479bfcef701a7359708e8ee736366c78e105304eaf6e33908f97418f8f93434b375032be68abeac555ce2769501857d650235160dbbe44684917566397d06960ec04df8afe9b37c7a25bc3cff7d234aa8ca9044e2b93f2622c8364aef4ab87deb34554693c9168a34b853f72c77c3b0a7dfcb33d690caff923296046b29f53fb43e6aed9e72f1e696cdd49a426badc9d81e24793e8dd0ae4619d57995330cd20833609bb81c43bfc9b8d81b14e62477aa398990b67ddb3c3936e9a0360c212876e506750c217ca777e365efbfcc885b28fe9263e34f11bea04e91a24258fde04277251db5192bd436ee9988cdea737c17b87384cd200126fdc5bd0827af4bb3a804e20217f210a323ed4fa91cab9430277c9ee50ba9d57af9155257841badd00fda1b93654562f5dc84e0b2ae2d10fd09325009b671f32c742a7092fbad4e9309bcc7f627257514a3c943411f7aa0ba18946bc64103ee0195ba251df5dc895377a2ab677830d5fb9cc86d6b3f0bb58d6cbd15c6f6cda3e765c1af708a038c3842bd7943fcd526a2f8a12c45a3302558c7b938716b73ba8d1dd0bb8b9e3c2efb7ed420d534d9adef45079a25cfb487386a56a62bc55182b0df4599cdbdf7796a7d0f9651077c039a5e6dcedcff0696a3a9d4ae2424bbbd439937f8ff4da5d0223f9695a52e50f2f74ec1729c59c7d216f20df37a032b17b909af19ba77f9e5064a10d6e5d33b4516518ee6989c84c0262d11a7ebbce89ac4267643f7a4a8122351ea1e669fbce5eae6f552ac33cd5ef023ce3b1d7ebe3eb3f0add4a84e6909be1ee53f30b34187ce59daef5fdc3de79a312805f38a4b59a1471180f20e27a6e434d86263c7e839860a7da899815ba41763cba6955d5b6addf511e066647340690370e8fb51b479f843473844720f80f23a78d386ffe11cab346e0765c2a9c6341815b2e85a1ff034b3da0dba08c186d7c60e18038e7400cfb77c518a6f8832736dc09c39f5dbdcb668333dc54480a7214949436de2d17c96ccf5723a05f4464ae114c24c9616a253116dd13a6bfb6fa9406310d333feff3811233b08cf6599da4953a9ac9646eae071e2cb2da19c718f3fd4a18d62af777f4c3b2e1da4bdac370c3486b30c398f11a78c6603c42d043a21e44d01b6b07b86397798950530ada06849ecf036aa9374a18935a192c1e5217791690c51b468849317e2160f28f0909e132b1ce69bef7d8e97ba9c9ea358cd61d3bd6e0c9d63329b5cd52cb42f2cb3f17f5f0cdbc0504762d6c48f9474704a9c53799f6c45e1ed22b4da33f1c1a28aae026ffaab74f5bf7477b026e06364dfc984dbf3ec492185eed9f802979215fe7972769134646f9c9825e7909625159e308286920699c2417817a4c7c9d1b9eadfc38d3f4308747437f83a156a2b4c0d041a852ec050a3c023ccf96f779af7ed7d613844ace0ee4540ab490abc579e0430ef7f6ffe18f6ca260bb088251b06ee9fd625a8096649d6ed1b172d233b61560cba58aa6fca7d29499f8bb3a8955044d1b68a7b52a8a7c947ab13f25cd747a0ae5cc3ef1c4d639d24bb44ad9b77c730314e773d4897cab9137aaf7f9ad04f1da146fee804805f15f4d28f5f45b0c6aab77f3a5d2bf1884927ed0909fa122050822c9cdeca1a7341f4367e12f99d338f2fdb842ce1f4133bc81114b770d95bd4b3b3f6fa4605153dd0f46abf4e864799b82be8a3dc25cf2b039772795e3ba978c92007d3ec9e4265ad788b4c03d68e180e197dd84780910689b05c16d74ac3f463b24a8c215fb3a8e33f5efdbf315f6523b703e04eb085579a30870131fd71bdfb9665c7b9acb0a6c19136b992eecb0cc5cd29744adacf5ffd63d1f409cd3c5038e244077a85fc16cb5f551d226986436acf07eec0121d8e971adaf6ae173e91a7e18abd7a51e1b9ed83b3e358f6b291f458085a36062ed580f0e9e6490c070704d3dbd9ecbf1617f44297533c46085b5128f90b22949206a25ad5538d4aebe88e0580f00da677c1c1c0830e39a8b388996e1dd3885e8f15cb2ad811d4dfbfab2199e8d5e14978a752ab2823e06069fae7dfd0dc953582a4d48b910862a653a86d769af54040586a88d8c427a98bef9bf8292ce3943de6a43b710820c174202a6b88b9ea1d296eb4bb63e34dd87ad472f7d2adf601171e281f93663e61231028eafeaaef296f35743092331e9446fbeb2f7127992c294948cca921ccdea88dfb8e4b60300d0d1b4877a12b9bc5c2b81b13c5228710effa340e0675bf486e778b5deffdc73f64d2415a908a5190a504bcf2e026379e69962165378d703bf6fae38173c707722dd054e030780e014ffba6de2a7ce440359503320c70bb8f9d9d1416aad369d59fbddba62d0d7de9dd8ebd9e1980d399b570bf6cd4b2dfe6814861e45d5e3921ebfbb3d010d773889c0ff1f998d7306cab038c22012ac2f42f7e0b40e6c7d45df54b767764ebd7b929500b27a7d3c5e6c88a805891e1be39c9db71c89407f7fd087edadbba8401bef4035005f0b59ade306437c6cf1b5427344e8826edcdf4fb1754ef1c8952b4c5a8bdc954d2a28715f89b390ba20c91593ebfc50b374514386e8ef7c058f525a36cc09b150c24a7b19f14a5f9d3b802e589b61bce5d5143e6c397de746d0434f0a8d39a4261d04c78c5bb6c72e292bb4e0263005258a8dfe44e0f58b39bf0205f0602bfb0aae812e1428cceb7b22482dc3ea033882231f76a3d4b61638729922415e007e31d98947bf22d54f68024bb94276e369e29d6fb247a6e5e4220b80ad599123cbaedb794404fc07ba3b9f6217f90a314c4d472c3ef83c2f8ceba556709fc8bd0343af2e969effcedd04cb77922a511df10a897e16c5e894b40dba01b66ed5175e0e6688f558c1d4a04b3cb59e07da024eaeec596e457d8b6e2eef3fbb4912e3667f6c963297dbc297aae92b55b19502a3feec7e2c76d632312d0c9b51c48d9b7ee381bda511e13ca69c978b69ac4972c23cff741d02054cf08dc20907cbafbaeee7c54525a05ebb771daac655801d0bd99ed51f9bbae39ecffa50026024aed93717af1d4082d96db02d468cec8ec02910b10dbf520fd8b036fe24dea44945ab3f8abaa42e665725a68d84672009ca03ef7e1e5d8f84d3488e580d1b56198e36117c5607564bb9cd395d090f300d07c93b081f42ac111a3a1ab1cc8f8707a36823f40b9b2f98586f4053e75e405a611a17a07a4c78926cba21bddc9a057b062b0f9917b3096dd1ef620f2ba879caf4e35d33f20897b5140ed5adc2754f5f06e99bdc11e3141e7e3fab80cb1e72a339d6f1d2fcb265875f4338d66864cdfac2478d113b4aeaa51edbbb4f48e037ff8baa24cf52f18e2d0f9ef84eeca36ab9e159d1cd869d67235571b9e243148c4ca42219bbb704f6aaff40841c48f710d16ca24903b7466f257e7458e0c365a64c110f8cab78e2a4396255733f7fa0b3b8888189d2fb78d9534a384d627e43273fbb0281149ef90057e43e6c76c0d361ad437e2a0c72d5d9eb4baa66a773c20b7c49836b9bfa444c473134f6e85f0f0fa03902c3d9894d66c4edf5b54d09ea43611aebfa5713723ef45e7e97b2ed09afae6adf5bf139b1fbab67bc1223f995ec8c6e701d9d08ca0ab043b6116d8fc8f20afeb09228ad361d93ccde4a751fda7e49905326e2f850eb503e0b2b40d74bae4b603d1aa0f1934165462c47f45dfa8f1f18c352169f4210d349d2e965510f4f0d06d9b88b48585a5ff1afea35047aab34cc3ff8be26e4e2d4aeb3909921fe6d9f301aa17651f9acd26d86fb7d37aea8b5e400913571e3cd4557af91558c153a33e79fe31e691e04956608e20acae95cfd2b5abe7947188ade904ac61f7b861ed6ea99fa5659c4995f136b5c174d26637ea92d0d0f1c1e90bd8a0ba4b6b9e3e6ba5570ab0ab94ad725a4f1524d654b8dcfd949b3c198eb4d4f7514f3ea1bae33990c4a66b4fb31e88619f4fc2c2a1d1379a24a5d6a5ec946dee3f6041f4f5fbf7ac27fec63a45f05b48d8d031a7ccfd609c429b8a17b495727ddd79016f496e221b1b447327e17f943bf8e5f02af27960f5587ed94ed7a25be1f67da249e6375954a285c69d9a8afe2b2bbd2051dcada33f0641daa93e00d7e6ed75dacaa43c9b21e580c1a914b0361144a346ba794a1976631ed9e38b780fc15966d53d205997afd7121cc805c88ec2112feda45c404b5ee1c5f460fe74b04246e57cebe25a33e46fd284516be3bd0404a3d0923f7d2b2f8f455b15b506f989fa777a50e6df7c020f220c4558b441f31d2fc682c503007b9e22c23ed6d84397b2830d1fe28f41651532cbf4a623e9777c287623d42edfeab9d6f05adfb99ccc4867bbd0f8bba66e7dc46c04038a482895a9d87d14adbf90e2e1be6b7f09646f9747562198c701f0c880341eed21e352d93249a014807fd0dac0b5ab4bd1c47b257414c1c4ec5f0eea1891746e9159d7a219bd3ca7aefd40557c55523d468f398c42961de1fc5c8f4829cbae0a183ca4ca95c7d87189d6a05454af47b8c9b316c3f9b1ba755d001c480e2df217a2cc7185d8abb5e6114b23e4f97b11e912fd2bf0a784fd994d11b9f96a7a79e6a474cb40e935c49695a6f6e4fab4f39f982da93e0e35ef7819702cdaa7aa7ab0822cd2f9b24bf43b713ebd0c23792a812c09bbec338888d569417a7acf08541e1f2fa426d32fbcb4b261f710fcc73d7d530ded23dd1f2f84c19c89895e3b8da475aad28109dc8d3630a6383f4eb62eee0e62e9e2e11576bc8052169b928d5318f164b385bb1eaada75c4968b0599c2d3c21935a117d304844e114476451068c9d43364cbe836b593fc8784b3c1bd7d09dc809838e40db2379e5b253e1cb69a43998e670abee9631b41989e2bd34080447c951a1ecc04114693a4f2e4c77b91c64c04acfcb423a334d652599b215c04947383c3ef282292ed3f65eda8ab96169be73e28e810f860aa3d8d18fad413b97abe8a61411bb3da0131b78c76a6a4c8a3d5aa714c84c9af3a918fd44bb38a36f2bf438638cfef6b4ed32116cf29eb7ff310ee1aebd9d8e4c821c722406f3007c8cf62758aa3be1116e797d0c9954d32203b581290f36f5facb0f12ccfe474f1939dffa54afb5ac26db232b65b4b930ee22f018018a863da79bdfc", 0x1000}], 0x9, &(0x7f00000086c0)=[{0xa8, 0x1, 