989.392383][T18646] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2989.396945][T18648] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2989.398646][T18646] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2989.408017][T18648] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2989.417535][T18646] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2989.458432][T18649] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2989.467787][T18649] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000088480000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2989.514806][T18653] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2989.524627][T18653] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000074000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2989.578166][T18657] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2989.587589][T18657] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2989.602426][T18656] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2989.612135][T18656] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000004c0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000007a000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 2989.621314][T18659] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2989.630731][T18659] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2989.640055][T18659] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:29:54 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:29:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000065580000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:29:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000081000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:29:54 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3a0a, 0x0, 0x0, 0x300000000000506) 14:29:54 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe02e, 0x0, 0x0, 0x300000000000506) [ 2995.619971][T18669] __nla_validate_parse: 5 callbacks suppressed [ 2995.619986][T18669] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2995.635601][T18669] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2995.645743][T18674] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2995.655115][T18674] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:29:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000600000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2995.664433][T18674] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2995.685968][T18675] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2995.695641][T18675] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 2995.704232][T18678] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffff81000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:29:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 2995.713575][T18678] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000058650000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2995.747287][T18680] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2995.756889][T18680] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2995.766213][T18680] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:29:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000680000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 2995.805406][T18682] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2995.815042][T18682] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:29:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000006c0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000740000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:00 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3b0a, 0x0, 0x0, 0x300000000000506) 14:30:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000004788000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000600), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={'\x00', 0x0, 0x6, 0x2, 0x0, 0x0, 0xffffffffffffffff}) 14:30:00 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe209, 0x0, 0x0, 0x300000000000506) 14:30:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3001.869580][T18698] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3001.872106][T18699] __nla_validate_parse: 6 callbacks suppressed [ 3001.872120][T18699] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3001.879232][T18698] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3001.885387][T18699] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000007a0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3001.920119][T18700] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3001.929497][T18700] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3001.938790][T18700] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000004888000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3002.016521][T18704] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3002.021491][T18705] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3002.025915][T18704] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3002.035458][T18705] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3002.098196][T18708] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3002.100885][T18709] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3002.107840][T18708] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3002.117148][T18709] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3002.134971][T18709] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000810000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffa888000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3002.280099][T18714] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3002.289737][T18714] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:07 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x34, 0x37, 0x33, 0x31, 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66]}, &(0x7f0000000080)={0x0, "5bad9e6f012db88d5ac58bf0ba0a73bba4657760daf4fff59d558da647e199b6fcfb97618a3d2b56429f5eb2bcd303535900", 0x2c}, 0x48, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={0x0, 0x0, 0x34}, &(0x7f0000000040)=ANY=[@ANYBLOB="656e633d706b63733120686173683d766d6163363428736d342d67656e6529000000002dc41c10c3f5466e000000000000ebffffff000000000000000000000000000000000a000000000000000000"], 0x0, &(0x7f0000000100)=""/52) 14:30:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffff9e000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000047880000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:07 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe803, 0x0, 0x0, 0x300000000000506) 14:30:07 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3c00, 0x0, 0x0, 0x300000000000506) [ 3008.102853][T18727] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3008.112533][T18727] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3008.123104][T18725] __nla_validate_parse: 5 callbacks suppressed [ 3008.123118][T18725] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3008.138689][T18725] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000048880000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:07 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xeb09, 0x0, 0x0, 0x300000000000506) 14:30:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffffea000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3008.148134][T18725] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3008.157765][T18729] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3008.167090][T18729] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3008.222746][T18737] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3008.232156][T18737] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3008.241488][T18737] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3008.250846][T18738] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3008.260115][T18735] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:30:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000020af0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3008.260429][T18738] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3008.269931][T18735] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffffef000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:13 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000080)='./file0\x00'}, 0x10) 14:30:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000020b00000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000fffffff0000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:13 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3ca9, 0x0, 0x0, 0x300000000000506) 14:30:13 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xec09, 0x0, 0x0, 0x300000000000506) [ 3014.359469][T18754] __nla_validate_parse: 5 callbacks suppressed [ 3014.359484][T18754] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3014.375103][T18754] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3014.384441][T18754] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3014.394013][T18756] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3014.394623][T18753] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3014.403387][T18756] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3014.412939][T18753] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000fffffffe000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000400300000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3014.529386][T18762] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3014.532116][T18761] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3014.538777][T18762] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3014.548330][T18761] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3014.566224][T18762] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3014.575934][T18763] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3014.585450][T18763] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3014.614352][T18765] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:30:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000034000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3014.623990][T18765] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000001000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}]}]}, 0x34}}, 0x0) 14:30:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000002000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000007fffffff000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:23 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3e0a, 0x0, 0x0, 0x300000000000506) 14:30:23 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xf401, 0x0, 0x0, 0x300000000000506) 14:30:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3024.746478][T18778] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3024.747710][T18780] __nla_validate_parse: 4 callbacks suppressed [ 3024.747722][T18780] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3024.756124][T18778] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3024.780253][T18780] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3024.789559][T18780] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3024.804390][T18783] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3024.813813][T18783] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000003000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3024.850436][T18784] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3024.860064][T18784] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3024.890193][T18787] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000200"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000ffffffff000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3024.899613][T18787] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3024.935569][T18789] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000004000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000005000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3024.944983][T18789] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3024.954303][T18789] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3024.973567][T18792] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3024.983193][T18792] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000002000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffe2c, 0x10, &(0x7f00000000c0), 0xfffffffffffffd00}, 0x48) 14:30:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000006000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000300"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:30 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xffd7, 0x0, 0x0, 0x300000000000506) 14:30:30 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x4000, 0x0, 0x0, 0x300000000000506) [ 3031.001349][T18808] __nla_validate_parse: 4 callbacks suppressed [ 3031.001365][T18808] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3031.017086][T18808] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3031.026404][T18808] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3031.038447][T18806] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:30:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000003000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3031.048071][T18806] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3031.057527][T18809] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3031.066914][T18809] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3031.076409][T18811] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3031.085859][T18811] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000400"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000007000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000004000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3031.095184][T18811] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000005000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000008000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000006000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3031.150283][T18816] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3031.159813][T18816] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3031.172892][T18814] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3031.182516][T18814] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:37 executing program 5: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:30:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000009000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000007000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000500"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:37 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x20000, 0x0, 0x0, 0x300000000000506) 14:30:37 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x4001, 0x0, 0x0, 0x300000000000506) [ 3038.158273][T18835] __nla_validate_parse: 11 callbacks suppressed [ 3038.158289][T18835] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3038.160959][T18831] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3038.164611][T18835] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3038.173849][T18831] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000600"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000008000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3038.201305][T18835] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3038.215677][T18829] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3038.225222][T18829] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000a000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3038.259840][T18837] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3038.269471][T18837] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3038.296559][T18839] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000009000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3038.306005][T18839] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3038.315413][T18839] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3038.335639][T18841] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3038.345101][T18841] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000700"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000a000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3038.420451][T18845] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3038.430071][T18845] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "b8"}]}}, &(0x7f0000000100)=""/251, 0x2a, 0xfb, 0x1}, 0x20) 14:30:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000b000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000b000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000800"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:41 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x400000, 0x0, 0x0, 0x300000000000506) 14:30:41 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x4102, 0x0, 0x0, 0x300000000000506) 14:30:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000c000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000c000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000d000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000d000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3042.368555][T18857] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3042.378187][T18857] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000900"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000e000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3042.441675][T18870] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3042.451341][T18870] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffe2c, 0x10, &(0x7f00000000c0), 0xfffffffffffffd00}, 0x48) 14:30:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000e000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000f000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000a00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:45 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1000000, 0x0, 0x0, 0x300000000000506) 14:30:45 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x5800, 0x0, 0x0, 0x300000000000506) [ 3046.516177][T18882] __nla_validate_parse: 24 callbacks suppressed [ 3046.516192][T18882] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3046.518637][T18884] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3046.522551][T18882] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3046.531856][T18884] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:45 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x6009, 0x0, 0x0, 0x300000000000506) 14:30:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000f000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000b00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000010000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3046.541412][T18882] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3046.568691][T18885] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3046.578233][T18885] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3046.620040][T18890] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3046.629465][T18890] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3046.643990][T18895] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3046.653498][T18895] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000011000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000010000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3046.662903][T18895] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3046.673655][T18893] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3046.683470][T18893] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffe2c, 0x10, &(0x7f00000000c0), 0xfffffffffffffd00}, 0x48) 14:30:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000011000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000012000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000c00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:51 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2000000, 0x0, 0x0, 0x300000000000506) 14:30:51 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x650b, 0x0, 0x0, 0x300000000000506) 14:30:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000d00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3052.754966][T18908] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3052.755645][T18910] __nla_validate_parse: 5 callbacks suppressed [ 3052.755658][T18910] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3052.764586][T18908] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3052.770825][T18910] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3052.798623][T18911] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3052.808018][T18911] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3052.817341][T18911] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000e00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000012000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3052.845926][T18913] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3052.855671][T18913] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:30:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100001c000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3052.912037][T18916] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3052.921670][T18916] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3052.935653][T18918] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3052.945145][T18918] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001722000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000025000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3052.974231][T18920] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3052.983674][T18920] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3052.993017][T18920] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:56 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x7, 0xa, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:30:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000f00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000048000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:30:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000025000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:56 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3000000, 0x0, 0x0, 0x300000000000506) 14:30:56 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x6909, 0x0, 0x0, 0x300000000000506) 14:30:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000001000"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:30:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000028000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000004c000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3057.760517][T18936] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3057.761446][T18937] __nla_validate_parse: 7 callbacks suppressed [ 3057.761460][T18937] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3057.770139][T18936] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3057.794249][T18937] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3057.826516][T18939] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3057.836147][T18939] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3057.837650][T18941] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3057.853968][T18941] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3057.863427][T18943] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000001100"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3057.872854][T18943] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3057.882215][T18943] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:30:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000048000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:30:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000060000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3057.930590][T18945] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3057.940217][T18945] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3057.944387][T18947] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3057.958064][T18947] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3057.967413][T18947] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:31:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100004c000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:03 