0x8, "db003a1cdadac857fa40e5bc39955d173ba8326338ca1a66a0ef2166a07bcc87b82f71396a054820c5c0075104164110622260f62f3d07fd8735a4a70825ae61e0812a1d31611e5ff22ea227cf6f4c686c1991c6637fb39972c7638bc82a201076e89093e43d712c95cb96ed4a26ddac64c940ea7fbb69fefdd45c2b21cb6a7f2ed95c06ccd541c6831dd1b66255f608f424"}, {0x110, 0x117, 0xc9, "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"}, {0xb8, 0x109, 0x8cdd, "9603e8238ea273155f9449f93f7d3b155b8321f181757215e2869fb1a561d6bcd01924efbbd081aebff2d496a07463d4369edcbe119969855e4954226f462bc275bf311bea751d7908f1287f5eaf51e5b646a7c747013e6954c33f68c55469252a07d7c88c86f95a0bde77e6f04879bfe5cf8b53a8786677496cdd8025c2b4b3eb053a51e2dcf3705bfbbca69d4787e16371831edf6b82a192cdcdf4e70d32e4d1ea538f5a3101dc"}, {0xa8, 0x11d, 0x7, "20bccd46d7d1c97c1461f807822a52ba88c2c89f549f6d244165b323a23c11bb1aca8537434e1e60b9c4efb2f0ac2ec7936c0dbf9397d916bb5f543de87610418c69d60c674c57c3589bb1e9ef69d61de98e15ab001b887d4f45231b3f70c023f899763207fa9d05768e0a1429608260cd564ab65d949def9daf7abe01dd9b83a31e952d887b95349a19bd4619378c95e5b2"}, {0x98, 0x88, 0x1000, "aee42a305a29825828e0d3a125008711167fa58b4c1d7ed85f5ad28aa29ae65a6109ca479ffeb8d434cd6b32cf07f4b65a882d4bbbfc1f2355c5375b09128d029782250134ca55104d27cf3506c3ba48515cc8190e759e2f11d1a7a26afd481ed0bf9ff4c09476bd13166488d9907cd5fd600af9704c80e1ebbca10ca9d98bfa2c87"}], 0x3b0, 0x840}, 0x80) r2 = socket$inet(0x2, 0x80000, 0xa4de) sendmsg(r2, &(0x7f0000000480)={&(0x7f0000000280)=@vsock={0x28, 0x0, 0x2711, @any=0xffffffff}, 0xfffffe8e, &(0x7f0000000440), 0x52, 0x0, 0x0, 0x1ffffffffffffc}, 0x1) sendmsg(r2, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:12 executing program 6: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4040, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000040)=0x1) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000000c0)=""/35) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0xd49) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000100)) r1 = socket$inet(0x2, 0x1, 0xfffffffffffffffd) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x28) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0xc40, 0x8, 0x4, 0x1, r3}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000380)={0x40, 0x121, 0x8, 0x51, 0x3, 0x7ff, 0x7, 0xfffffffffffffffe, r4}, &(0x7f00000003c0)=0x20) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000400)="73dd51ebc35ea76806b69c2e50277e3b73f6897ba6bb9ba74832613c810cde073c4caabfb85dce43a412072ef5b4e55c20977c4929b8876d17eb21be14ec8fc61ac398fc3dffb374af06f1ad2cfb32d1565d301c502bef201dfda00ed253ed820c3a11186929ce70e58f939115509f5f5018f3b52903d142eb2c219363b196c3342eada883c5427a2a1df6d68bb8290fd5a8523f5364") setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000004c0)='tls\x00', 0x4) sendmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000500)=@sco={0x1f, {0xf409, 0x2, 0x0, 0x9, 0x400, 0xe6a5}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000580)="85ca4d99afb91dff847271721e96520f0effa01bcb11a0826b2d1e5d8ff1a72d7faa22fd8ebf1ce9ca9be5b6586801f07cd283cc8f537d27f130", 0x3a}, {&(0x7f00000005c0)="54997a80ba8a30d00e661b84", 0xc}, {&(0x7f0000000600)="6d615960ef9383adfb98c5cbbe5ba79e896d751aed46d7f3b475c7662b590e8b02302c354ca3d12a0a7ef88c50705d8c936299375fdc6d9fcefc997ed6a2fb69c08c3fc0bdc20cc4faa87a179dc8d0f18620fbafbdbd68c8c82db3938bc1e380f9751e8e5f951c2dd3bb8af54ef8503a0c72434eb4dfd64d23ff1c9435fcac1473d9a058fc65850e9dd171706d62dc56bed95679316e74689b71946bea6c87", 0x9f}, {&(0x7f00000006c0)}, {&(0x7f0000000700)="d01d919706acf1119ace07ed211ecc26f1812786be4305fc567840429dd7b8ddd15b019217c079", 0x27}, {&(0x7f0000000740)="ddad7523bfc73a5962734a2042", 0xd}, {&(0x7f0000000780)="88473d5b4801665b5ce8fe4975227e475d9d9c4ded5482d902b7764d68951b6d00668f71843159819842343d83b536a491b989bb7ced582c132328c70eaa351e5305b5fa1e06ebb3d9e8a3647eae8ecdbc0c305e94428bf9a0b4fbbacfee76cf2a6ad5aa50b87b486abe60786c78646f76d0c1655a112893f65ceb123343351c71a0186f8c8d2e692e11f93f75a6cf69ff3d4a79404f3d1a30968e8ad01330dc2171972108c27a8a2f6f73f4c3ddea1ae02c323aacc8e888a649aa9281416f28cfa089b20745dff7531a40", 0xcb}, {&(0x7f0000000880)="551e7dcf7c02d5b021a12cb763afa6e7a60c412a8e8331f0f360b85213158b375506392a0320c307df52e3fac7318c4a40d04fc05f1c01dad2c2633c79536c37a87d3dae9d0e65ae9b3e3b5467282d60dd1a10d57852e6e5d3b7f3fbed2cbf50fcc82b6d5d80adf5952c9558d3c7ff8b1c65f0c2903efc2cef0cee7f23312867297646bed670e3197c95dd5a06674e867c3d4ee9a5d7cc434b9bf3fb9031ce3e9b7dc94d525b05055d0c14c2ea79eba93c86cb8afb8060d2bb6a88838ae0990dcb0801dacc48b6f9", 0xc8}, {&(0x7f0000000980)='HW', 0x2}, {&(0x7f00000009c0)="ecf3ea6d3594594cd67b717b7266d367b9954f0bbc2c92cf23b46b5cb2e90bdc12c2bf7668f082279bfa3808a84568566f8c2abc87c598717b3927418fb411830909f509b108906083cf2640308c4c80dc7aa331018f22debe3d6236af6d32ea63af37719b6f27b03537e07faadf604d402a1cb240bc223b72c0b3283b94abedbc08a93ce8281b246197f5c30e59e6ff2fda51eeb5dfdd657405b2f9a9752273eb0255f91ea3ad9f1d84ae73fdf15965dec0043472cd6f0661bcf3296551f26d526ad1f4ff8dfb31b9e57fd7f2c6594fdd7004c39aec86f2c520c6259daa71dd9a635a097e2fdcc3", 0xe8}], 0xa, &(0x7f0000000b80)=[{0xc0, 0x1ff, 0x26, "52ee4442ea5c0690c767bde4addb30fbd9669b82b72a42c5b8e118066b1c27628e36a80b1f3626013c20db30b3c6704983498a262fec38b1e782ad23ccff05317a8ab2c2472d27dd07fd09689170a0ad50f8afd85f09ef5309a1d20c4171c71bd751f0ab7f53732643e781b7ed661fe026ad40995151c7a1615cfe1f6826f38af2cf819a4481e146d543b89fab7c56d5ecb61227260b652af0d58239227b72088de6d6e6921943630e5567"}, {0x20, 0x6, 0x8, "8f2422c471a6fdd692"}, {0x80, 0x10e, 0xcb4, "e0337e5766dfa55fa5fbe80fa39c9c61e05523bb2c5aef86b0ba8b1599133f6cd898d7ba208ad7302e962c8576dcb08ab97463f437781ef7b31905d0a3a7c211e3ec5a1a67a1ded3b917ba89a8327774e0e453c208e298495fe3d8d1a1cf1991fc2db3fa66ac5831ccd225d56c888207"}, {0x20, 0x0, 0x200, "f1bae7b912ba3d17ac4f89e5ca8855ba"}, {0xf8, 0x11d, 0x1, "889a44e21d0df4623b2985124e7fa8452ed46ca0fb67ace54249f852dd69d671fbf2e86db60141d4ef3d5b9506c8ae8e4af97ff93e210a1a52c10f6bf92f5f8ddadff5ab1bd82e9bc5adc0fbc369aec8f2e5088a07e8223c22224cb89e15d87ea6ef5ce2b2a4fe4bd3faa8867d8171ce126311ccd1d111170e5c31945cbaec11cc62674e37d137bec1fdf8d618311412591e6001a940f47779b3728a91803043fdc23383904b29237bcd0e67e761e591defcb7b84e779e12ad23cdd716c06c590e303e8b0cba17a464305960bb4688613175ba64a673bd27c2deb1c25251a4d88af29427db"}], 0x278, 0x4000011}, 0x2000c014) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x7ff, 0xd3]) sendmsg$inet_sctp(r0, &(0x7f0000001280)={&(0x7f0000000e80)=@in6={0xa, 0x4e20, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0xcf}, 0x1c, &(0x7f0000001200)=[{&(0x7f0000000ec0)="62252905a4da20f5457d0f9da23af3bc71ea7f6105cedf09d4ac41406b49e82150", 0x21}, {&(0x7f0000000f00)="fc69cf0dddd28ecd0b24c882a5667fcc3d3430c99f43d5b30a5a5b488009a304a50434b9a5532ff633036c9fac2ff8c8efa375fcc1e1e5ab1153b257ed5114d03fd810c1fd82758e74433661af968031f894a31c9f40f44794c2835885ce1ad8f5de3cbcf1a9033d12b46dee9522cbe5f9552608778e1b", 0x77}, {&(0x7f0000000f80)="434988838e574b2e7c9f12b9", 0xc}, {&(0x7f0000000fc0)="269aaf56b30645857c1be8a077e8e230457a4086fc939a77887d72db7b09b989c1ac5180b5d304d6a29494", 0x2b}, {&(0x7f0000001000)="648c01dadd0ad038e082a3bc018d3736ce95ecc954e9494126a1bba5a8aeca7a2d1fd20e983a166a4a164af686e417ff3ca037a24d2cb910b563e00e6d7b54c55522cb8e00578af30677af022bb08fb4a9922a66056265b97c2247d728e54f57a722b5abdbff8704ab2b79ce4be5795f9e0ce4d11bb6409e92795b816e7c7530ac8dc1e6f774d85bdd08c5ff909d32bff640db23cd1b6d0519fcbc0eff9e65eaa0f22e9067a3dffb0f6f92439ba75c9602a7cbfc2fb6ffa57a", 0xb9}, {&(0x7f00000010c0)="b9edce5de2ab4e8bb5e211ff40e93da948676b24386b895bed1a1d5b57e4b422b3051a8e6c74200263f7d16e18b1ff1b9eae2ffafa9649e3d9866fb7ffb006250809adb5d93e3d3c190cd675fc82e26cbe037925e5b61c4550527c1d7e5cad59ba7d6de746670c21f8836c8dad727f0177ec310ffcefe88479815661d948fcd99c472bbda2f2d0", 0x87}, {&(0x7f0000001180)="4652750572f4033e9c09e92dad2b2f33b676", 0x12}, {&(0x7f00000011c0)="aa675dd59884ab6b88b85e6a7dcf142691ce08edbf0ac80f47dde94ef32bb9a121eeb7f738f2f04d", 0x28}], 0x8, 0x0, 0x0, 0x10}, 0x20004001) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000012c0)={{0x1000, 0x6000, 0xf, 0x0, 0x6, 0x7, 0x1f, 0xaa3, 0x1, 0x2, 0x1, 0x8}, {0x100000, 0x5000, 0xd, 0x44f4, 0xd77f, 0x3, 0xffffffff00000001, 0x0, 0x1f, 0xfffffffffffffffc, 0xff, 0x100000000}, {0x104000, 0xd000, 0x9, 0x5, 0x6, 0x5, 0x3f, 0x8, 0x3ff, 0x4, 0x9, 0x5eb68998}, {0x107002, 0x7002, 0x9, 0x2, 0x80000000, 0xfffffffffffffffe, 0x2, 0x7fffffff, 0x80000000, 0x100, 0x1, 0x5}, {0x100000, 0x1, 0x3, 0x4f6, 0x5, 0x2, 0x1, 0x4, 0x2fc, 0xfffffffffffffffa, 0x754b, 0xfffffffffffffffa}, {0x10000, 0x1, 0xb, 0xffff, 0x66e, 0x80000001, 0x7, 0x130c, 0x2, 0x10000, 0xa2ed}, {0x6000, 0x10000, 0xe, 0x6, 0x40, 0x8001, 0xffffffff, 0x7, 0x800, 0x0, 0x9}, {0xf001, 0x4000, 0xf, 0x80000001, 0x1f731511, 0xf3e, 0xfffffffffffffffa, 0x6ebc4b04, 0x401, 0x8, 0x8, 0x4}, {0x100001, 0x15004}, {0x14000, 0x4000}, 0xa, 0x0, 0x3000, 0x20000, 0x4, 0x1000, 0x2000, [0x4, 0x6, 0x200, 0x5]}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001400)='/dev/ppp\x00', 0x400400, 0x0) getsockopt$inet6_buf(r0, 0x29, 0xcd, &(0x7f0000001440)=""/100, &(0x7f00000014c0)=0x64) r6 = shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x2000)=nil, 0x5000) shmdt(r6) write$FUSE_INIT(r0, &(0x7f0000001500)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x3, 0x10100, 0x5, 0x6443ad9a, 0xc, 0xffff}}, 0x50) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000001580)={0x2, 0x298d, 0x40, 0x9, 0x20, 0x3ff}) ioctl$TIOCSTI(r0, 0x5412, 0x16c) ioctl$VT_DISALLOCATE(r5, 0x5608) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001600)={0x0, 0x0}, &(0x7f0000001640)=0xc) sendmsg$nl_generic(r0, &(0x7f0000001880)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001840)={&(0x7f0000001680)={0x18c, 0x40, 0x300, 0xe88e, 0x25dfdbfb, {0x14}, [@typed={0x8, 0x5f, @uid=r7}, @generic="23c9b3f5c2e3e61df9c7b631f2fd031060e17c4d68cee3aec46c25032a5d05891dd04ad95cf697c1a4a5aee66bd12dede85f3569da0cbe0e12aa49409c392c0a16cb0c5c930831f51fef347d09da2aed0a3090f9eb0defc52d56bc477cff9a3188d9926c7913bb672e50c5df", @typed={0x104, 0x36, @binary="2a2c7541a6d857af75004159a02e6171e596a0a8994471b45ec5ae20737f03ea628fe417fdcf9758878f258102c1e27891e057e7e936ca519269316d76bf2c52a69df5fc82618d1ddf4831d3be2ca96e23ae532581bdca0a4fc184ea77544025ad30044840ad0caee46b2dd01009761162347d75cae5268dc21fc07e2ddcf06713ecdc4af666e5f62d754d8fb6bc437c3f72ec8d547d626c7c5310fbcd98eb259a9402461584267d64005dc2ec89ad73254ed1899f3cb81c8ba736bc3af629c9cf0f48d84fcee3fdec847d2b071c862e75c30fe95857e97f84dfe89863dd9a488127b77ea5ba5816918824144d5daa4fa8fd231feb31e8f257a0854bcfd223"}]}, 0x18c}, 0x1, 0x0, 0x0, 0xfac4b26a969da5c0}, 0x24000000) clock_getres(0x1, &(0x7f00000018c0)) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, &(0x7f0000001900)=0x9) ioctl$PIO_UNISCRNMAP(r5, 0x4b6a, &(0x7f0000001940)="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") setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002940)={r2, 0x5}, 0x8) 10:04:12 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xafd, 0x8000040000001) r1 = open(&(0x7f0000000000)='./file0\x00', 0x280100, 0x20) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000140)=0xd5ba) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000080)={0x319, 0x0, {0x1, 0x3, 0x40, 0x2, 0x100010}}) write$evdev(r0, &(0x7f00008c1fd0)=[{{}, 0x2, 0xffffffffffffffff}], 0x18) 10:04:12 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}, 0x10) 10:04:12 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x800, 0x9c74b931448f329c) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000040)) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0xfffffd8e, 0x100000020000080, &(0x7f0000000100)={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xfffffffffffffc5f) 10:04:12 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x148000}}) [ 554.031733] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 554.060894] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:12 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}, 0x10) 10:04:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4800000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000780)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000029ff6)='./control\x00', 0x0) chdir(&(0x7f00000000c0)='./control\x00') r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) rename(&(0x7f0000000080)='./control\x00', &(0x7f0000000040)='./file0\x00') 10:04:13 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x10000, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x10000) fstat(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000200), &(0x7f0000000300)=0x0, &(0x7f0000000340)) r4 = getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000400)=0xe8) sendmsg$nl_netfilter(r0, &(0x7f0000001b80)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001b40)={&(0x7f00000005c0)={0x156c, 0x4, 0xd, 0x100, 0x70bd26, 0x25dfdbfd, {0xf, 0x0, 0x2}, [@generic="79bfa45a4b1e939b34202db22cafe38c4a2df2b3536c53750f37f0e8a8930924d88568b0232d743eb7e1e158aeeab8ae91ffedee050a0d3d8634c5746d869707b9d2ce3ee2ec72d9131e6016e39437712601bf32605eff0c78ec7857b77386f8851721ac78c609630ba732db2b5437473fe424827e6daae8a6a135d503c2c99d107652435e0175a62de558a8718ff8230f1a4cdef3f251396cf6d4237326a7872b7ab9ee829b8bfc54d1535061a589b3b371d6c3c94ec83dc6ce5e8c770067d9a713c2f18e6bfe0834c2bc8b7b605f7d76cf", @generic="1c83ec5a6d3b5d8f077f2280501d674f16e8894aa487fb2c67d625aedcdefb9ec5971d1f7382e4ccf707611f06f5d21cbb2f36b3f37524fcc4eb1e9dfff6e7a96a7f4c5f23d21e5e5a7776f957ec864b2c830fd46474d95eb9d5958eae92cffc7af0ccda68cad1c28507a13ca6abee098d875d83a94f05", @nested={0x38, 0x5, [@typed={0x18, 0x41, @str='selinuxwlan0\\ppp0\x00'}, @typed={0x14, 0x8d, @ipv6}, @typed={0x8, 0x25, @ipv4=@multicast1=0xe0000001}]}, @generic="e265d9e89725f87279b884e7edf9f839f8ab6b3ed517cc2e6d69bef13584702d98243d4ec5dcdc07dd2e847cf0ee272a338d234f06bdcb5bc509aaead3d46faf90fa188f852446d95b6124fa26680e7169d33fb53a330ff77d05dcd729788beb6ee26d49c3265757b65a2d4fa673e214c6da7b657a", @nested={0x3c, 0x64, [@typed={0x8, 0x1e, @fd=r1}, @typed={0x8, 0x8d, @u32=0x8}, @typed={0x8, 0x30, @uid=r2}, @typed={0x8, 0x94, @uid=r3}, @typed={0x14, 0x69, @ipv6=@dev={0xfe, 0x80, [], 0x1b}}, @typed={0x4, 0x22}]}, @typed={0x8, 0xd, @pid=r4}, @generic="59f23f32ba250b891a735ed3abdb540d3e78cfaf7fcc68d79c4cb2865e219c36cc667a1ce764e76fe7261d59bee6e63e1beea6cbc777db97dd", @generic="2c4451fdf6635c86305ff9833c5a3ec9545e95a10b74760648d6ab542cb31265fd37f15ee23113b993320e67c2772cc57bae5f23ee97", @nested={0x116c, 0x4, [@generic="9fee95d5fb3992d8c961d5bf83301d2b7a2980d5d6d2ee9b0248760661cf42b52b8203824024416cbe260eaf972e722585767d782e6451f393c6cf1287866d28e987c55fd9d11f00b25c61218d364c913572f6c913ffe6afec56760f3620d3a2ce0c23f4895ac0", @typed={0x8, 0x7f, @str='\x00'}, @typed={0x8, 