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x7f00, 0x0, 0x0, 0x300000000000506) 14:31:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000005865000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f00000008c0)=[{{&(0x7f00000005c0)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_tos_int={{0x14}}, @ip_tos_int={{0x14}}], 0x30}}], 0x1, 0x4000040) 14:31:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000001200"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:03 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x4000000, 0x0, 0x0, 0x300000000000506) [ 3064.027103][T18955] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3064.031272][T18958] __nla_validate_parse: 2 callbacks suppressed [ 3064.031339][T18958] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3064.036725][T18955] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3064.042947][T18958] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:31:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000068000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3064.069934][T18958] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3064.081569][T18961] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3064.091003][T18961] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:31:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000002500"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3064.126012][T18964] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3064.135413][T18964] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3064.165916][T18966] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:31:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000060000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000006c000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3064.175540][T18966] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3064.203806][T18969] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3064.213184][T18969] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:31:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000074000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000004800"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000007a000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3064.222535][T18969] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3064.288082][T18974] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3064.297736][T18974] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000001940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:31:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000081000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000068000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000004c00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:08 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x6000000, 0x0, 0x0, 0x300000000000506) 14:31:08 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa209, 0x0, 0x0, 0x300000000000506) [ 3069.116290][T18988] __nla_validate_parse: 6 callbacks suppressed [ 3069.116304][T18988] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3069.117148][T18989] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3069.122608][T18988] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3069.150973][T18989] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000ffffff81000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100006c000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000005000"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3069.161289][T18990] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3069.170939][T18990] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3069.180255][T18990] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:31:08 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa90c, 0x0, 0x0, 0x300000000000506) [ 3069.218513][T18993] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3069.227911][T18993] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:31:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004788000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3069.261061][T18995] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3069.270738][T18995] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3069.280788][T18997] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3069.290185][T18997] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3069.299542][T18997] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:31:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000006000"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3069.356148][T19003] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3069.365794][T19003] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:12 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x901, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000000180)=ANY=[@ANYRES32], 0x23) 14:31:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004888000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000074000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000006800"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:12 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x7000000, 0x0, 0x0, 0x300000000000506) 14:31:12 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa93c, 0x0, 0x0, 0x300000000000506) 14:31:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000ffffa888000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100007a000000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000ffffff9e000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3073.318315][T19014] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3073.328060][T19014] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000070020000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000006c00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000030000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3073.425710][T19029] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3073.435428][T19029] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) 14:31:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000020af000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100001f040000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000007400"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:16 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xab0c, 0x0, 0x0, 0x300000000000506) 14:31:16 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x8000000, 0x0, 0x0, 0x300000000000506) [ 3077.548014][T19035] __nla_validate_parse: 20 callbacks suppressed [ 3077.548042][T19035] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3077.563722][T19035] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3077.573157][T19035] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3077.583032][T19040] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:31:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000020b0000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3077.592471][T19040] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3077.603015][T19041] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3077.612665][T19041] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000050000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000007a00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3077.672861][T19044] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3077.682224][T19044] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3077.691782][T19045] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3077.701206][T19045] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3077.710522][T19045] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:31:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100001f050000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000ffffffea000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3077.724474][T19047] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3077.734138][T19047] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000060000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0, 0xfffffffffffffd44}}, 0x0) 14:31:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000ffffffef000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000007c00"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100001f060000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:22 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa000000, 0x0, 0x0, 0x300000000000506) 14:31:22 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xd7ff, 0x0, 0x0, 0x300000000000506) [ 3083.790528][T19065] __nla_validate_parse: 8 callbacks suppressed [ 3083.790544][T19065] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3083.806117][T19065] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3083.816371][T19062] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3083.825775][T19062] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:31:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000fffffff0000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3083.835198][T19062] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3083.852167][T19060] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3083.861853][T19060] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3083.873319][T19068] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:31:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000003"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000fffffffe000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3083.882718][T19068] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:31:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000070000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000fb04"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000090000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3083.957236][T19072] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3083.963034][T19074] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3083.966594][T19072] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3083.976127][T19074] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3083.993929][T19072] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3084.038404][T19077] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3084.048064][T19077] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:29 executing program 5: syz_emit_ethernet(0x16, &(0x7f0000000080)={@broadcast}, 0x0) 14:31:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000088a8ffff000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000a0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000005"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:29 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc000000, 0x0, 0x0, 0x300000000000506) 14:31:29 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe00c, 0x0, 0x0, 0x300000000000506) 14:31:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000a005"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3090.041305][T19087] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3090.045913][T19089] __nla_validate_parse: 5 callbacks suppressed [ 3090.045928][T19089] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3090.050918][T19087] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3090.074867][T19089] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:31:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000006"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3090.087691][T19085] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3090.097095][T19085] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3090.101539][T19093] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3090.106428][T19085] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3090.115972][T19093] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3090.167905][T19095] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3090.177537][T19095] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000007"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100007fffffff000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000b0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3090.253874][T19097] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3090.263595][T19097] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3090.284298][T19099] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3090.293724][T19099] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:31:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000b408"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3090.351407][T19101] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3090.360834][T19101] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3090.370141][T19101] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3090.384931][T19103] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3090.394538][T19103] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x15, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 14:31:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000081ffffff000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000c0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000ff08"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:33 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc020000, 0x0, 0x0, 0x300000000000506) 14:31:33 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe02e, 0x0, 0x0, 0x300000000000506) 14:31:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100009effffff000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000009"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000d0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000000a"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000eaffffff000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000000b"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1c, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 14:31:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000e0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000efffffff000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000000c"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:37 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe000000, 0x0, 0x0, 0x300000000000506) 14:31:37 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe10c, 0x0, 0x0, 0x300000000000506) 14:31:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000f0ffffff000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3098.351180][T19138] __nla_validate_parse: 12 callbacks suppressed [ 3098.351195][T19138] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3098.356971][T19141] net_ratelimit: 8 callbacks suppressed [ 3098.356985][T19141] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3098.357521][T19138] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3098.366837][T19141] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3098.402514][T19139] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3098.411889][T19139] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3098.421212][T19139] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:31:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000feffffff000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3098.448015][T19144] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3098.457419][T19144] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:31:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000f0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000000d"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000340000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3098.497748][T19146] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3098.507142][T19146] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3098.528717][T19148] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:31:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000010000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3098.567840][T19152] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3098.577468][T19152] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:41 executing program 5: r0 = syz_clone(0x10200000, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(r0, &(0x7f0000004800)=[{&(0x7f0000002380)=""/224, 0xe0}], 0x1, &(0x7f0000004a00)=[{&(0x7f00000048c0)=""/94, 0x5e}], 0x1, 0x0) 14:31:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000110000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000020000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000000e"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:41 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xf000000, 0x0, 0x0, 0x300000000000506) 14:31:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000120000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:41 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe60c, 0x0, 0x0, 0x300000000000506) 14:31:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000030000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3102.536863][T19164] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3102.546514][T19164] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000040000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000048180000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000050000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000001c0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000060000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:46 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x1}) 14:31:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000000f"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000041f0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:46 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe70c, 0x0, 0x0, 0x300000000000506) 14:31:46 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x12000000, 0x0, 0x0, 0x300000000000506) [ 3107.587562][T19189] __nla_validate_parse: 26 callbacks suppressed [ 3107.587577][T19189] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3107.596159][T19191] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3107.603207][T19189] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3107.612789][T19191] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3107.622079][T19189] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3107.642829][T19192] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3107.652261][T19192] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:31:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000070000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000051f0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000011"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3107.744248][T19199] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3107.753635][T19199] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3107.765650][T19197] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3107.775278][T19197] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000005011"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3107.808165][T19200] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3107.817669][T19200] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3107.827035][T19200] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:31:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000080000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000005111"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000090000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000061f0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3107.850805][T19202] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3107.860427][T19202] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3107.919625][T19206] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3107.929289][T19206] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:53 executing program 5: syz_clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000100)=""/74, 0x4a, 0x0, &(0x7f00000001c0)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) 14:31:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000000a0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:31:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000250000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000012"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:53 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x13000000, 0x0, 0x0, 0x300000000000506) 14:31:53 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe803, 0x0, 0x0, 0x300000000000506) [ 3114.806926][T19222] __nla_validate_parse: 7 callbacks suppressed [ 3114.806942][T19222] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3114.809651][T19218] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3114.813170][T19222] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3114.822412][T19218] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000020"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3114.850036][T19216] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3114.859416][T19216] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3114.868801][T19216] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3114.891968][T19224] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:31:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000280000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3114.901693][T19224] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:31:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000025"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:31:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000000b0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3114.933325][T19226] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3114.942722][T19226] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3114.952055][T19226] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:31:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000088470000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:31:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000480000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3114.991779][T19230] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3115.001239][T19230] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3115.019241][T19228] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3115.028864][T19228] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x0) 14:32:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000000c0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000003f"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000018480000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:00 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x18000000, 0x0, 0x0, 0x300000000000506) 14:32:00 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xf401, 0x0, 0x0, 0x300000000000506) [ 3121.071615][T19241] __nla_validate_parse: 6 callbacks suppressed [ 3121.071630][T19241] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3121.078012][T19245] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3121.087193][T19241] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3121.096711][T19245] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000000d0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000040"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3121.114671][T19244] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3121.124094][T19244] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3121.133433][T19244] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:32:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000088480000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000000e0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3121.193048][T19250] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3121.202559][T19250] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3121.204672][T19252] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3121.221684][T19252] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000048"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000000f0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3121.265064][T19254] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3121.274781][T19254] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3121.284219][T19254] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3121.354764][T19260] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3121.364545][T19260] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001300)={0x0, 0x7ffffffff000}, 0x1, 0x0, 0x100000000000000}, 0x0) 14:32:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000100000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000004c0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000004c"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:05 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x18020000, 0x0, 0x0, 0x300000000000506) 14:32:05 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xfa09, 0x0, 0x0, 0x300000000000506) 14:32:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000110000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000065580000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3126.094986][T19273] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3126.096813][T19276] __nla_validate_parse: 9 callbacks suppressed [ 3126.096827][T19276] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3126.104598][T19273] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3126.128705][T19276] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:32:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000050"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000120000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3126.142068][T19278] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3126.151458][T19278] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3126.160783][T19278] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3126.178629][T19280] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:32:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000001150"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3126.188323][T19280] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3126.203185][T19282] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3126.212621][T19282] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:32:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000600000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3126.244574][T19284] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3126.254285][T19284] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3126.295144][T19286] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3126.304713][T19286] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3126.314037][T19286] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:32:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="0704de2f9c6b"}, 0x14) 14:32:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000017220000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000001151"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000058650000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:11 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1c0a0000, 0x0, 0x0, 0x300000000000506) 14:32:11 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xfb09, 0x0, 0x0, 0x300000000000506) [ 3132.358352][T19295] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3132.368182][T19295] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3132.370951][T19299] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3132.377540][T19295] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3132.387099][T19299] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3132.421886][T19297] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3132.431257][T19297] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:32:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000fe5e"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000250000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000680000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3132.533960][T19303] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3132.539319][T19304] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3132.543415][T19303] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3132.552922][T19304] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000060"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3132.578250][T19306] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3132.587868][T19306] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3132.597192][T19306] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:32:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000480000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000006c0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3132.661113][T19308] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3132.670758][T19308] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000002700000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f0, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}}}}) 14:32:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000004c0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:17 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xffd7, 0x0, 0x0, 0x300000000000506) 14:32:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000068"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:17 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1e000000, 0x0, 0x0, 0x300000000000506) [ 3138.667536][T19322] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3138.670260][T19324] __nla_validate_parse: 5 callbacks suppressed [ 3138.670274][T19324] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3138.677326][T19322] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3138.683453][T19324] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:32:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000600000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000006c"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3138.710439][T19324] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3138.724505][T19327] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3138.734033][T19327] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:32:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000740000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3138.800269][T19330] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3138.810025][T19330] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3138.830436][T19334] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3138.839868][T19334] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:32:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000074"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000058650000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000007a0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000680000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3138.849757][T19334] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3138.860192][T19332] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3138.869815][T19332] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3138.928621][T19336] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3138.938312][T19336] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000040)={0xf, 0x4, 0x8, 0x0, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0xfffffee9}]}, 0x2000005c}}, 0x0) 14:32:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000810000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000007a"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000006c0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:23 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x20000000, 0x0, 0x0, 0x300000000000506) 14:32:23 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x20000, 0x0, 0x0, 0x300000000000506) [ 3144.910006][T19349] __nla_validate_parse: 7 callbacks suppressed [ 3144.910020][T19349] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3144.920370][T19354] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3144.925711][T19349] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3144.935325][T19354] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000740000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000007c"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3144.953179][T19349] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3144.969713][T19352] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3144.979093][T19352] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:32:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000047880000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3145.023854][T19357] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3145.033235][T19357] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3145.060742][T19359] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:32:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000fe80"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3145.066931][T19361] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3145.070439][T19359] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3145.088418][T19361] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3145.097772][T19361] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:32:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000007a0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000810000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3145.129312][T19363] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3145.138966][T19363] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000048880000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003840)=[{{&(0x7f0000000d00)={0x2, 0x4e20, @local}, 0x10, 0x0}}, {{&(0x7f0000000f00)={0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x0, [{0x0, 0x2}]}]}}}], 0x18}}], 0x2, 0x0) 14:32:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000000005a0"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffff810000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:28 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x24000000, 0x0, 0x0, 0x300000000000506) 14:32:28 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x400000, 0x0, 0x0, 0x300000000000506) 14:32:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000400300000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000047880000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3149.159996][T19376] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3149.169627][T19376] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000034000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000000008b4"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000048880000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000ffffe000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffa8880000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3149.267017][T19388] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3149.276793][T19388] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x7800, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private}}}}) 14:32:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000001000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffff9e0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000000004fb"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:36 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1000000, 0x0, 0x0, 0x300000000000506) 14:32:36 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2a000000, 0x0, 0x0, 0x300000000000506) 14:32:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000020af0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3157.464815][T19406] __nla_validate_parse: 24 callbacks suppressed [ 3157.464872][T19406] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3157.480708][T19406] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3157.491846][T19403] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3157.501584][T19403] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000000080fe"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000020b00000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3157.511836][T19408] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3157.521217][T19408] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3157.530603][T19408] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3157.542415][T19410] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3157.551769][T19410] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:32:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000000008ff"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3157.603731][T19413] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3157.613426][T19413] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3157.616218][T19414] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3157.631205][T19414] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:32:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000002000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3157.662647][T19416] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3157.672296][T19416] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3157.702079][T19418] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3157.761517][T19420] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3157.771241][T19420] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:40 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x401) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x1ffff000, 0x0, 0x12, r0, 0x8000000) 14:32:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffffea0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000003000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000ffff"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:40 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x30000000, 0x0, 0x0, 0x300000000000506) 14:32:40 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2000000, 0x0, 0x0, 0x300000000000506) 14:32:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000004000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffffef0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3161.640115][T19429] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3161.649750][T19429] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001f04000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000fffffff00000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x6, &(0x7f0000000700)=@framed={{}, [@exit, @btf_id]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000840), 0x10}, 0x80) 14:32:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:45 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3000000, 0x0, 0x0, 0x300000000000506) 14:32:45 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x36000000, 0x0, 0x0, 0x300000000000506) 14:32:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000005000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000fffffffe0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000007fffffff0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3166.623051][T19452] __nla_validate_parse: 17 callbacks suppressed [ 3166.623065][T19452] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3166.634147][T19456] net_ratelimit: 4 callbacks suppressed [ 3166.634160][T19456] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3166.638708][T19452] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3166.663159][T19456] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3166.689334][T19458] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3166.698664][T19458] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3166.707993][T19458] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3166.721381][T19461] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:32:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3166.730833][T19461] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:32:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001f05000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffffff0000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3166.795753][T19463] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3166.805476][T19463] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3166.824166][T19465] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3166.833570][T19465] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:32:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000020000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3166.842944][T19465] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3166.905002][T19469] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3166.914649][T19469] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{}, {0x8}]}) 14:32:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000006000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000030000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:49 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3c000000, 0x0, 0x0, 0x300000000000506) 14:32:49 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x4000000, 0x0, 0x0, 0x300000000000506) 14:32:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001f06000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000007000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000040000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3170.853137][T19480] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3170.862760][T19480] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000008000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000009000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3170.952441][T19494] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3170.962247][T19494] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @rand_addr=0x64010102}, {0x0, @local}, 0x0, {}, 'batadv_slave_0\x00'}) 14:32:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000050000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:32:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000a000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:32:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:56 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x40010000, 0x0, 0x0, 0x300000000000506) 14:32:56 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x6000000, 0x0, 0x0, 0x300000000000506) [ 3177.863982][T19506] __nla_validate_parse: 23 callbacks suppressed [ 3177.863998][T19506] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3177.865549][T19508] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3177.870378][T19506] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3177.879714][T19508] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3177.889271][T19506] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3177.921307][T19509] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3177.930694][T19509] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:32:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000060000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3177.997143][T19512] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3178.006781][T19512] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3178.032989][T19515] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:32:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000b000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3178.042466][T19515] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3178.062668][T19517] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3178.072295][T19517] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:32:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:32:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000070000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3178.105892][T19519] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3178.115359][T19519] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3178.122840][T19521] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3178.124695][T19519] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3178.134220][T19521] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:03 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 14:33:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000080000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000c000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:03 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x41020000, 0x0, 0x0, 0x300000000000506) 14:33:03 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x7000000, 0x0, 0x0, 0x300000000000506) [ 3184.115882][T19532] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3184.125628][T19532] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3184.131265][T19535] __nla_validate_parse: 2 callbacks suppressed [ 3184.131359][T19535] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3184.149551][T19535] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3184.160673][T19534] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3184.170100][T19534] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3184.179423][T19534] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:33:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000090000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3184.243121][T19539] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3184.252758][T19539] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3184.279127][T19541] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3184.288511][T19541] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3184.326226][T19543] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:33:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000a0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000d000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3184.335905][T19543] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3184.389848][T19545] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3184.399343][T19545] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3184.408698][T19547] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3184.469616][T19549] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3184.479239][T19549] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:07 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x18020000, 0x0, 0x0, 0x300000000000506) 14:33:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000b0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000e000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:07 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x8000000, 0x0, 0x0, 0x300000000000506) 14:33:07 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x58000000, 0x0, 0x0, 0x300000000000506) 14:33:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000f000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000c0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3188.348401][T19557] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3188.358036][T19557] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000010000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000d0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000011000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:13 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x18020000, 0x0, 0x0, 0x300000000000506) 14:33:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000e0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000012000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:13 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa000000, 0x0, 0x0, 0x300000000000506) 14:33:13 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x650b0000, 0x0, 0x0, 0x300000000000506) [ 3194.753156][T19584] __nla_validate_parse: 20 callbacks suppressed [ 3194.753172][T19584] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3194.768859][T19584] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3194.778147][T19584] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3194.789620][T19586] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000001c000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3194.799004][T19586] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3194.811887][T19587] net_ratelimit: 