0x52, @ipv4=@multicast2=0xe0000002}, @generic="65c620089e23452d33ba74187a4adab42fbab0d0eb971f4070380d2948c24884390de3d4067d414fc9e2c769271b5030e3213e6ea321c7d66d75f744aac7a9c3cc14e8ab90d6d19db05a89c6800769b6bab6f1fb2bce3f4c26f8d2d9153074ce94e898348b914cf2ffb950d130db52494aa847fe2c899bf80cf7ffe8709e3e33334611e78f6fd80b2105aacc289686d05ee0ca5a6c662bfd07b09a9b5f37fa59ffa571c4fdfc222926987cc32d2a08bfd56dd656afd4d166d7b694d3dd07ce86aa70a3e13cd5bbc6d27c0a45967dea2ec65eeed765bc8ee220a52447e58e03eb62c19d3df514ac8967bcf18099fbf400c79895c41f551dcd9473bb25ea51dd47312c24632ea48452a1be07d4a1ecc7882bc1217056f5078acbd597536e522cc9fe20394562709e7f681d0e3c441ba204a19db8c702b8f8d039cf1a33b16326c14e7f0483655e44c1cf6c50c0f3b030abf8b5150cfad56121927c75b0ce16d8c9ef14a9312ee6f34ad6416c30adc10cc8dbd26067e40b5eb4ca9c0502578ffcef7f160fc21b13ed8368f31d1c422e8525724e35b8b357e7b3a3fe1d930254dbd8cd544326e09cc62580440ad864b4968ffb0a1ae7ca46d3cd7e534b8f282a61f91db79fe90f4207e0ce992dc09959b62daa9808dac19c8b829b88d8725ffd1dd9c39c5a286a3d85efb7df29556411092c6c3797702b9116f5ff6e1dc0c24f2677034ad8ba058b1343dc430be99810d754c5aa5a89b522374b22b3458d41c9d54e4d8a9bf29056a864ebec62cea000879fc0c734392b115df5f577532e10e7eaaf289626128810661224bbf373117b84fe29737d07ce53ec8376f8a2df7c17da967119bdb32f400395dc0794effaa9cb0783a0e495c84d276383e36bb4f2f64545d5bfa666e5265a279691062c1ea8bfe010bd85b2e4e3e95af85f37c8e4ecf2513a5afac58f84f4980e2dc59e9b6c0b968ebf506ef51fe9ed1d531e2009d9822a78943fa6791638d386ce247c6a7b73aca165b6cb72ab3a13d7cd829e5fd88dea73bb80974999a8ac8846540009e6cd7bb98df6c78e963b8da0527b898c5f6b08d2ddfb956d4dba3c8d7c324bebca0efce4d9a0878fd6f1ebf97017e9f1669681c4698b965f70e80ac72cf9db0b2cf89cad3c6200ae1e39c80a1034485ca3ecea605d05294dd89bc5b2e7f8ed2904e7b248bd5a4668a5ddfa86dfe1dec4efc3b62b4dd6abab52a58e417ecc43cc449f0558928913a836cace6a735a03412773ca27bce6470667cd8f80911fafcf95fbe7e38e86a91fdef694f6b1c5b79044690d5f1541ea1128a4b9c749202a781597ea074f66f59bf0a6871483dd93b57335fbaa38f07e54e86abf2e8a83cce115a15efdd8fc23b1d7cb02708cd17c0b666bf3c3b128d2df602ea206f5eac4cce4fdff38a97333ef314d4caaa6d95655e4be9bd0fcb4d76455bcbcd1ab2ae03d23ef6612ecc5c6db411b398fd80b5b754dc32bb383c3b0ca96b7bf842730b042a8944019cc434d33eaf28492a09f59d92905bb380864cd3d340ef1a83365995965cf5822f8cd30bb64cd9b34d0a7bb3c4f7beafc20775fd17ce9ba3e91c97aee9b43886085d78bcee39dc742870c0e0da192ed90f385196a519bb6bbcd41fa03c9c633925bf61158635dc207d4bf2f96ba44237d0aa10fb985f01a50e924d63315439380dd1c0f3efdac1bb169299c4253ab0903c40295359e85828ea872d83d817ab89b8fcdb9cc7c4beda2993e76c2275b771ea43fe14a0cff619476b8ef25ca477bb148640cb5c9ba27023dbeceb0be36375a326f02b8e3c95b79704474c2607a4d5b216ba9f64d42da0ff0cb34b9c04e67fa52933edd1414a207b45476d6e9fa65906a4e365c05a98e8d07c58f89d09208fc99648de6dc967acae7a0a83fa7a5bf482ecff36479c2ae4323bcf2f8c46da1361e8d3a7e76a15a18661b93854a4b5fc49da80736c367e32a567abbe0841d07f1ec1c36fcb6ee65f43c63173a053e4029f3f33338a319a5c7ef159e9eefb42690978543eaf4290faaffc1e9347e6c8ce1d85009b5978077fa31c7e9c6f6cb6ee05789c862e48ced997eacf5e0e258049c8dd8abcc006deff6e9acb4ffb04ba27581d6d320990bcb7ec2490e0bbe0f3f05a44d5fc040a0f513592e49348fd8a791f23375345a828271226836e348a93d86c0270af35f6adede5703fae7f85c25854ca0c091610d706492bcad495a1f4b40f6764516a817842ed83060dc42ddbd17b93d2d968aa8af8477cb927486cfcbb16fcd53be34284120a33ef58dfe4275bcfd053448203593596e04fa16e82b808efbe5697b9aaf303323c191e04976ffe3874e729ded83ec0b5b07bd6474c536d435395020ee3a810593953c4140c076498ec031684695c2d82d896e036d48d61f5dc840a7b78f5ddf51bafd38b06869ad593722859e52bf08c4abb585097f2bf4b7e357ac00abce75a58cb99773cfe9f721a743fc67b728bc38e3af7ec5e3ddfd6b932f377d5c129f3ef1e0c850e18c49a6b407e5b05bf0df3830615e77225984ad027173e07634eb9abfab898f52ad0289565da978e1f987512f407b62b0f8b452056d3cdd4eb00aa2087ed4a5d23def80d8c051150aabfae7c8562b24be8e067bc5f2f651b2aaed42457c51aabe29fe20728637888fa2b165180156084b9e9728a6fc818afa448425a2bdba644f25d2213ac37d903cb6e58899987adaaf076a31beaa78467c10f3d0eb908df67cc1d039c2202db6690468a63cd5e3e6ff09a4188124aa2af4d8e6941f8133710f7ef4ac9846b64812a7c3fbe54048840f2c0656606ee5ec827d1583808c3aa211711811eedf0d9a66a00ad8bdc6bed5b4f9dceb55dfe7160d7e18d2d6819e32ec737583af7d23608d06116027265e35ddc3649ab0699f66285622a721f65829e603b00d766456ffce10b2978fa08de293ee3bdb35235d1668d8e233052ef0c60426798a26250647a8cd7253b1143ce3e4d7e23ddf9801f20b1e052930fde503cb4f8039f0fa4d78d323cd567929c5fbe845ea262b66e5a2676ef9b45f00f9b32dd0ea37e8385e8ffa5ed640d2ec18d9b0901c4867516c94146a8f16e976da5798c6c0a75f543520f60187bf635f165dc22e319e8d815455f78aa8a79bc9d3265cbb06aa4cca44dfbe4e47ea8e356a5ef29e7ada1614e1657946cb848cc589be84f3b455c9fd5b69d98dd81c40e401ffd8e5a651610ece481c6b33a015fe067e4bfd879c1dbd257cd8e5aba141daefe6080bd13dc35735b3be6d58cb5e60d6c69f8b1c9cbc3607f125301ace5da600d755dabb9364226501ce43b63f5126135dcb8a0fe21e318b153f2411c6e284f4d3a402920db95da3635a480b643379651e702e7e9645c4495ce2ea56368a8f75075c4ffd82ab63dac3adbebe8c0202b817a8eace4183d4dec79beebf28f5da62aaabe123efa42415ad3f0501dfbfa792ea17a010f409b86676400f51586c149a98e69e42859a55a6e7cae444cd3cb40ad587c04ea324c50ae3f8a9efc1a8f2d11ec5f3e3ada7ce543f244273e9a8499ab984c5c0b59d93a41d1c5fcf651d06a039c5ef2472ff4144d879cc5ec3accedb7ec0a91f68728fc5384d84116f76f9e50687f01609c1c7e81a54bf7acb23744cff65fdb86a847aa0485a82683d0ca6e5e6f3a5e17c0aa2238a6f3ab49b5a974811486deba97372bccba2d91c73050ffcc856a77665c20548989357f6e84881b6e0471985418bddbe306a6ca9338a92af42e2d5c82fffe52b71b20591772de2b85b0a0c5c73e70163a9d35f564d2d8fe44b05e4c50465e1eb469f7d21c557e6a167d0246c4915ab6cbe7ab258b2f4fc8b76c2f9ddef8d0aaa729546388255511765e766d8327fe7ce790b983bbdf601aff21a71e6790909677152f15d4fc2a1a5ffefaf2acce5065e4f9efb8246d6c0234a49a10e27060928b988ac75b8dcf75e3800869784c734613bd9018bc123c32b9dacf147ade9c6e5bdc2f62cad39491f41c28e9b63d306a7a6699ca909018dd33e9ddfd7ce7e65e01a8f2607f403956469d9a7faab7a660bfc174757f57f5c9621f7eebf4db742bbd937d57931720c8e47c5de449323e881207e3ff837c23767bfeb19564999c1907c9ec238079361584ecefe72856506d750a2cdd3ee1e2dba0e36c5a0c0954c0331ed899ea77440ecb0d615c7e335f1f62a6bb14304494bba4669623225a7b90fc70786178c2c591bfca4418f23b4d6678d5ceb7dc311ca5973b5e5e984965aaa7b38c9253dbfaf1858dde9b3694ee8d1025f111a532a254b50e0139fcff1fbb39e549fda42ed68ab3aea5a9517df6d8069c8d905e2cc778f44d7420b31da6d1c2c201dcec7762d98b25dfb956c72f3aadd66b2b8d4a00b68e434a63b43312845cbe9dd8551529b4758035d9474622282fd795e8b24fba3cf2a59fe1afaecbe3e84c8760b04c35bda57ca175731dc7d7a085d4945ef2a57131638dce8065a0b03d6e0f80a1bac0e37cdbca483dac33909ebff060044ad78474cf4b07b7d278891468b56682e86663f027b226e14335218a50a09fda4b7700943584c7a89e97e8a8a8162998b85ff2b0160eea4bd0365ea7933b1baa11edc9bfdd26d708e09df481992ee63aaa6ca2663801158d086f9037edb8e1752cda4fa1e3ca2ed194b392f718081d77139cc8c1c754c5db47b5eba2e50ad52ce3e79df6d33c84922228adf15b0015c5a33e4dd77abaf758b19a9e727c55bdbc4c9251fb32443759f76d965fccfc4027a75460a57945f7221499077e3c66c235c1276e590f911849b7d8bdc0aa9ee17681c59dcd0b0f082e12e4efa188553372ec8eff8874912c440f8c13a3dff89f77f394999d5a5d33fbc0c02b26c7289020ca9804dd4ad9473023fa453981106fa03da12e220f4ef5bf5e43284a88ee34be88a1d8836f13b6f2656ee2b507b843a6fb146b8cf219de09d716a9e09c97a9a5bc3edbf171bb6373d7e93e2883c6bb84e03772a6afb44f2d695e030eae766dd81d860d85c2921d2ee1d892af0077a368b93b955d1340386230b41639a22c48620bdf412f57ea772046e8a25c2b567397f27597584aec2ebfef989173c002dc46d258d57925d94330be5c4241ff0ea999b73e17efc9cd8adc38747dcc40ee9172c9fc197eb6a332e641dfc2ecc83a1ae11c5bdb0d0ea8e296408fef5a4e4aed1e3dfac9eb312bc225c4f4a7a1a36541bad5c61a25583de7e3634a39fa0f0b75e978aa12ecd7ce01671e451ce9b49f8db55a7f0d851324209d524c2a1cdf79d2bf5a7a93c3c1f0ee948b422b74c1e99e70f436574524d486c4ca4d1f78999c17364c7c45df1ab0aa33aa975407f01d495466afbbb7bbc9e91fb76887ee18e3daf66c74ac31e1a77c21a5e2627bb40509463e81863547e98350641362f34f9041eeefc9dfcad1eaf8d6fa195cce4fdbb500c20e8f672e322657569580358736f09575bc35647f11f51f5de41a2aa2b64d86a374cf1d8a4b564b904e94200ae073d66406e00ba9f89f1f9fdb7b85d46e55b51f82bdd0c38c7e8a9c2d72a7f79d66fec8aa42ae39834b14befe813a5a5400904c7bc234a6287473b0536713f761119e4d37c14c699f87ef40f999f6e64f231d4dd95f8c32def0160015c3594086d54edcb8d81d162b7dd876101cd4abc0e05474f8379ed2ca1f01796ae3b3da056c8b0fe3cedbd651189650ede0ff6139040acae609a02c4eac6af3d5be1b30804e03fc7b8d0680f2fa0d19fca2090e888418979aa6bb70d75", @typed={0x14, 