2 callbacks suppressed [ 3194.811901][T19587] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3194.820943][T19589] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3194.827025][T19587] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000f0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3194.836322][T19589] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3194.854132][T19589] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3194.884825][T19591] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3194.894199][T19591] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000100000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000110000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000025000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3194.987896][T19595] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3194.997644][T19595] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:22 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x18020000, 0x0, 0x0, 0x300000000000506) 14:33:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000120000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000028000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:22 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xb000000, 0x0, 0x0, 0x300000000000506) 14:33:22 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x73227cc7, 0x0, 0x0, 0x300000000000506) [ 3203.221191][T19606] __nla_validate_parse: 7 callbacks suppressed [ 3203.221208][T19606] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3203.236841][T19606] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3203.246164][T19606] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3203.257674][T19609] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000250000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3203.267107][T19609] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000048000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3203.292653][T19613] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3203.302275][T19613] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3203.339939][T19616] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3203.348261][T19619] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3203.349301][T19616] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3203.358919][T19619] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3203.368191][T19616] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:33:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001848000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3203.386907][T19617] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3203.396308][T19617] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000480000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3203.466780][T19621] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3203.476414][T19621] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:28 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x18000000, 0x0, 0x0, 0x300000000000506) 14:33:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000004c000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000004c0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:28 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc000000, 0x0, 0x0, 0x300000000000506) 14:33:28 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x7f000000, 0x0, 0x0, 0x300000000000506) [ 3209.473441][T19639] __nla_validate_parse: 5 callbacks suppressed [ 3209.473456][T19639] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3209.489141][T19639] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3209.498437][T19639] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3209.508705][T19637] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000060000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000600000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3209.518226][T19637] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3209.534549][T19634] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3209.544490][T19634] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3209.564661][T19641] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:33:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000005865000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3209.574023][T19641] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3209.583488][T19641] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3209.593157][T19643] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3209.602610][T19643] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000680000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000068000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3209.647221][T19645] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3209.656844][T19645] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:33 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x18000000, 0x0, 0x0, 0x300000000000506) 14:33:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000006c000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000006c0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:33 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc020000, 0x0, 0x0, 0x300000000000506) 14:33:33 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x820b0000, 0x0, 0x0, 0x300000000000506) 14:33:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3214.480883][T19661] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3214.481365][T19667] __nla_validate_parse: 8 callbacks suppressed [ 3214.481377][T19667] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3214.490598][T19661] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3214.514640][T19667] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3214.528313][T19665] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3214.537735][T19665] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3214.547126][T19665] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3214.566751][T19669] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3214.576538][T19669] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000740000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000270000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3214.653806][T19671] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3214.663221][T19671] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3214.689098][T19675] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:33:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000007a0000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000300000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3214.698423][T19675] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3214.707752][T19675] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3214.719034][T19674] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3214.728622][T19674] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:39 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x820b0000, 0x0, 0x0, 0x300000000000506) 14:33:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000500000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000074000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:39 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe000000, 0x0, 0x0, 0x300000000000506) 14:33:39 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x91ffffff, 0x0, 0x0, 0x300000000000506) 14:33:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000600000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3220.751755][T19690] __nla_validate_parse: 4 callbacks suppressed [ 3220.751769][T19690] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3220.755636][T19692] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3220.757958][T19690] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3220.786118][T19692] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000007a000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3220.799340][T19695] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3220.808736][T19695] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3220.818049][T19695] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3220.827509][T19694] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3220.836909][T19694] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000700000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3220.848237][T19697] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3220.857598][T19697] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3220.866952][T19697] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:33:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000900000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000081000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3220.911863][T19700] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3220.921469][T19700] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:46 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x820b0000, 0x0, 0x0, 0x300000000000506) 14:33:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000ffffff81000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000a00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:46 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x977e0000, 0x0, 0x0, 0x300000000000506) 14:33:46 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xf000000, 0x0, 0x0, 0x300000000000506) [ 3227.835994][T19713] __nla_validate_parse: 7 callbacks suppressed [ 3227.836009][T19713] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3227.851566][T19713] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3227.860899][T19713] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3227.871112][T19718] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000b00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3227.880465][T19718] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3227.890989][T19719] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3227.900620][T19719] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3227.941773][T19722] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3227.951243][T19722] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004788000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000c00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3228.001017][T19724] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3228.010669][T19724] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3228.036757][T19727] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:33:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000d00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3228.046150][T19727] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3228.055508][T19727] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3228.116374][T19732] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3228.125988][T19732] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:51 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x820b0000, 0x0, 0x0, 0x300000000000506) 14:33:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000e00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004888000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:51 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa3090000, 0x0, 0x0, 0x300000000000506) 14:33:51 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x12000000, 0x0, 0x0, 0x300000000000506) 14:33:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000f00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3232.864753][T19737] __nla_validate_parse: 4 callbacks suppressed [ 3232.864807][T19737] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3232.877253][T19742] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3232.880398][T19737] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3232.889976][T19742] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3232.921961][T19744] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3232.931385][T19744] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3232.940735][T19744] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3232.957238][T19747] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001100000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000ffffa888000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3232.966590][T19747] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:52 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa90c0000, 0x0, 0x0, 0x300000000000506) [ 3233.009253][T19750] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3233.018673][T19750] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3233.034948][T19753] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3233.038354][T19754] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:33:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000ffffff9e000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3233.053898][T19754] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:33:59 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc000000, 0x0, 0x0, 0x300000000000506) 14:33:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000ffffffea000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:33:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001200000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000ffff"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:59 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x18000000, 0x0, 0x0, 0x300000000000506) 14:33:59 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc77c2273, 0x0, 0x0, 0x300000000000506) [ 3239.991384][T19765] __nla_validate_parse: 5 callbacks suppressed [ 3239.991399][T19765] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3240.002605][T19770] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3240.007018][T19765] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3240.016506][T19770] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3240.036297][T19768] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3240.045715][T19768] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3240.055091][T19768] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:33:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:33:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000221700000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000ffffffef000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3240.138510][T19773] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3240.148136][T19773] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3240.156461][T19775] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3240.165938][T19775] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3240.175582][T19775] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:33:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3240.191396][T19777] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3240.200860][T19777] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:33:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000af2000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:33:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000fffffff0000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3240.240409][T19779] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3240.250036][T19779] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:04 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc000000, 0x0, 0x0, 0x300000000000506) 14:34:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000b02000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000fffffffe000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000ffff"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:04 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xd7ff0000, 0x0, 0x0, 0x300000000000506) 14:34:04 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x18020000, 0x0, 0x0, 0x300000000000506) 14:34:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3245.029448][T19791] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3245.039077][T19791] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3245.040298][T19796] __nla_validate_parse: 5 callbacks suppressed [ 3245.040311][T19796] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3245.063234][T19796] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3245.080146][T19794] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3245.089505][T19794] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3245.098885][T19794] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3245.116721][T19799] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:34:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000172200000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3245.126423][T19799] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000088a8ffff000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3245.198922][T19801] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3245.208383][T19801] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3245.226445][T19803] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3245.237054][T19803] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3245.251654][T19805] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3245.261037][T19805] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3245.270417][T19805] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000002500000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3245.324824][T19807] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3245.334494][T19807] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:11 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc000000, 0x0, 0x0, 0x300000000000506) 14:34:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000e0ffff000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000000000e0"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000884700000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:11 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xd7ffffff, 0x0, 0x0, 0x300000000000506) 14:34:11 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1e000000, 0x0, 0x0, 0x300000000000506) [ 3252.155278][T19815] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3252.163358][T19820] __nla_validate_parse: 2 callbacks suppressed [ 3252.163374][T19820] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3252.164915][T19815] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3252.171141][T19820] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:34:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100007fffffff000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000008dff"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3252.200536][T19822] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3252.209991][T19822] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3252.219359][T19822] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000884800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3252.281596][T19825] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3252.290998][T19825] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3252.300446][T19827] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3252.309759][T19827] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3252.319144][T19827] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3252.334484][T19829] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3252.344114][T19829] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004c00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000f5ff"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3252.456699][T19835] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3252.466389][T19835] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000081ffffff000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000655800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:18 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe0090000, 0x0, 0x0, 0x300000000000506) 14:34:18 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x1f000000, 0x0, 0x0, 0x300000000000506) 14:34:18 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc77c2273, 0x0, 0x0, 0x300000000000506) [ 3259.271842][T19845] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3259.281512][T19845] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3259.291712][T19846] __nla_validate_parse: 4 callbacks suppressed [ 3259.291738][T19846] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3259.307261][T19846] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000006000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3259.316775][T19846] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3259.329087][T19849] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3259.338418][T19849] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:34:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100009effffff000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3259.390412][T19851] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3259.400038][T19851] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3259.406993][T19853] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3259.417812][T19853] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:34:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000586500000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000006800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3259.441138][T19855] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3259.450698][T19855] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3259.460059][T19855] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000006c00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000eaffffff000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3259.512323][T19859] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3259.522065][T19859] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000007400000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:24 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe803, 0x0, 0x0, 0x300000000000506) 14:34:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000efffffff000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000007a00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:24 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe02e0000, 0x0, 0x0, 0x300000000000506) 14:34:24 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x20000000, 0x0, 0x0, 0x300000000000506) [ 3265.632508][T19879] __nla_validate_parse: 11 callbacks suppressed [ 3265.632524][T19879] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3265.648157][T19879] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3265.657497][T19879] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3265.668101][T19881] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:34:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000f0ffffff000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000008100000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3265.668634][T19884] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3265.677689][T19881] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3265.695563][T19884] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:34:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3265.742255][T19887] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3265.751632][T19887] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3265.763830][T19888] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3265.773682][T19888] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3265.783122][T19888] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000478800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3265.800438][T19890] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3265.810049][T19890] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000feffffff000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3265.900239][T19895] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3265.909938][T19895] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000340000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:29 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x24000000, 0x0, 0x0, 0x300000000000506) 14:34:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000488800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:29 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe803, 0x0, 0x0, 0x300000000000506) 14:34:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:29 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe2090000, 0x0, 0x0, 0x300000000000506) [ 3270.637845][T19909] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3270.647603][T19909] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3270.657906][T19911] __nla_validate_parse: 7 callbacks suppressed [ 3270.657921][T19911] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3270.673502][T19911] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000020af00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3270.683111][T19911] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffe0000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3270.716810][T19913] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3270.726270][T19913] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3270.732487][T19915] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3270.745283][T19915] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000020b000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3270.758593][T19917] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3270.768008][T19917] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3270.777416][T19917] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3270.804347][T19919] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:34:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000010000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3270.813767][T19919] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3270.879485][T19921] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3270.889155][T19921] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:34 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe803, 0x0, 0x0, 0x300000000000506) 14:34:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004003000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000020000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:34 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe8030000, 0x0, 0x0, 0x300000000000506) 14:34:34 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2a000000, 0x0, 0x0, 0x300000000000506) [ 3275.680628][T19934] __nla_validate_parse: 3 callbacks suppressed [ 3275.680689][T19934] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3275.696424][T19934] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3275.705745][T19934] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3275.715293][T19937] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:34:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000340000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3275.724665][T19937] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3275.741240][T19931] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3275.750933][T19931] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000030000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3275.797744][T19940] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3275.807197][T19940] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:34:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000010000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3275.843004][T19943] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3275.852453][T19943] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3275.861771][T19943] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3275.879689][T19944] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:34:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000040000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000020000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3275.889327][T19944] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000001f040000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:41 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe02e, 0x0, 0x0, 0x300000000000506) 14:34:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000030000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:41 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xeb090000, 0x0, 0x0, 0x300000000000506) 14:34:41 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x30000000, 0x0, 0x0, 0x300000000000506) [ 3282.028426][T19958] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3282.036086][T19962] __nla_validate_parse: 7 callbacks suppressed [ 3282.036101][T19962] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3282.038020][T19958] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3282.044192][T19962] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000050000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3282.071377][T19962] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3282.081824][T19964] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3282.091696][T19964] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3282.127382][T19966] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3282.137094][T19966] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3282.159902][T19969] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000040000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3282.169348][T19969] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3282.178655][T19969] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3282.206579][T19971] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3282.216013][T19971] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:34:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000001f050000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000060000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3282.235662][T19973] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3282.245290][T19973] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000050000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000060000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:46 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe02e, 0x0, 0x0, 0x300000000000506) 14:34:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000001f060000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000070000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:46 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xec090000, 0x0, 0x0, 0x300000000000506) 14:34:46 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x36000000, 0x0, 0x0, 0x300000000000506) [ 3287.043457][T19996] __nla_validate_parse: 12 callbacks suppressed [ 3287.043472][T19996] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3287.059123][T19996] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3287.068476][T19996] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3287.082028][T19990] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 14:34:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000080000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000070000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000090000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3287.091824][T19990] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3287.105852][T19998] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3287.115283][T19998] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:34:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000080000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3287.150832][T20002] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3287.152171][T20001] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3287.160253][T20002] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3287.160268][T20002] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3287.188494][T20001] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000a0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3287.207715][T20005] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3287.217153][T20005] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000090000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:53 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe02e, 0x0, 0x0, 0x300000000000506) 14:34:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000b0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:53 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xeffdffff, 0x0, 0x0, 0x300000000000506) 14:34:53 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x380a0000, 0x0, 0x0, 0x300000000000506) [ 3294.151815][T20021] __nla_validate_parse: 5 callbacks suppressed [ 3294.151830][T20021] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3294.167376][T20021] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3294.177656][T20022] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3294.187028][T20022] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3294.196373][T20022] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3294.207072][T20020] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3294.217015][T20020] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000c0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000000a0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3294.293656][T20024] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3294.303118][T20024] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3294.312444][T20024] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000000b0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000000c0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3294.336598][T20028] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3294.346215][T20028] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3294.356259][T20026] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3294.365602][T20026] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:34:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3294.451108][T20034] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3294.461143][T20034] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:58 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xeffdffff, 0x0, 0x0, 0x300000000000506) 14:34:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000d0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000000d0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:34:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:34:58 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xf4010000, 0x0, 0x0, 0x300000000000506) 14:34:58 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x390a0000, 0x0, 0x0, 0x300000000000506) 14:34:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000e0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3299.141027][T20044] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3299.150744][T20044] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3299.159573][T20042] __nla_validate_parse: 8 callbacks suppressed [ 3299.159586][T20042] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3299.175191][T20042] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000f0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:34:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3299.184707][T20042] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3299.201152][T20050] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3299.210555][T20050] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:34:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000000e0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3299.245399][T20053] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3299.248570][T20054] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3299.254802][T20053] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3299.264345][T20054] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:34:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000000f0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3299.296329][T20056] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3299.305738][T20056] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3299.315082][T20056] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3299.397547][T20060] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3299.407208][T20060] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:05 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xeffdffff, 0x0, 0x0, 0x300000000000506) 14:35:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000100000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000100000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:05 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xfeffffff, 0x0, 0x0, 0x300000000000506) 14:35:05 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3a0a0000, 0x0, 0x0, 0x300000000000506) [ 3306.234573][T20072] __nla_validate_parse: 3 callbacks suppressed [ 3306.234589][T20072] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3306.250188][T20072] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3306.259554][T20072] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3306.271616][T20073] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:35:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000110000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000110000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3306.281014][T20073] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3306.301931][T20071] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3306.311737][T20071] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3306.359771][T20077] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3306.369137][T20077] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3306.395017][T20078] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000120000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000017220000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000250000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3306.404455][T20078] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3306.413164][T20080] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3306.413773][T20078] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3306.423281][T20080] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:11 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xab0c, 0x0, 0x0, 0x300000000000506) 14:35:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000120000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000480000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:11 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xfffffdef, 0x0, 0x0, 0x300000000000506) 14:35:11 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3b0a0000, 0x0, 0x0, 0x300000000000506) [ 3312.509768][T20094] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3312.514028][T20097] __nla_validate_parse: 6 callbacks suppressed [ 3312.514043][T20097] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3312.519432][T20094] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3312.525596][T20097] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000004c0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3312.552757][T20097] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3312.565143][T20100] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3312.574605][T20100] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:35:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000001c0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3312.638341][T20104] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3312.647803][T20104] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3312.658698][T20103] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3312.668394][T20103] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000600000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000058650000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3312.699234][T20106] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3312.708565][T20106] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3312.717959][T20106] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3312.776630][T20110] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3312.786274][T20110] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:16 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xab0c, 0x0, 0x0, 0x300000000000506) 14:35:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000250000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000680000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:16 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xffffff91, 0x0, 0x0, 0x300000000000506) 14:35:16 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3c000000, 0x0, 0x0, 0x300000000000506) [ 3317.515115][T20123] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3317.524830][T20123] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3317.536673][T20127] __nla_validate_parse: 6 callbacks suppressed [ 3317.536689][T20127] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3317.552211][T20127] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000006c0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000280000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3317.561581][T20127] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3317.591237][T20129] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3317.600658][T20129] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3317.619314][T20131] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3317.628652][T20131] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3317.637998][T20131] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000480000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000740000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3317.672739][T20133] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3317.682427][T20133] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3317.719491][T20137] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3317.729075][T20137] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3317.802021][T20139] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3317.811680][T20139] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:23 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xab0c, 0x0, 0x0, 0x300000000000506) 14:35:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000007a0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000018480000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:23 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xffffffd7, 0x0, 0x0, 0x300000000000506) 14:35:23 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x3e0a0000, 0x0, 0x0, 0x300000000000506) 14:35:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3324.631221][T20147] __nla_validate_parse: 3 callbacks suppressed [ 3324.631235][T20147] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3324.636363][T20149] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3324.637509][T20147] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3324.646833][T20149] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000810000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3324.674326][T20150] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3324.683806][T20150] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3324.693214][T20150] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3324.721776][T20154] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3324.731411][T20154] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3324.755190][T20156] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:35:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000004c0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3324.764569][T20156] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3324.801726][T20159] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3324.803072][T20160] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3324.811086][T20159] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3324.820613][T20160] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3324.829909][T20159] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000ffffff810000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000047880000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:28 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x4001, 0x0, 0x0, 0x300000000000506) 14:35:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000600000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000048880000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:28 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xfffffffe, 0x0, 0x0, 0x300000000000506) 14:35:28 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x40010000, 0x0, 0x0, 0x300000000000506) [ 3329.669502][T20171] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3329.676956][T20175] __nla_validate_parse: 4 callbacks suppressed [ 3329.676970][T20175] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3329.679101][T20171] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3329.703053][T20175] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:35:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000ffffa8880000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3329.714060][T20177] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3329.723503][T20177] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3329.732805][T20177] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000058650000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000ffffff9e0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3329.766274][T20180] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3329.775753][T20180] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3329.781601][T20182] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3329.794656][T20182] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000680000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3329.838476][T20184] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3329.847904][T20184] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3329.870238][T20186] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3329.917968][T20188] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3329.927600][T20188] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:33 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x4001, 0x0, 0x0, 0x300000000000506) 14:35:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000006c0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000020af0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:33 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x2, 0x0, 0x300000000000506) 14:35:33 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x41020000, 0x0, 0x0, 0x300000000000506) [ 3334.726569][T20204] __nla_validate_parse: 5 callbacks suppressed [ 3334.726583][T20204] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3334.742195][T20204] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3334.751518][T20204] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3334.761289][T20199] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:35:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000020b00000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000002700000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3334.770729][T20199] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3334.781147][T20201] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3334.790757][T20201] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3334.821828][T20207] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3334.831235][T20207] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3334.849525][T20209] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3334.859003][T20209] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000ffffffea0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000ffffffef0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3334.868300][T20209] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000740000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3334.916503][T20211] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3334.926150][T20211] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:40 