0x31, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @typed={0xc, 0x46, @u64=0xffffffff}, @generic="6c1e4afe4dffda409e965f971714f9df0011291b5fe3094ce040c42cbd0cce852d528ce4f5e6d50e2b8a1109e6b1cb10a81afa77a482432fda497ae493d120954035be26adfd3b6152db21cc0618450b205cb4aacc5634e89ae0e6b25597460028d9a68433abd4062414d36aae2f921f4e80de96932dff2a56622a0fac8dc65178b09e47bc063ceb5eae587c1ed196748063f65c531f5c3028b936b77f19aa7b5d6b608c1ce68556a5b2f98df2e4f3ee378ca94ffe", @typed={0x14, 0x75, @ipv6=@loopback={0x0, 0x1}}, @typed={0x8, 0x67, @u32=0x80000001}]}, @nested={0x140, 0x67, [@typed={0x8, 0x53, @u32=0xffffffffffffffa9}, @generic="147ee833b5e68ac6f7be21c9042fed4e869a7c85f5c49c9dfb3b635eebf71f6c2c983c9591a61728ed39f6741abf", @generic="de820fb45bbcafbb16d66b882e6f7d7392845792a448c94efe540dfcca6cdaa66ccfc92e6427b3307de6b87364d44e99d2906e1d425ee44c954e9207454f9672d827013b7e047f1a2036af38410d4ff00ab15b9c481af9f87911ed77b15078acd4e67b83f8f33643509717412b046a6776ecfbc70c183a9040b9bdf449a593b4ce17fc7381b92bdf0616f787afa28fa5a40abed55ff5a012d70bce98fc4bf30392baa117389913f18a0476d4513f83aba1d7a025662b691ad85757a71ce4f1e046056046a05c06e43c5d0637a00099ffd12415b0706cba889f66c6618b5427335bce6cada3132cb70f54d00442d044173699b872", @typed={0x8, 0x64, @pid=r5}, @typed={0x8, 0x80, @uid=r6}]}]}, 0x156c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) r7 = socket$inet(0x2, 0x5, 0x0) sendmsg(r7, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r7, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:13 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(arc4-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad", 0x1) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00002fefc8)={0x0, 0x0, &(0x7f0000985000), 0x0, &(0x7f0000164000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="00c099364aa453d176cd084852d881d1e38dbeb34661b1ed6f0b69f885f92b91c215c34a013b97a9f8e226229d84c6d4914ad026b6b8005d26faa574f2b93668536b5f3f2a0d590a90c88e00635be859ebe87c873026288800ad1c937270ff30262e1f03086ddb6d7fe08939c5958cb9a0045275ffce0118d7cc81db12dd37a91b463a1e28cd81d84b04a999649350415296fa2f845e905d231a1efb6c259434a61c21e78d27b54a8428aa1990c932b809cefc330444cf5724914410b9ceedc1bfa5601ea5898dc4"], 0x2) readv(r1, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/250, 0xfa}], 0x1) 10:04:13 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x69f, 0x40000) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080)={0xad}, 0x4) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000040)={0x5, 0x10000, 0x7ff, 0x5, 0x6934bf94}) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7400], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:13 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x32b000}}) 10:04:13 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x10) [ 554.216609] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:13 executing program 7: capset(&(0x7f0000594ff8)={0x19980330}, &(0x7f0000244000)) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bc\x00\x000\x00', {0x2, 0xffffffffffffffff, @multicast1=0xe0000001}}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/route\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) capset(&(0x7f0000000240)={0x0, r2}, &(0x7f0000000280)={0x0, 0x4, 0x1, 0x59, 0x2, 0x9}) io_setup(0x5, &(0x7f0000000380)=0x0) io_cancel(r3, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x3, 0xd27, r0, &(0x7f0000000440)="cb053c1a06d7a65cf00076aca97e0316ea557bbda570f4dd518269dd7c295fd5fb91b91877f9d7350bae8ceecefdc29967472ffa131bdf69ed93266f948f269ec56a0ddf96014e04e3c960cd81e56e7371ca8e395b4d89071447ad754c96e1e801dd410544bf7d2667612acd9ccef63aca3f731402df96348ac14be3d9a04efe576c2658f8a7af3704c7d351fac0b3f61e63a34fe5e28e8e8cef39516e6e12dd02f853d211e1859ccbf6362a86f9472dd17f45", 0xb3, 0x8, 0x0, 0x0, r1}, &(0x7f0000000540)) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000001c0)=0x6, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x2}}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000001680)=0x1000000, 0x4) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000003c0)={0x7, 0x8, 0xfa00, {r4, 0xc0000000}}, 0x10) r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r5) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000580)=""/4096, &(0x7f0000001580)=0x1000) getsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000001640)='lo{}cgroup\x00') getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f00000015c0)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x460, 0x7, 0x0, 0x8, 0x7, 0x1ff, 0xa90b, 0x3, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000001600)={r6, 0x10e, 0x200}, 0x8) 10:04:13 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x6, 0x0) 10:04:13 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000580)={0xffffffffffffffff}, 0x0, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000600)={0x1, 0x10, 0xfa00, {&(0x7f0000000540), r2}}, 0x18) listen(r0, 0x3) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x8) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x402, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000640)={'filter\x00'}, &(0x7f00000006c0)=0x44) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000700), &(0x7f0000000740)=0x4) recvfrom$unix(r3, &(0x7f0000000400)=""/22, 0x16, 0x0, &(0x7f0000000440)=@abs={0x1, 0x0, 0x4e22}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000240)="09333ec9094e9eb4f4a01b5cad7aa29c39741fec0d5561956c07b2205b582ddd7fe6d1b51cabae288f0d4289510fcc79474bb2bbc22dedeff97ef4931573f6bb0bf919b5378b333a80a50992b8373e42e1bd1ebf2c7199729b216f7d578b4cb53ae644275d9180c1de477dfe84ed268c77968e549ee953d8ebb7f8de686a6d3932225258b5021e4d272add3ca577a30c89aa7894018c6e4ed9e1c28a07b925d22ee841fe765b5d7a27339e0d11b73f86cf23b89cee005fc48b2e7c2a548e56a8c4b8b286948c895f37919d56693555db9f6dc5", &(0x7f0000000140)=""/134}, 0x18) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$inet_mreq(r3, 0x0, 0x27, &(0x7f00000004c0)={@multicast1=0xe0000001, @rand_addr=0x7}, 0x8) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f0000000380)) [ 554.266709] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:13 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0xb8000}}) 10:04:13 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}, 0x10) 10:04:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xe00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:13 executing program 5: r0 = socket$inet(0x2, 0x5, 0x3) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:13 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x40, 0x0) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x100) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000240)={0x1, r2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040), 0x5942a11d005b8d89) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f0000000080)={{0x0, 0x2, 0x8, 0x81, '\x00', 0x100}, 0x0, 0x0, 0x2, r4, 0x9, 0x6, 'syz1\x00', &(0x7f0000000040)=['-@\x00', 'cpuset>\x00', '-\x00', '\x00', '-:wlan1em0^\x00', '\x00', '\x00', '-:wlan1em0^\x00', 'GPL@vboxnet0}.