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x4001, 0x0, 0x0, 0x300000000000506) 14:35:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000fffffff00000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000000000007a0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:40 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x3, 0x0, 0x300000000000506) 14:35:40 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x57c0048e, 0x0, 0x0, 0x300000000000506) [ 3340.986245][T20224] __nla_validate_parse: 7 callbacks suppressed [ 3340.986335][T20224] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3340.996506][T20229] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3341.001960][T20224] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3341.011514][T20229] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3341.030250][T20227] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3341.039610][T20227] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3341.048937][T20227] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000810000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000fffffffe0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3341.108563][T20232] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3341.118065][T20232] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3341.127407][T20232] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000088a8ffff0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffff810000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000007fffffff0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3341.150552][T20235] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3341.160741][T20235] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3341.184925][T20237] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3341.194535][T20237] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:46 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x4000, 0x0, 0x0, 0x300000000000506) 14:35:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000047880000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000081ffffff0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:46 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x58000000, 0x0, 0x0, 0x300000000000506) 14:35:46 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x4, 0x0, 0x300000000000506) [ 3347.252857][T20254] __nla_validate_parse: 7 callbacks suppressed [ 3347.252872][T20254] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3347.268577][T20254] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3347.277911][T20256] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3347.287523][T20256] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000009effffff0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000048880000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3347.296970][T20256] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3347.314208][T20257] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3347.323910][T20257] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3347.355463][T20259] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3347.364850][T20259] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3347.381183][T20263] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3347.381264][T20262] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3347.390588][T20263] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3347.400497][T20262] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3347.409840][T20263] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000eaffffff0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000efffffff0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000f0ffffff0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:52 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc, 0x0, 0x0, 0x300000000000506) 14:35:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000feffffff0000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffa8880000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:52 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x6, 0x0, 0x300000000000506) 14:35:52 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x60090000, 0x0, 0x0, 0x300000000000506) [ 3353.489058][T20277] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3353.495857][T20281] __nla_validate_parse: 6 callbacks suppressed [ 3353.495872][T20281] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3353.498639][T20277] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3353.504930][T20281] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:35:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000003400000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3353.507043][T20282] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3353.541535][T20282] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3353.550908][T20282] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000100005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3353.615645][T20288] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3353.625025][T20288] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3353.636531][T20287] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3353.646217][T20287] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffff9e0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:35:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000002"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3353.705764][T20290] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3353.715403][T20290] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3353.726383][T20292] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3353.736258][T20292] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3353.776457][T20294] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3353.814613][T20296] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3353.824229][T20296] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:57 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc, 0x0, 0x0, 0x300000000000506) 14:35:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000200005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:35:57 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x7, 0x0, 0x300000000000506) 14:35:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000003"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:57 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x650b0000, 0x0, 0x0, 0x300000000000506) 14:35:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffffea0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3358.557504][T20306] __nla_validate_parse: 2 callbacks suppressed [ 3358.557521][T20306] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3358.557809][T20305] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3358.563767][T20306] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3358.573033][T20305] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000004"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3358.600450][T20306] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffffef0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3358.629134][T20308] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3358.638493][T20308] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3358.657098][T20311] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3358.657218][T20312] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000005"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3358.666718][T20311] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3358.684547][T20312] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3358.693927][T20312] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:35:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000006"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:35:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000fffffff00000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3358.751228][T20314] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3358.760873][T20314] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:35:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000300005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3358.827878][T20318] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3358.837308][T20318] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3358.850302][T20316] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3358.859952][T20316] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:36:02 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xc, 0x0, 0x0, 0x300000000000506) 14:36:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000400005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000fffffffe0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000007"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:02 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x8, 0x0, 0x300000000000506) 14:36:02 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x69090000, 0x0, 0x0, 0x300000000000506) [ 3363.592596][T20329] __nla_validate_parse: 3 callbacks suppressed [ 3363.592610][T20329] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3363.597964][T20331] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3363.598827][T20329] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3363.608101][T20331] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3363.617698][T20329] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3363.647771][T20333] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3363.657139][T20333] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000500005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000008"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3363.755718][T20336] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3363.765164][T20336] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000000007fffffff0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000600005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3363.797098][T20338] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3363.806715][T20338] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3363.825732][T20340] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3363.835169][T20340] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:36:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000700005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000009"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3363.844487][T20340] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3363.932149][T20346] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3363.941868][T20346] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:36:07 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa, 0x0, 0x0, 0x300000000000506) 14:36:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000800005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000ffffffff0000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000000a"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:07 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xa, 0x0, 0x300000000000506) 14:36:07 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x7f000000, 0x0, 0x0, 0x300000000000506) 14:36:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000020000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000030000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000000b"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000900005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3368.567441][T20358] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3368.577073][T20358] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:36:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000000c"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3368.626921][T20365] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3368.636540][T20365] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3368.642959][T20368] __nla_validate_parse: 12 callbacks suppressed [ 3368.643006][T20368] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3368.660709][T20368] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3368.670897][T20367] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3368.680337][T20367] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3368.689699][T20367] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:36:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000a00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3368.721808][T20370] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3368.731521][T20370] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3368.789406][T20372] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3368.798788][T20372] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:12 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa, 0x0, 0x0, 0x300000000000506) 14:36:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000000d"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000040000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000b00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:12 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xc, 0x0, 0x300000000000506) 14:36:12 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x800c0000, 0x0, 0x0, 0x300000000000506) 14:36:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000c00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3373.527523][T20383] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3373.533795][T20386] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3373.537125][T20383] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3373.546449][T20386] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3373.564214][T20386] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:36:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000d00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000000e"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000e00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000050000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3373.669505][T20393] __nla_validate_parse: 6 callbacks suppressed [ 3373.669522][T20393] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3373.685102][T20393] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3373.700396][T20395] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3373.710032][T20395] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:36:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000000f00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3373.730609][T20397] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3373.740001][T20397] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3373.749325][T20397] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3373.777234][T20399] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3373.786818][T20399] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:17 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa, 0x0, 0x0, 0x300000000000506) 14:36:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000000f"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000001000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000060000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:17 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xe, 0x0, 0x300000000000506) 14:36:17 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x8e04c057, 0x0, 0x0, 0x300000000000506) 14:36:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000010"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000070000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000001100005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3378.551036][T20407] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3378.560692][T20407] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3378.572247][T20410] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3378.581659][T20410] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3378.590987][T20410] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:36:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000001200005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000080000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000011"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3378.657241][T20417] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3378.666865][T20417] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3378.704548][T20424] __nla_validate_parse: 10 callbacks suppressed [ 3378.704587][T20424] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3378.711549][T20425] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3378.720646][T20424] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3378.730247][T20425] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:36:22 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x8e04c057, 0x0, 0x0, 0x300000000000506) 14:36:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000090000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000172200005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000012"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:22 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xf, 0x0, 0x300000000000506) 14:36:22 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x91ffffff, 0x0, 0x0, 0x300000000000506) 14:36:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000002500005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3383.513212][T20436] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3383.522787][T20436] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3383.532201][T20436] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3383.542456][T20437] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3383.551832][T20437] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000a0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3383.577493][T20440] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3383.587328][T20440] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3383.616520][T20442] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000025"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3383.626053][T20442] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3383.637777][T20444] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:36:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000b0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3383.686533][T20446] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3383.696185][T20446] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3383.722086][T20448] __nla_validate_parse: 2 callbacks suppressed 14:36:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000048"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000004800005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3383.722101][T20448] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3383.737669][T20448] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3383.747296][T20448] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3383.770123][T20450] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3383.779837][T20450] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3383.791897][T20452] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3383.802191][T20452] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:27 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x8e04c057, 0x0, 0x0, 0x300000000000506) 14:36:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000004c"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000004c00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:27 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x12, 0x0, 0x300000000000506) 14:36:27 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa2090000, 0x0, 0x0, 0x300000000000506) 14:36:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000c0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000d0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3388.570794][T20464] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3388.580155][T20464] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3388.589483][T20464] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3388.598986][T20466] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3388.608307][T20466] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:27 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x13, 0x0, 0x300000000000506) 14:36:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000e0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000006000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3388.631152][T20462] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3388.640835][T20462] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:36:27 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x18, 0x0, 0x300000000000506) 14:36:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000000f0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:32 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x8e04c057, 0x0, 0x0, 0x300000000000506) 14:36:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000586500005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000100000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000050"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:32 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x1e, 0x0, 0x300000000000506) 14:36:32 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa90c0000, 0x0, 0x0, 0x300000000000506) 14:36:32 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x24, 0x0, 0x300000000000506) [ 3393.589175][T20491] __nla_validate_parse: 11 callbacks suppressed [ 3393.589266][T20491] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3393.605496][T20491] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3393.614811][T20491] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3393.624318][T20492] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000110000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000006800005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000060"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:32 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x2a, 0x0, 0x300000000000506) [ 3393.633950][T20492] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3393.652374][T20489] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3393.662025][T20489] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3393.686233][T20498] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3393.695618][T20498] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3393.704984][T20498] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3393.717010][T20502] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3393.727368][T20502] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:36:32 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x30, 0x0, 0x300000000000506) [ 3393.740482][T20503] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3393.749864][T20503] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:38 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x800c0000, 0x0, 0x0, 0x300000000000506) 14:36:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000006c00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000120000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000068"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:38 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x36, 0x0, 0x300000000000506) 14:36:38 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa93c0000, 0x0, 0x0, 0x300000000000506) [ 3399.815751][T20517] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3399.825422][T20517] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3399.836376][T20519] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3399.845786][T20519] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3399.855105][T20519] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:36:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000006c"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000001c0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3399.865410][T20520] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3399.874818][T20520] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3399.894927][T20523] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3399.904567][T20523] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:36:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000074"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:39 