\x00'], 0x37, [], [0x79, 0x1, 0x6, 0x7]}) 10:04:13 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x1d1000}}) 10:04:13 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000400)="636c6561725f72656673008e44d157ec4a987d82766ad131e9f29c3b42e2cd28da550d5ae011f9a009cf596531908d3918598c993a4297b032385c65464537354eef638c9694880bbab59406e4aa926f62909ff2e83201133cca3cd1e706f118dd0f4ee2edff39d362f40cf63bb2d39da8d6f47d10f1c0fd8f809474c81ee36db344ed0eb5406df65a98fc21670015d7e5b143e83d76142bb9ea7824bdd8e2a83d1c9fef12afb31b8bde865644491bae40d2e9513036d9b1ab1ae6fb0e817a01e06bf1c5aafdaf1b949a450cd46529ced14f319cff5120298dd68fa4cfc5853ca06067880579254c21f24da9fffd66bb49232919f69401aa7a23f4cbb8223d3db0ed85ca3a4688ce23073814529d517ddc38a808dab9") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000d19000)='/dev/vhost-net\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000000040)) sendfile(r0, r1, &(0x7f00000000c0), 0x1) 10:04:13 executing program 2: r0 = socket$inet(0x2, 0x805, 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000140)=0x4) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @remote}, &(0x7f0000000040)=0xc) 10:04:13 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x10) [ 554.461848] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 554.480364] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:13 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x217000}}) 10:04:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x86ddffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:13 executing program 7: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000007c0)='./file1\x00', 0xdfff, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/.il..\x00', 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x2, 0x5) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000080)=[{0x3, 0x3, 0x1000}, {0x5, 0x3, 0x1800}, {0x2, 0x10000, 0x800}, {0x3, 0x0, 0x1800}, {0x1, 0x1d}, {0x3, 0x2, 0x800}], 0x6, &(0x7f0000000240)={r1, r2+10000000}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x890f, &(0x7f0000000680)="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") mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000005, 0x6010, r3, 0x0) r4 = shmget(0x1, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) getresuid(&(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140)=0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) pread64(r3, &(0x7f00000005c0)=""/66, 0x42, 0x0) r8 = getgid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000500)=0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x10, r3, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000540)={{0x81, r5, r6, r7, r8, 0x10, 0x9}, 0x2, 0x4, 0x7, 0x40d280d5, r9, r10, 0x1a8}) unlink(&(0x7f0000000200)='./file1\x00') 10:04:13 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x0, 0x84080) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000280)={{0x1000, 0x2}, {0x6, 0x10000}, 0x9, 0x3, 0x1f}) syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xb, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000040)={0x0, 0x2, [0x0, 0x0, 0x0, 0x6a7]}) r1 = socket(0x1, 0x80a, 0x5) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x3, 0x5, 0x34b3, 0x401, 0x9615}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000001c0)={r2, 0x492}, 0x8) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x20040, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r1}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)) 10:04:13 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x10) 10:04:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffffffffff000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:13 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e20, 0x3, @loopback={0x0, 0x1}, 0x100000001}}, 0x3ff, 0x3, 0x4, 0x7, 0x20}, &(0x7f00000001c0)=0x98) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f00000004c0)=[{0x98, 0x117, 0x3, "d206024ca71fdffe2a829078053a0dfdd93689efd4ffeede4e201801c2595e5ea0f6249ef26adbc594c7f28ba6e9fe3996813bfccb3ee78d7b1a0fcf6a7299cd14221dd03664f8353afe91679655e43dea0ae7ae0679d4bdac12f3acd0b5a13324d9f0981630a61f892ecc377b4f3038672819d6057325211443b656756010b1dc7ae1aa96b8"}, {0x28, 0x0, 0x0, "197ca0721cd1f8d76e24bd6c1385e119184fbca3394c622a"}, {0x1010, 0x110, 0xfffffffffffffffc, "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"}, {0xc8, 0x116, 0x3, "1641bd27f52e74abf8a84469a71061537e27d5a45eb6895ae22b3a9b710c49b3cc7af4c953bded8f3de416eb52d3422dc0f33941b9ff673ea911c4279028d7f80dbad2e85da920c637e2f46b6842914e9c4ef4685a51b4ba39e9df64abff4c32e533385f830e3f9deb0837485ab2b138fd3392d23a53462246cbcf862426fd0f6d889a22802562a47f89c302e33e4d23568786373a7ba749b11181fc130cd4c863f7244f4d2bb9737df93460b4ccffe0fd37f78731221d10"}, {0xa8, 0x88, 0x7fffffff, "6667dcf93fa3ffa95c8af8626a7948358b051fd74db48e088a3e8fb9fd412bc0598daffed83cf41705662c5dc1cc403c70c52cf5241d8799812e8d159bd35a6ddc8bb57922f9d477863e834288149c6ce1cf14a61c655d1f65a783161443c7b20107829ab6806fcfc4d1ad20f8cf43d9766a092c1f286b67d35026fe113789caa5cf3f022636f7b39894ac812443db3f4e"}, {0xf0, 0x104, 0x3, "3a7c880ca07e7d9ba97eaa4db1e90332c8b528163da7fc6a6d257a7da490719acd9c00f7c8e073ca68bfa286d16be5aa4e3afcf39fc2fccff62633edfb1a2fe030f622308b11d78038df706ea98cfbb79ce7e8e075ed53322594c421b47f6b0732ce1f8c0ab2b7b6b55c831a6cbf1631eebeed8bb6f6864c1b41be07fd4575852bcb00ca8721e1fc86e1dfd72d7b4fda5c9d42b8d01873caf30ee9880a2b158ff1f409a989e19b9a25821a665fdad7936639417e867e31cea38d168db8bb4d12f9f535f3ac1df9806776567eb3419371285847a0428e65291946"}, {0xe0, 0x19f, 0xfffffffffffffffa, "e8743e282d0c49a973979d5dcecc0e61336f13a14d3e9490316498650002347cf72d10c7424271d43c8dfab0e245dc34250460d6874c5b0f7b7b81a30a06fab958fc625f9390e244dcfb5df43009997232a669b44af8fb0d814748b6c6881fa5efbc5e15e1678272727f937124f46c2934f319594d0d38fa04cfcd1c19d4716172c27fcd58fdd91db86acb531edcec0bfdd7a24feaf3e33c2ffe2c7625d876abafc0c047caff29b3d24f218851be5c5da3d092f0592a8e5caf240139dd20669e84678ce2bd6adfe18ed2f241a111"}, {0x108, 0x10d, 0x3, "178b2510ece60dc7e330163714464674636e7d2837221857b42ae5873d80222a269972609b1c1527f28386fedd15530702c3be32d13978c40d92c6c2af3ad6be0f6af7caab58c4da5668e818d37c18d3b97834d2e2d2492313936ee7a8e9f5eb50d1c163e44c5fcedb84cfa54c1e0930734ac57c807103e67725cec667e00943ee32e7bed5d9d97559dd6067e38da78fa68a23f6140ca1bd0fbb37dfa542bceefa8c34efa28f16a8df40ca43503f00b02ce50ac4153fde87ec3f245dca97a7b9b961933392a755caa05e74bad09d32772bf2cc3922a86dd1e2adbc61fadf5aaaf57fac9a293f943d143e3c7c54e12b4398"}, {0x108, 0xff, 0xeb1d, "59c8c71a3b5109a638262afcdfa2411b9638014f86ea2e5cac9a7211752ef69e0a34a9f9368c5860d617dcc06dde6a8bd4660f23117b8db2136c074811ac4ca0ce6b5ffadf73f1a09943a010008ef076fc7afb52f1e421a366e5760d08ad2552cb6239bf799246af7a1a124e32f11350c80e66a661c25c7fccf65e00ae69ab39c84f597825a052db101054a0e04b01b3cd360c4888fb2a9ffc74be0c270c8b262a9103cfced7fe79517a7e4ae9ab6f79ccd7b51a08b5c8179f5fba7b32d0f011becf97dbea4cd3b4400e74a216ad919dcd04d9fc3355a86db6de1f79bfe2b95558c7982a30f78e23e46d51d93e67a4a1065273"}, {0x60, 0x1194, 0x1000, "9992c54eb316e13e3c462a7c7b017ed9e064c59fbc8b3bfc897455282855c81a9242e7c10fcdb42d85606dc233fd7fb5fb67d7798c26e582ef33c701c1a7bc8bf173ea76b0f438f892f5fbd9"}], 0x1680}, 0x0) 10:04:13 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x3f, 0x1, @thr={&(0x7f0000000300)="33c0006b69416b9cc7b4accddd2501b9e3e7db48532b595d579795044504cb6077fb51654d3575201451f8e5ab5f5abc32bd5497901cc04235eba84dee6c9bdbc2f2910a3d7f7b66eda3856b0227bc95601ff31d44e80ddcfc051ff1d82d644444be08ed60431352141b606eed3764e7fafe93de479618b7c91b49b5341c8562e93e178c3a2d5ef3f2c97984fbd0f73f0e05f852606b09bb622914bbee1288fbea5e45d05104b91017bc75b403eccee5e589d862ab9079a08875407ebd91ca2a6787c141967cc76c32b391f061311ea3270aa3fac71da733ff8da16e5030e11b2665dc7307a319983b1b7380179b6d0863d265", &(0x7f0000000400)="07472d807a294f8abba62f3989d300a2e5d7ee49a694c843b55c699022c1602ff570e7c61c430376a1ddb33f777364a88bbdf6b3c1cceae0e4729143febd8536c093b38fee6d3f0f0d9fe9353037fe0253acf5e50cc660d906a8a166d853aaadf6037e7f881019237bee92668088f574cdb7a7126fd5c5caf2cf7313c4e2cb3f8ee38e7ce077820b9c3c73cd393c023f7bdac186cb069bd5cf2affe0dc086362ac14f1c9de8aa1b9b6c50f90c8937761e8c65888822e37ecf48d3c"}}, &(0x7f0000000500)=0x0) timer_gettime(r1, &(0x7f0000000600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) get_robust_list(r2, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f0000000140), 0x0, &(0x7f00000001c0)={&(0x7f0000000180)}}, &(0x7f00000002c0)=0x18) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000080)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x372) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x400000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r3, 0xb, 0x2}, 0x14) eventfd2(0x7fffffff, 0x80001) 10:04:13 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x12a000}}) [ 554.659770] FAT-fs (loop7): bogus number of reserved sectors [ 554.665659] FAT-fs (loop7): Can't find a valid FAT filesystem [ 554.679197] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:13 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64030000]}, 0x10) [ 554.729561] Unknown ioctl 35297 [ 554.743680] Unknown ioctl 35297 [ 554.766695] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x200000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:13 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") listen(r0, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) write(r2, &(0x7f0000000840), 0xff98) r3 = socket$inet(0x2, 0x5, 0x0) sendmsg(r3, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r3, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:13 executing program 6: syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x97d, 0x400000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000600)='/dev/autofs\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000500)={'nat\x00', 0x0, 0x3, 0x2, [], 0x6, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], &(0x7f00000004c0)=""/2}, &(0x7f0000000580)=0x78) r1 = syz_open_dev$sndtimer(&(0x7f0000000380)='/dev/snd/timer\x00', 0x0, 0x80) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000003c0)={0x9, 0xb, 0x1, 0xffffffffffffff9c}) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x31, r1, 0xfffffffffffffffc) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x80000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in=@rand_addr=0x3de, 0x4e24, 0x0, 0x4e21, 0x0, 0xa, 0x20, 0xa0, 0x0, r3, r4}, {0x8, 0x8, 0x2797, 0x8, 0x80000001, 0xe89, 0x2, 0x2}, {0x1000, 0x223000000000000, 0x3, 0x9}, 0x7f, 0x0, 0x1, 0x1, 0x3, 0x3}, {{@in=@broadcast=0xffffffff, 0x4d3, 0x32}, 0x2, @in=@broadcast=0xffffffff, 0x3500, 0x0, 0x0, 0x1, 0x100, 0x1ff, 0x9}}, 0xe8) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000400)={0x1, r2, 0x1}) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0xc) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) close(r5) 10:04:13 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40041) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r2, 0x300, 0x70bd2a, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x8891) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 554.800919] FAT-fs (loop7): Unrecognized mount option "mL[" or missing value 10:04:13 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x32a000}}) 10:04:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 554.856994] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:13 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x6}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00') ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000300)) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1813) accept$packet(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000005c0)=0x14) r3 = getuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in=@multicast1=0xe0000001, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e23, 0x1, 0x4e20, 0x0, 0xa, 0xa0, 0xa0, 0x16, r2, r3}, {0x7, 0x9, 0x9, 0xffffffffffffffff, 0xff, 0xc00, 0xfffffffffffff412, 0x401}, {0xffffffffffffff3c, 0x3, 0x81, 0x9}, 0x7fff, 0x6e6bc0, 0x0, 0x1, 0x2, 0x3}, {{@in6=@ipv4={[], [0xff, 0xff], @rand_addr=0xffff}, 0x4d4, 0xff}, 0xa, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x6, 0x3, 0x1ff, 0x2, 0x2, 0x100000000}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000002c0)={0x7e, @rand_addr=0x80000000, 0x4e20, 0x3, 'ovf\x00', 0x22, 0xce, 0x13}, 0x2c) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000540)=0x2, 0xfffffff3) sendfile(r0, r1, &(0x7f0000000040)=0x2, 0x800e) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000280)={r5, 0x8000}, 0x8) 10:04:13 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x10) 10:04:13 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2000, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x80110, r1, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast1, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) [ 554.930434] dccp_xmit_packet: Payload too large (65432) for featneg. [ 554.960977] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:13 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x2fb000}}) 10:04:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4c00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:13 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x5) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:13 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in6={0xa, 0x4e24, 0x2, @remote={0xfe, 0x80, [], 0xbb}, 0x1}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) recvfrom$inet(r1, &(0x7f0000000280)=""/212, 0xd4, 0x10000, 0x0, 0x0) bind$pptp(r1, &(0x7f0000000100)={0x18, 0x2, {0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1e) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000000)={0x3}) 10:04:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x6, 0x4, 0x100000001, 0x5}, 0x2c) 10:04:13 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}, 0x10) 10:04:13 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x20000000000003, 0x0) write(r1, &(0x7f00000000c0)="220000005e000721004f10f7d0ebd900000000003c0253573d9a047c26485a3d5728", 0x22) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400000022000102000000000000f99ff1cc51df"], 0x14}, 0x1}, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x8, 0x200000) msync(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) ioctl$KVM_GET_DEVICE_ATTR(r3, 0x4018aee2, &(0x7f0000000100)={0x0, 0x0, 0xffff, &(0x7f0000000040)=0x80000000}) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f00000001c0)=@ax25, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000840)=""/198, 0xc6}, 0x0) 10:04:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x608], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:14 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x173000}}) [ 555.091755] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:14 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$nl_xfrm(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81024}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getspdinfo={0x1c, 0x25, 0x308, 0x70bd29, 0x25dfdbff, 0x7, [@replay_thresh={0x8, 0xb, 0x3f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x20000040) socket$nl_xfrm(0x10, 0x3, 0x6) 10:04:14 