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x3c, 0x0, 0x300000000000506) [ 3399.920734][T20525] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3399.930176][T20525] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3399.939504][T20525] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:36:39 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x58, 0x0, 0x300000000000506) 14:36:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000007400005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3399.965686][T20527] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3399.975585][T20527] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3400.036454][T20532] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3400.046242][T20532] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:43 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x800c0000, 0x0, 0x0, 0x300000000000506) 14:36:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000007a"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000250000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:43 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x140, 0x0, 0x300000000000506) 14:36:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000007a00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:43 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xa9b6ffff, 0x0, 0x0, 0x300000000000506) 14:36:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000280000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000008100005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:43 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x1f4, 0x0, 0x300000000000506) 14:36:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a000000000000000000007c"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3404.783169][T20540] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3404.792792][T20540] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:36:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000ffffff8100005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3404.844734][T20551] __nla_validate_parse: 7 callbacks suppressed [ 3404.844747][T20551] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3404.860291][T20551] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3404.869596][T20551] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3404.879223][T20554] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000478800005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3404.888628][T20554] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3404.901704][T20557] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3404.911364][T20557] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3404.939992][T20559] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3404.949470][T20559] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:48 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x800c0000, 0x0, 0x0, 0x300000000000506) 14:36:48 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x20c, 0x0, 0x300000000000506) 14:36:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000480000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000488800005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:48 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xab0c0000, 0x0, 0x0, 0x300000000000506) 14:36:48 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x218, 0x0, 0x300000000000506) [ 3409.839101][T20569] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3409.847150][T20572] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3409.848416][T20569] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3409.848429][T20569] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3409.876804][T20572] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:36:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000004c0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3409.887576][T20571] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3409.897126][T20571] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3409.921986][T20577] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:36:49 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x241, 0x0, 0x300000000000506) 14:36:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000ffffa88800005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000000000fb"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3409.931575][T20577] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3409.940903][T20577] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:36:49 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x300, 0x0, 0x300000000000506) [ 3410.003001][T20582] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3410.009951][T20583] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3410.012420][T20582] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3410.021971][T20583] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:36:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000488800005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:55 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x3e8, 0x0, 0x300000000000506) 14:36:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000ffffff9e00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:36:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000600000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:36:55 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xd7ff0000, 0x0, 0x0, 0x300000000000506) 14:36:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000000000a0"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3416.205455][T20599] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3416.214898][T20599] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3416.224217][T20599] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3416.234385][T20592] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3416.236453][T20597] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:55 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x600, 0x0, 0x300000000000506) 14:36:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000680000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:36:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000020af00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3416.243986][T20592] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3416.260021][T20601] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3416.261786][T20597] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3416.271334][T20601] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:36:55 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x700, 0x0, 0x300000000000506) 14:36:55 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x9a3, 0x0, 0x300000000000506) [ 3416.329651][T20604] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3416.339073][T20604] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3416.348453][T20604] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3416.381764][T20611] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3416.391203][T20611] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:37:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000488800005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000006c0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000000020b000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:01 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x9e0, 0x0, 0x300000000000506) 14:37:01 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xd7ffffff, 0x0, 0x0, 0x300000000000506) [ 3422.437202][T20621] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3422.438130][T20623] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3422.446854][T20621] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3422.456158][T20623] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3422.477268][T20624] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000ffffffea00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:01 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x9e2, 0x0, 0x300000000000506) 14:37:01 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x9eb, 0x0, 0x300000000000506) 14:37:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000ffffffef00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3422.486626][T20624] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3422.496076][T20624] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3422.506058][T20627] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3422.515435][T20627] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:37:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:01 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x9ec, 0x0, 0x300000000000506) [ 3422.581688][T20633] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3422.591097][T20633] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3422.606830][T20635] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3422.616543][T20635] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:37:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000fffffff000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:07 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe00c0000, 0x0, 0x0, 0x300000000000506) 14:37:07 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xa00, 0x0, 0x300000000000506) 14:37:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000740000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000000000488800005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000000000b4"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000007a0000000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3428.667806][T20649] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3428.677253][T20649] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3428.686576][T20649] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3428.696110][T20650] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3428.705475][T20650] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:37:07 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xa1c, 0x0, 0x300000000000506) 14:37:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000700200000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000fffffffe00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3428.720263][T20648] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3428.725289][T20653] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3428.729863][T20648] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3428.739240][T20653] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3428.756999][T20653] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000000007fffffff00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:07 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xb65, 0x0, 0x300000000000506) [ 3428.802534][T20658] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3428.811976][T20658] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:14 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x7, 0x0, 0x0, 0x300000000000506) 14:37:14 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xb82, 0x0, 0x300000000000506) 14:37:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="7000000030000100000000000000ffffffff00005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000000000ff"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000300000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:14 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe02e0000, 0x0, 0x0, 0x300000000000506) [ 3434.900463][T20666] __nla_validate_parse: 5 callbacks suppressed [ 3434.900477][T20666] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3434.916079][T20666] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 14:37:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000001f0400000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000200000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3434.948028][T20674] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3434.948763][T20675] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3434.957402][T20674] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3434.957417][T20674] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3434.985602][T20675] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:37:14 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xc00, 0x0, 0x300000000000506) 14:37:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3435.016211][T20680] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3435.025652][T20680] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3435.035582][T20680] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3435.054549][T20682] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:37:14 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xc02, 0x0, 0x300000000000506) 14:37:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000500000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3435.063972][T20682] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3435.072457][T20686] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3435.083102][T20686] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:37:21 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x7, 0x0, 0x0, 0x300000000000506) 14:37:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:21 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xca9, 0x0, 0x300000000000506) 14:37:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000300000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000001f0500000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:21 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe10c0000, 0x0, 0x0, 0x300000000000506) [ 3441.992308][T20696] __nla_validate_parse: 3 callbacks suppressed [ 3441.992324][T20696] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3442.001571][T20701] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3442.008006][T20696] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3442.008023][T20696] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:21 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xe00, 0x0, 0x300000000000506) 14:37:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000400000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3442.017594][T20701] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3442.045673][T20700] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3442.055114][T20700] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:37:21 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xf00, 0x0, 0x300000000000506) 14:37:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000600000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3442.115506][T20707] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3442.124905][T20707] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3442.144771][T20711] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3442.154528][T20711] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:37:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000500000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3442.160953][T20713] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3442.172383][T20713] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3442.181701][T20713] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:26 executing program 5: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x7, 0x0, 0x0, 0x300000000000506) 14:37:26 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x1200, 0x0, 0x300000000000506) 14:37:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000600000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000003000010000001f0600000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:26 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe60c0000, 0x0, 0x0, 0x300000000000506) 14:37:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3447.036196][T20727] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3447.045861][T20727] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3447.055288][T20728] __nla_validate_parse: 2 callbacks suppressed [ 3447.055342][T20728] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3447.070990][T20728] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:37:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000700000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3447.082935][T20729] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3447.087445][T20731] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3447.092382][T20729] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3447.102695][T20731] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3447.120534][T20729] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:26 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x1300, 0x0, 0x300000000000506) 14:37:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000700000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3447.157477][T20735] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3447.167194][T20735] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3447.171810][T20738] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3447.185036][T20738] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3447.203147][T20741] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3447.212608][T20741] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3447.215474][T20743] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3447.222025][T20741] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3447.231587][T20743] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:37:31 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2, 0x0, 0x0, 0x300000000000506) 14:37:31 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x1800, 0x0, 0x300000000000506) 14:37:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000900000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:31 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe70c0000, 0x0, 0x0, 0x300000000000506) 14:37:31 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x1802, 0x0, 0x300000000000506) [ 3452.077790][T20755] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3452.081946][T20758] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3452.087481][T20755] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3452.098055][T20758] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3452.116632][T20756] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000900000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000a00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3452.126076][T20756] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3452.135484][T20756] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:31 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x1c0a, 0x0, 0x300000000000506) 14:37:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000050"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3452.171732][T20762] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3452.181220][T20762] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:37:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000a00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3452.220463][T20767] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3452.229841][T20767] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3452.239230][T20767] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3452.264945][T20768] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3452.274579][T20768] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:37:38 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2, 0x0, 0x0, 0x300000000000506) 14:37:38 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x1e00, 0x0, 0x300000000000506) 14:37:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000b00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000b00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000051"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:38 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xe8030000, 0x0, 0x0, 0x300000000000506) 14:37:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000c00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:38 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x2000, 0x0, 0x300000000000506) [ 3459.210482][T20783] __nla_validate_parse: 2 callbacks suppressed [ 3459.210496][T20783] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3459.226131][T20783] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3459.235511][T20779] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3459.244949][T20779] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000c00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3459.254270][T20779] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3459.279140][T20787] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3459.288892][T20787] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:37:38 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x2400, 0x0, 0x300000000000506) 14:37:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000d00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000d00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3459.306992][T20790] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3459.316486][T20790] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3459.325827][T20790] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3459.339000][T20781] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3459.348792][T20781] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:37:43 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x2, 0x0, 0x0, 0x300000000000506) 14:37:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000e00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:43 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x2a00, 0x0, 0x300000000000506) 14:37:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000e00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:43 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xeffdffff, 0x0, 0x0, 0x300000000000506) [ 3464.232298][T20803] __nla_validate_parse: 5 callbacks suppressed [ 3464.232333][T20803] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3464.235835][T20805] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3464.238528][T20803] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3464.238544][T20803] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:43 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x2ee0, 0x0, 0x300000000000506) 14:37:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000f00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3464.247847][T20805] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3464.285338][T20806] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3464.288526][T20809] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3464.294748][T20806] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3464.304255][T20809] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:37:43 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x3000, 0x0, 0x300000000000506) 14:37:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000000f00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3464.372289][T20815] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3464.381804][T20815] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3464.422260][T20819] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3464.431792][T20819] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3464.441213][T20819] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3464.457166][T20821] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3464.466791][T20821] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:37:51 executing program 5: socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000040)=@isdn={0x22, 0x7, 0x3f, 0x1, 0x6}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="b7575bada6e19e266f0ebd12c413034f55f0703d51735d3251c036808043139174c0754ba2f5c3842ac490b6af93d4d09b62363832bdddb9db969a32ddccb54fe299f40adc52574160788e082ff22934181999bd6be76ea4f1925e12df07add52592bc25655f2ee10a43714daa90c132bf8b7a0037bf00fa2f2bb6f7fd8cddddf72423de5c66f47b1ce4a507405e36a2a3dd48a45f9d45c76bd639c7a0b4214cadf36ba703e7e7c608fce679283f500fde751620cbf467f8e52eaed03c1f21dc7746d80676ef5e1badfd346d3e25007d", 0xd0}, {&(0x7f00000001c0)="dc8504066f331c78dea377af986eac14e05a1352e62e9557163eff4e3717a2fb24d29a17495c0f1f840e940c32b33c69f86485", 0x33}, {&(0x7f0000000200)="477a429fa0732eadc0e8549c21d61dd68678282292a0124656fb16c2fa5159ffdb03b4a5e59c86570f2713088e59a48c86148f465c30c0bfe18d93a236c74b63e32f9f13550d02c085eb9680cbd6ac6e3ec667ce393eeea529a125090b3aad691c2d249a520a8fc716a54684bfca3343baf2bc0f3496d77ccb45c64efb4b16e64e08941febeaa778850706ae6384fb0568470dcc20", 0x95}, {&(0x7f00000002c0)="9ea40d2425f628e6d54be01f1f21f81fca7e9895ae6a83c02db57a5ea63814711d710d3a631a6dbc69dc11162a35dd7e540ba1430ec3e3a708d1eae1b70dbcf212e80e4050ea56357f87720fe17a06c149637ceed8d65157acb313fef250e773db636e503517925c4e479cd2e5b1b80749063858131248925744baf60c858ab4e212c4b081ef215d77b04899792d8bb31ea3dbb392f62598ffc87e134d1b71d9bf3def10b26a02c96a09060f54e14f0a16c21d65a779290b11dea398c325c55a1c3292771ef146ba2c508b7ad18893df1567f398663d8b6d9f9cad67ade37e503c62483b48", 0xe5}, {&(0x7f00000003c0)="d471a150e4043139b30477832bb527ac8081e560d53acc416c90e35905a4e47493707600f65450097f5c0ff592cae8bb45e72ae8ccf5468bdbefe3f7c38f75c7327b600a1fd9f89fec1da8cd3b5d49987261d99ef3082c01a1326808388adfc84c0f12481859b1993ab648ac8517562c6e462826302d27f92cf16764d59fde4e3d26dc524e012e5d8afc2f62b72efdc00a1e84bcf3c128fee04f7d27b72ec046c7c583dff7898f64e7bf98c8b7f0223dd65654bf49129c37c8fefdef057824bbf016077e62853214d4e3108928fbc712e9ef189b1b87958c730f26a3402a0f7086547e430bf1d2864370cfb34d3cc8cc3355731d1ae4cf", 0xf7}, {&(0x7f00000004c0)="29ede9c03d677153429303343b8e774f6ad695edcf7b0b64b8fe80a4c412c646a6ae4a77180adc1f953a6ed8", 0x2c}], 0x6}, 0x40000) socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeef, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640), 0x640200, 0x0) sendmsg$nl_route(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=@ipv6_newaddr={0x64, 0x14, 0x200, 0x70bd2c, 0x25dfdbfc, {0xa, 0x18, 0x4d}, [@IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @mcast1}, @IFA_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x21}}, @IFA_CACHEINFO={0x14, 0x6, {0x9, 0x380, 0x8, 0x9}}, @IFA_RT_PRIORITY={0x8, 0x9, 0x10000}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x20008080) 14:37:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:51 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x3600, 0x0, 0x300000000000506) 14:37:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:51 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xf4010000, 0x0, 0x0, 0x300000000000506) 14:37:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001100000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001100000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:51 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x3c00, 0x0, 0x300000000000506) [ 3472.741398][T20831] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3472.750777][T20831] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3472.760772][T20835] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3472.770230][T20835] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3472.779558][T20835] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:51 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x4000, 0x0, 0x300000000000506) [ 3472.799350][T20833] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3472.809001][T20833] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3472.839177][T20840] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:37:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001200000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001200000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3472.848515][T20840] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3472.869667][T20844] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3472.879087][T20844] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3472.888386][T20844] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3472.907317][T20848] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3472.916996][T20848] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:37:58 executing program 5: socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000040)=@isdn={0x22, 0x7, 0x3f, 0x1, 0x6}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="b7575bada6e19e266f0ebd12c413034f55f0703d51735d3251c036808043139174c0754ba2f5c3842ac490b6af93d4d09b62363832bdddb9db969a32ddccb54fe299f40adc52574160788e082ff22934181999bd6be76ea4f1925e12df07add52592bc25655f2ee10a43714daa90c132bf8b7a0037bf00fa2f2bb6f7fd8cddddf72423de5c66f47b1ce4a507405e36a2a3dd48a45f9d45c76bd639c7a0b4214cadf36ba703e7e7c608fce679283f500fde751620cbf467f8e52eaed03c1f21dc7746d80676ef5e1badfd346d3e25007d", 0xd0}, {&(0x7f00000001c0)="dc8504066f331c78dea377af986eac14e05a1352e62e9557163eff4e3717a2fb24d29a17495c0f1f840e940c32b33c69f86485", 0x33}, {&(0x7f0000000200)="477a429fa0732eadc0e8549c21d61dd68678282292a0124656fb16c2fa5159ffdb03b4a5e59c86570f2713088e59a48c86148f465c30c0bfe18d93a236c74b63e32f9f13550d02c085eb9680cbd6ac6e3ec667ce393eeea529a125090b3aad691c2d249a520a8fc716a54684bfca3343baf2bc0f3496d77ccb45c64efb4b16e64e08941febeaa778850706ae6384fb0568470dcc20", 0x95}, {&(0x7f00000002c0)="9ea40d2425f628e6d54be01f1f21f81fca7e9895ae6a83c02db57a5ea63814711d710d3a631a6dbc69dc11162a35dd7e540ba1430ec3e3a708d1eae1b70dbcf212e80e4050ea56357f87720fe17a06c149637ceed8d65157acb313fef250e773db636e503517925c4e479cd2e5b1b80749063858131248925744baf60c858ab4e212c4b081ef215d77b04899792d8bb31ea3dbb392f62598ffc87e134d1b71d9bf3def10b26a02c96a09060f54e14f0a16c21d65a779290b11dea398c325c55a1c3292771ef146ba2c508b7ad18893df1567f398663d8b6d9f9cad67ade37e503c62483b48", 0xe5}, {&(0x7f00000003c0)="d471a150e4043139b30477832bb527ac8081e560d53acc416c90e35905a4e47493707600f65450097f5c0ff592cae8bb45e72ae8ccf5468bdbefe3f7c38f75c7327b600a1fd9f89fec1da8cd3b5d49987261d99ef3082c01a1326808388adfc84c0f12481859b1993ab648ac8517562c6e462826302d27f92cf16764d59fde4e3d26dc524e012e5d8afc2f62b72efdc00a1e84bcf3c128fee04f7d27b72ec046c7c583dff7898f64e7bf98c8b7f0223dd65654bf49129c37c8fefdef057824bbf016077e62853214d4e3108928fbc712e9ef189b1b87958c730f26a3402a0f7086547e430bf1d2864370cfb34d3cc8cc3355731d1ae4cf", 0xf7}, {&(0x7f00000004c0)="29ede9c03d677153429303343b8e774f6ad695edcf7b0b64b8fe80a4c412c646a6ae4a77180adc1f953a6ed8", 0x2c}], 0x6}, 0x40000) socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeef, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640), 0x640200, 0x0) sendmsg$nl_route(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=@ipv6_newaddr={0x64, 0x14, 0x200, 0x70bd2c, 0x25dfdbfc, {0xa, 0x18, 0x4d}, [@IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @mcast1}, @IFA_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x21}}, @IFA_CACHEINFO={0x14, 0x6, {0x9, 0x380, 0x8, 0x9}}, @IFA_RT_PRIORITY={0x8, 0x9, 0x10000}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x20008080) socket$unix(0x1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) (async) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000040)=@isdn={0x22, 0x7, 0x3f, 0x1, 0x6}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="b7575bada6e19e266f0ebd12c413034f55f0703d51735d3251c036808043139174c0754ba2f5c3842ac490b6af93d4d09b62363832bdddb9db969a32ddccb54fe299f40adc52574160788e082ff22934181999bd6be76ea4f1925e12df07add52592bc25655f2ee10a43714daa90c132bf8b7a0037bf00fa2f2bb6f7fd8cddddf72423de5c66f47b1ce4a507405e36a2a3dd48a45f9d45c76bd639c7a0b4214cadf36ba703e7e7c608fce679283f500fde751620cbf467f8e52eaed03c1f21dc7746d80676ef5e1badfd346d3e25007d", 0xd0}, {&(0x7f00000001c0)="dc8504066f331c78dea377af986eac14e05a1352e62e9557163eff4e3717a2fb24d29a17495c0f1f840e940c32b33c69f86485", 0x33}, {&(0x7f0000000200)="477a429fa0732eadc0e8549c21d61dd68678282292a0124656fb16c2fa5159ffdb03b4a5e59c86570f2713088e59a48c86148f465c30c0bfe18d93a236c74b63e32f9f13550d02c085eb9680cbd6ac6e3ec667ce393eeea529a125090b3aad691c2d249a520a8fc716a54684bfca3343baf2bc0f3496d77ccb45c64efb4b16e64e08941febeaa778850706ae6384fb0568470dcc20", 0x95}, {&(0x7f00000002c0)="9ea40d2425f628e6d54be01f1f21f81fca7e9895ae6a83c02db57a5ea63814711d710d3a631a6dbc69dc11162a35dd7e540ba1430ec3e3a708d1eae1b70dbcf212e80e4050ea56357f87720fe17a06c149637ceed8d65157acb313fef250e773db636e503517925c4e479cd2e5b1b80749063858131248925744baf60c858ab4e212c4b081ef215d77b04899792d8bb31ea3dbb392f62598ffc87e134d1b71d9bf3def10b26a02c96a09060f54e14f0a16c21d65a779290b11dea398c325c55a1c3292771ef146ba2c508b7ad18893df1567f398663d8b6d9f9cad67ade37e503c62483b48", 0xe5}, {&(0x7f00000003c0)="d471a150e4043139b30477832bb527ac8081e560d53acc416c90e35905a4e47493707600f65450097f5c0ff592cae8bb45e72ae8ccf5468bdbefe3f7c38f75c7327b600a1fd9f89fec1da8cd3b5d49987261d99ef3082c01a1326808388adfc84c0f12481859b1993ab648ac8517562c6e462826302d27f92cf16764d59fde4e3d26dc524e012e5d8afc2f62b72efdc00a1e84bcf3c128fee04f7d27b72ec046c7c583dff7898f64e7bf98c8b7f0223dd65654bf49129c37c8fefdef057824bbf016077e62853214d4e3108928fbc712e9ef189b1b87958c730f26a3402a0f7086547e430bf1d2864370cfb34d3cc8cc3355731d1ae4cf", 0xf7}, {&(0x7f00000004c0)="29ede9c03d677153429303343b8e774f6ad695edcf7b0b64b8fe80a4c412c646a6ae4a77180adc1f953a6ed8", 0x2c}], 0x6}, 0x40000) (async) socket$can_bcm(0x1d, 0x2, 0x2) (async) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeef, 0x8031, 0xffffffffffffffff, 0x0) (async) timer_settime(0x0, 0x0, 0x0, 0x0) (async) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640), 0x640200, 0x0) (async) sendmsg$nl_route(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=@ipv6_newaddr={0x64, 0x14, 0x200, 0x70bd2c, 0x25dfdbfc, {0xa, 0x18, 0x4d}, [@IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @mcast1}, @IFA_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x21}}, @IFA_CACHEINFO={0x14, 0x6, {0x9, 0x380, 0x8, 0x9}}, @IFA_RT_PRIORITY={0x8, 0x9, 0x10000}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x20008080) (async) 14:37:58 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x4001, 0x0, 0x300000000000506) 14:37:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000002500000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:37:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000481800000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:58 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xfa090000, 0x0, 0x0, 0x300000000000506) 14:37:58 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x4102, 0x0, 0x300000000000506) [ 3479.905232][T20856] __nla_validate_parse: 2 callbacks suppressed [ 3479.905246][T20856] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3479.920899][T20856] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3479.930420][T20858] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3479.939802][T20858] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 14:37:59 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x5800, 0x0, 0x300000000000506) 14:37:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3479.949135][T20858] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3479.960499][T20860] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3479.970107][T20860] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:37:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:37:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000001c00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:37:59 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x650b, 0x0, 0x300000000000506) [ 3480.039233][T20867] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3480.048569][T20867] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3480.058021][T20871] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3480.067464][T20871] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3480.076791][T20871] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3480.092487][T20873] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3480.102160][T20873] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:38:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00"/13}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:38:06 executing program 5: socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000040)=@isdn={0x22, 0x7, 0x3f, 0x1, 0x6}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="b7575bada6e19e266f0ebd12c413034f55f0703d51735d3251c036808043139174c0754ba2f5c3842ac490b6af93d4d09b62363832bdddb9db969a32ddccb54fe299f40adc52574160788e082ff22934181999bd6be76ea4f1925e12df07add52592bc25655f2ee10a43714daa90c132bf8b7a0037bf00fa2f2bb6f7fd8cddddf72423de5c66f47b1ce4a507405e36a2a3dd48a45f9d45c76bd639c7a0b4214cadf36ba703e7e7c608fce679283f500fde751620cbf467f8e52eaed03c1f21dc7746d80676ef5e1badfd346d3e25007d", 0xd0}, {&(0x7f00000001c0)="dc8504066f331c78dea377af986eac14e05a1352e62e9557163eff4e3717a2fb24d29a17495c0f1f840e940c32b33c69f86485", 0x33}, {&(0x7f0000000200)="477a429fa0732eadc0e8549c21d61dd68678282292a0124656fb16c2fa5159ffdb03b4a5e59c86570f2713088e59a48c86148f465c30c0bfe18d93a236c74b63e32f9f13550d02c085eb9680cbd6ac6e3ec667ce393eeea529a125090b3aad691c2d249a520a8fc716a54684bfca3343baf2bc0f3496d77ccb45c64efb4b16e64e08941febeaa778850706ae6384fb0568470dcc20", 0x95}, {&(0x7f00000002c0)="9ea40d2425f628e6d54be01f1f21f81fca7e9895ae6a83c02db57a5ea63814711d710d3a631a6dbc69dc11162a35dd7e540ba1430ec3e3a708d1eae1b70dbcf212e80e4050ea56357f87720fe17a06c149637ceed8d65157acb313fef250e773db636e503517925c4e479cd2e5b1b80749063858131248925744baf60c858ab4e212c4b081ef215d77b04899792d8bb31ea3dbb392f62598ffc87e134d1b71d9bf3def10b26a02c96a09060f54e14f0a16c21d65a779290b11dea398c325c55a1c3292771ef146ba2c508b7ad18893df1567f398663d8b6d9f9cad67ade37e503c62483b48", 0xe5}, {&(0x7f00000003c0)="d471a150e4043139b30477832bb527ac8081e560d53acc416c90e35905a4e47493707600f65450097f5c0ff592cae8bb45e72ae8ccf5468bdbefe3f7c38f75c7327b600a1fd9f89fec1da8cd3b5d49987261d99ef3082c01a1326808388adfc84c0f12481859b1993ab648ac8517562c6e462826302d27f92cf16764d59fde4e3d26dc524e012e5d8afc2f62b72efdc00a1e84bcf3c128fee04f7d27b72ec046c7c583dff7898f64e7bf98c8b7f0223dd65654bf49129c37c8fefdef057824bbf016077e62853214d4e3108928fbc712e9ef189b1b87958c730f26a3402a0f7086547e430bf1d2864370cfb34d3cc8cc3355731d1ae4cf", 0xf7}, {&(0x7f00000004c0)="29ede9c03d677153429303343b8e774f6ad695edcf7b0b64b8fe80a4c412c646a6ae4a77180adc1f953a6ed8", 0x2c}], 0x6}, 0x40000) (async) socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeef, 0x8031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) (async, rerun: 32) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640), 0x640200, 0x0) (rerun: 32) sendmsg$nl_route(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=@ipv6_newaddr={0x64, 0x14, 0x200, 0x70bd2c, 0x25dfdbfc, {0xa, 0x18, 0x4d}, [@IFA_TARGET_NETNSID={0x8}, @IFA_ADDRESS={0x14, 0x1, @mcast1}, @IFA_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x21}}, @IFA_CACHEINFO={0x14, 0x6, {0x9, 0x380, 0x8, 0x9}}, @IFA_RT_PRIORITY={0x8, 0x9, 0x10000}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x20008080) 14:38:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000004c00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:38:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000041f00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:38:06 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x7e97, 0x0, 0x300000000000506) 14:38:06 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xfb090000, 0x0, 0x0, 0x300000000000506) [ 3487.111296][T20886] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3487.121013][T20886] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3487.131837][T20885] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3487.141230][T20885] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3487.150638][T20885] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000011"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:38:06 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x7f00, 0x0, 0x300000000000506) 14:38:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000051f00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3487.159981][T20884] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3487.169359][T20884] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:38:06 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x820b, 0x0, 0x300000000000506) 14:38:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000006000000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3487.208635][T20893] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3487.217121][T20894] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3487.218215][T20893] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3487.227541][T20894] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3487.227557][T20894] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:06 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x977e, 0x0, 0x300000000000506) 14:38:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000061f00000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3487.280711][T20899] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3487.290163][T20899] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3487.395740][T20888] ================================================================== [ 3487.403858][T20888] BUG: KCSAN: data-race in tcp_done / tcp_poll [ 3487.410035][T20888] [ 3487.412366][T20888] write to 0xffff88812d3a226c of 1 bytes by interrupt on cpu 1: [ 3487.420000][T20888] tcp_done+0x2ca/0x360 [ 3487.424166][T20888] tcp_reset+0xc6/0x1b0 [ 3487.428331][T20888] tcp_rcv_synsent_state_process+0x817/0xf50 [ 3487.434342][T20888] tcp_rcv_state_process+0x1a6/0x1030 [ 3487.439731][T20888] tcp_v4_do_rcv+0x457/0x5e0 [ 3487.444338][T20888] tcp_v4_rcv+0x18e6/0x1b40 [ 3487.448856][T20888] ip_protocol_deliver_rcu+0x380/0x710 [ 3487.454327][T20888] ip_local_deliver_finish+0x134/0x1a0 [ 3487.459795][T20888] ip_local_deliver+0x100/0x1b0 [ 3487.464662][T20888] ip_rcv+0x1b1/0x260 [ 3487.468731][T20888] __netif_receive_skb+0x8b/0x1b0 [ 3487.473772][T20888] process_backlog+0x23f/0x3b0 [ 3487.478543][T20888] __napi_poll+0x65/0x390 [ 3487.482882][T20888] net_rx_action+0x37e/0x730 [ 3487.487486][T20888] __do_softirq+0xf2/0x2c7 [ 3487.491924][T20888] do_softirq+0xb1/0xf0 [ 3487.496096][T20888] __local_bh_enable_ip+0x6f/0x80 [ 3487.501141][T20888] local_bh_enable+0x1b/0x20 [ 3487.505749][T20888] ip_finish_output2+0x754/0x850 [ 3487.510704][T20888] ip_finish_output+0xf3/0x250 [ 3487.515489][T20888] ip_output+0xf3/0x1a0 [ 3487.519661][T20888] __ip_queue_xmit+0xa2e/0xa50 [ 3487.524491][T20888] ip_queue_xmit+0x34/0x40 [ 3487.528920][T20888] __tcp_transmit_skb+0x1242/0x1730 [ 3487.534160][T20888] __tcp_send_ack+0x1dc/0x2e0 [ 3487.538860][T20888] tcp_send_ack+0x23/0x30 [ 3487.543208][T20888] tcp_rcv_synsent_state_process+0xec3/0xf50 [ 3487.549207][T20888] tcp_rcv_state_process+0x1a6/0x1030 [ 3487.554593][T20888] tcp_v4_do_rcv+0x457/0x5e0 [ 3487.559203][T20888] __release_sock+0xf2/0x270 [ 3487.563810][T20888] release_sock+0x40/0x110 [ 3487.568238][T20888] inet_stream_connect+0x58/0x70 [ 3487.573184][T20888] rds_tcp_conn_path_connect+0x360/0x430 [ 3487.578834][T20888] rds_connect_worker+0x125/0x1a0 [ 3487.583876][T20888] process_one_work+0x3d3/0x720 [ 3487.588740][T20888] worker_thread+0x618/0xa70 [ 3487.593344][T20888] kthread+0x1a9/0x1e0 [ 3487.597423][T20888] ret_from_fork+0x1f/0x30 [ 3487.601849][T20888] [ 3487.604174][T20888] read to 0xffff88812d3a226c of 1 bytes by task 20888 on cpu 0: [ 3487.611806][T20888] tcp_poll+0xf7/0x560 [ 3487.615889][T20888] sock_poll+0x23e/0x260 [ 3487.620142][T20888] __io_arm_poll_handler+0x200/0xc80 [ 3487.625440][T20888] io_arm_poll_handler+0x43f/0x570 [ 3487.630567][T20888] io_queue_async+0x81/0x490 [ 3487.635195][T20888] io_submit_sqe+0x6fe/0xa50 [ 3487.639802][T20888] io_submit_sqes+0x274/0x550 [ 3487.644488][T20888] __se_sys_io_uring_enter+0x1ef/0xc40 [ 3487.649960][T20888] __x64_sys_io_uring_enter+0x74/0x80 [ 3487.655343][T20888] do_syscall_64+0x2b/0x70 [ 3487.659771][T20888] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3487.665681][T20888] [ 3487.668002][T20888] value changed: 0x00 -> 0x03 [ 3487.672677][T20888] [ 3487.674995][T20888] Reported by Kernel Concurrency Sanitizer on: [ 3487.681178][T20888] CPU: 0 PID: 20888 Comm: syz-executor.2 Not tainted 6.2.0-rc5-syzkaller-00047-g7c46948a6e9c-dirty #0 [ 3487.692122][T20888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 3487.702185][T20888] ================================================================== 14:38:12 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xa309, 0x0, 0x300000000000506) 14:38:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000006800000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:38:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000002500000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) 14:38:12 executing program 5: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xfb090000, 0x0, 0x0, 0x300000000000506) 14:38:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a0000000000000000000011"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) 14:38:12 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xfeffffff, 0x0, 0x0, 0x300000000000506) 14:38:12 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xa90c, 0x0, 0x300000000000506) [ 3493.546998][T20914] __nla_validate_parse: 3 callbacks suppressed [ 3493.547013][T20914] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3493.562679][T20914] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3493.574944][T20918] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3493.584641][T20918] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received 14:38:12 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xd7ff, 0x0, 0x300000000000506) 14:38:12 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0xffffb6a9, 0x0, 0x0, 0x300000000000506) 14:38:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000006c00000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) 14:38:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(0xffffffffffffffff) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000800)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2a3ff2", 0x54, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xf, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x14, 0xf989, "6abfe60001000000000000a1158377fe"}, @mss={0x3, 0x3, 0x68}, @exp_fastopen={0xfe, 0x11, 0xf989, "8f0a00000000000000000000fe"}, @mptcp=@add_addr={0x1e, 0xa, 0x0, 0xa, 0x0, @private}]}}}}}}}}, 0x0) [ 3493.593307][T20916] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3493.602764][T20916] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3493.612078][T20916] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:12 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x186, &(0x7f00000002c0), &(0x7f0000148000/0x1000)=nil, &(0x7f00005f1000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f00000000c0)=0x307e, 0x0, 0x4) r3 = socket$inet(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000200)=@in={0x2, 0x0, @empty}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0xe009, 0x0, 0x300000000000506) 14:38:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000002800000000000000005c000100580001000b00010073616d706c6500002c0002"], 0x70}}, 0x0) [ 3493.663949][T20927] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3493.673568][T20927] TCP: tcp_parse_options: Illegal window scaling value 104 > 14 received [ 3493.684619][T20930] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3493.694007][T20930] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.1'. 14:38:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000300001000000007400000000000000005c000100580001000b00010073616d706c65"], 0x70}}, 0x0) [ 3493.712180][T20931] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3493.721691][T20931] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3493.731009][T20931] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'.