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f00000000c0)=@ethernet, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)="1b79338b7819b28dd774abd6e300e4de0f351080352f65fd31450b9abbec811bf48eeac30014ca6ecb2faf0ce00a6341e098a8f490a4ecb7c8a33a631b775f0639cfecdf7da633fff156616aa4a5a9393846a7267ba65ee7a06ccd0d05d3135add4135155d58c8c8b063c8d05cbed0077324e0911edef07a42bff09b0c5eb217532f26157c0147d3b79ad3a59c690f0e100d69e8d23bf3dafc8cfd44b6f7cef3fc4e112707e40246d2147ae492225025aaafaad032332ea9a9ed39c1759597c02ffbd6622cd20753fb57270b94a93e97713114c1dc3adab05394234aeaea32ad", 0xe0}, {&(0x7f00000004c0)="3a9e83ee022e0434b901b86a95d28e0a035f64c9547ee4e128aee4ea45f7d5ec231de63703089038503b443132e2d02d3703225304ff618cb4ba4a85179170ac02155a3163bba69ffceab935ab63d549e7b25b2a44c1fdef131c5eb948cae6819efb6818fb5a43135889481688142585697fa5cc594ae12f93a8952120abb711260bec1a63e9229df542632efb6823f8d477fd1f68967ddee9283e1ff2cd8628204869976a1760c4ae23620e205ad3de21", 0xb1}, {&(0x7f00000001c0)}], 0x3, &(0x7f0000000580)=[{0x78, 0x6, 0x4, "5c6fc0f50b68d2ba70e368d4786e92f492d9aa1b69e5670a6208ff263e6b9fd6fb07238e8a211e8cc22d1dd706ae7d3b12de68b49885fcef1335eb4809f56dac32eea555d54345c61354aa09194ef60ac383beccb0e6a073410250ce4830eff2b1"}, {0xa0, 0x109, 0x7, "446f13b306f00629b34fc377d6db62a56df9cb73f72a2e42b0fab83254bd129b21fe0cad5a15fed823a88f8d0bf87833995a577f388f3ca3abe2380310ab983155b479ab1fbb212db2bbf6bae01c0b1f9d0d895bf7a48e5910e199575a31be8d0576a879002fe0c7925c3b5118942f2e37b12ee44af0f70ebbd48bc78d34c52debc932a160d2652f1db0ec"}, {0xb0, 0x11d, 0x1, "4033f2a2926e1bd16d4aafdca703963b9c694f73263df06ea78bc97036c7ef087432ae186d2ad85ce50e7312fbdc99416c7b9c604cb3c82935b8c6d06b38f3e5b5e059b389e7da88b118047eb99cd77890c91e415310996101e842f258d5aac5b0b22d7288bce7e3f1995599a15bcc35ac4226d57e774cba04aa7335ebdc8be022cacbd2328ab101a30a0a695c43038d3593e2a75235e60be93e5a30c73877"}, {0x1010, 0x19e, 0x7, "99400310ac8d81f48dc0e03a9fbea3f5a7444a99f3f9c271545c5be13fbb3dc7d1c55c33359d56bbbd734750fbbf0b70dce2dced8e9e0cbe332c18f1e6da481f3adfc016ffd0898a24d9494a837b6b4754042a85c8e8af9346122571e023d739de9340636b9a7ed4d22616b0f38ef566eece0e8256ff5372111b7f549da2f4ed680a3fed27ddc82bf65652167bd7dcfa3b1b2402d9d792fd25fad72b37561399af8dd2f3d8671c6664b6af7bfe567a60ee7a91e2e063838e24bce412d094ddd4cc02f114ab17bc8f7a87e3254f906f51a1c5ea5757cacfe9029b4f526882e68513549123651ebade071ed2bbf710b63d580198d8d07a5af5fcfc3fff5ae0481eb38505278d3705fd127d007d83b4e003c49cb8178cd81ebf80d130f3eda5aea91e5a940e10cad42517c255265537e66c0981c01466895b6956de7154fd55d50949008b6c7b999685f2cd8670711f6985c2e5c1f91a0f7b21bc7a8dc3f5a3368c7407c02040a904bab2e320aeccd7c76592ef74d9bbc5cb3d61d89cbe2af3bdd52d812a4ad36e9482a048cdad38e793ecfb24dfcbb4b5118d58e12085b8dcaa422958cb1157280a4c984dc471ee4caf3d5a6e2d1227cb0aafd47f881dc6ad33216384b62d4c30d7a9cc152a8b9e9a04139cbb0b6646592f2aba53e3c834c2a36a2d3a0656d2f32a1b9ccbc5840b2e5352be07394703bfd243c5e2a684d3fb8f70da2f7929a2efbbad06955d40e79dd2a1f45e4ab5d9bbaa8dbaf960f116d84d815f90d1645ab2ae9d37cc8c359e60da9a86a93ab6d9dc9c07b0c9c3f93160a042b00d0ef5a84831ad9e3cea5b9358869c42c0a723fd37a9c3b726204b5ec4e702c5c6f56e869c0409e29cb42c819998ddd1bfa0b419031b59160dc55f6a099f982bee23aa77128089b0a928977e366499b80a6fb9e8e02dc7aeb93ab3878007cdcbbb3bde9b3e3f3667a22ba3002323ff4753dd94f906bb515fbdbea495c5868ed19bd198ada69fdcd5ea307bacbb1322ef72060d2d9fa2e8c54b69c82e92876d1edca832430e8525810d6a5ea011bcde85523ce02d65f04f1673f7fddb1ec803e090fa12ae1f2536fa755ea4da4e5b7deb6b115a8d267edf6aeba72ed4c4719fa3e573f6cd964b25149d1faf82862aee4649e8292f2a9bb139861ff4b785e6eeef18cca0d593baa4258284bb0ae89ef94448e6df6f023e2eaadd3c453bdc77392247e7355a0334bb40b7a3a3ff3ec7ab9e7edd8246a45b84da1390a1d23043b63866cdb17eee28331b6c341a965076a91aeb038934d27bd76822fd26ed533fad994476ea527f651f95352aabd3f105cab38db455ee175ffcb0f466214636b0970608731d3dfec16e347f6c8a7c5c2a197d46748c5e79e301b571a85b6f699141a31abcda7cc122433192f9a2b0c27f8291fda75de7559cde07a192223a4b54e6365163930938b1899cdae5e5498a5c23710da322ddb9cef9b6839324510e6fbf01a2995d8a64d04af5957646c8d9d80e5aae4bba4ffdc00578f865547125f057294d9fba1c5945387dfe0b2a230ad8a4f5285fd060a7d78087cc0758b799587828bd7288cf2ab044c4081e24e20e7d6b986dfdc1f00490eeb5a0a9ba7c4dbf273c70e33835f542925167482e02adcbc95f731da78d1bf6d8fcde65657b379326b629e1abd2657f1914527d917e73f0826e41677421fc421d46b5818870baf3cb90a9fb3bf1f22042996421e8bade148256a7bc8d205957d87bf9ded7941bf55608a1f0eb9fdf0294aadd092791d3034a4c13d3a4baa989d0fc6b468123b88f4a3dccdc439b278b0381324493465d4a9b3913e55d9ac58910465b7f7aaad0182dbe42a650c87d95a4e3e7ff3fe065305f3107afc6fd2c4c95965f5da5d84f46f6ea03e18fc8d5224113e35606652e0376a9652dcd1f0da95cab74fce649ec0eb834f03a0df086ded2f6e571e1a6121744e43a18ffae4d0a1a306c36f2e954ad21500b63ca573c29a58cd44f2b40a63c067024991262d1a77b19715cffb4e89bbae12c14f23b48c01c5b819a6f4d1930d76f9c0950ae10942af75098b96df6ad12c95676c27756b882d4ea5980c63765924a6e2c42df4d77fb552906f319fd954de824583a7c498c7245b01474280ac40f420b2a24be1ab66ab6a804f77ad1819d8ec2fd262420c91e0626171972298243d8f221ca5afb233cf8e7538bc9f6f551a3ad31225b5c33be8fb2e5fcd7d5e9967433cf04c9ab7f4a158c426ea971a6d479ede12b881f6f7d288f010e6758d1d7f49261c8e465b32ae2a5069151b91439c70df93706d196463791594670a6107fc5d81218c7be7f94558a0ac3f016d218e67d98a2637f9700b0a7b2fecbc16208cf9cc5b2c71841a29df228c05031fe655410dfb66ca809247a249c7f0a8c8c91e341fd749912c847e862d95109a6915895e125d87b5e55583216757bc8ea61457fc61767c708456d237da5d5ce865fa1032da6613822e0c8629d5808a1e4c7f5c005cce55672228951ab158fabbb317b3923b7fd8a3e34cbbd3439836a6b53f0def6371f22663d10d487ae87d466f413edd42d12bc7b3ebda019cf0e6ade784bf85f3b517cb335afb86e8a7a18cc2cf137641f6fe4cc3f29281eb3d341acbcf2e74d929cd511f06ce86f1024c6f7a30fa3d0d5fdf07069355c27394cee9c554e4cad6a94fc8fe2dda1b70b041689d4cec26c29da965c62637b55c9ea2820750320964495cfb0142d5f0d4c8b4d12b84d0cb12b8e87ea595586f4f88eef53a8a8ca82ddffc31504b598760ae56c1844c1811e4fedfb78e5be2d5944806420ea7593ade1d325867985c568095ecf750bb251e2916fa3f1aed14172a9e67c0a8ccfc69d400833df9df939be9d0cf13c9fa922d5f8072e168f7d0aeb1b63a9dc93a0174274660e1e682c1b55eda679187d1c4654b8af75dbe912fa2d0875bf3af93f8119160d5f337693e7a70de90cff2b6170519ab79b08257a5fcce3b285dcdc6efd6289dd8a9b36f6d22c152ea4c34a4bb5e573b7bd9f2ff6920088834e483b7b01c59a30f814ac611cb0b20243e4edf8fb7dcfc6f02f4d728f87b3e2d9ff1f48019271f38615a778f0bec3735ccff4eff102c1ccb43e2d3dbd611cb4e31fe9acdf6d7a0ff43b143cfb8c854a48038c70b5c4b9e4d15a5b3b46f2bc7b8c7c980a99943716ac7a0c3b48371d34963639d1f32b4f4453bd86292d7766d520317edb4e16955888e5934bc36a33f9177a6fe0dfa553acb03d03181dd53ea8997dce83ea1f4a911af65d77e0e43c240a3a3428823c1aefc463779a4291d0b691da5dfde35ebc7fb8ba480c90a003d6fb1edcfd6c277b4e303ffcd9313fafaecdd3f5ec673c37f02abd917725755c8f6db6581591b55f131bbe66f32a0baf8099f7b32841ed04961efbaf037e41875dea435c284f2fd856ab36d14d7becbe1de1bc2fe65836cf4c7a25de05e01a01cbaf05f156ac200155bfc63fd097a391051f18c2dc3c849f97dda5aa16acce85e2ab862e8d7cb56a6a805d70716434d974e69d51d91d2058b573b337fdf252f6d304604a5a76c26fcd720fde8890122145550b3a596738c01ef568ebe6377902b4e7d87f8a8c79a51d42e23a1a40bbf8224cc0223a62bda517c1b5f29c8e28bbaac1de3f4fa1390c4509ffb58ad12564a045f4b0c7d6631040763ee93c024cefa02b9c8cafe074ce5f70668b8a7f39867fe088eda29aac30ae2ecd393598cf4ca0eb6d7d17c15f446507b93b9c6240d8056b00577058051b6d3284eb824918b228981714f97dfa9c7971070daa3186b74797e382dd41663d388922cab8f489d5ca1d0c1ea037f3ed6b549fa03ed2c4cc86a88c74eeb835fe8bf0f5bc11fdadd236c8696378c1af3b5c360d9b3d173551d42be602305316e5637e2cbe8d2117371c58d4964d57ede749e4c126c784a635d0d223a84cede7b5f5e31a87ce4753857e1549fa2b5c2905755d22a5a947532ee6d3d1845ff807899958571e35a6c6054126d930d8fe1ba176711df0398e4ba348265ae8d8e3d94fb8c0163bfec2ee59fad77ec5a4f326a863fefc6716b469210fd2aa78dbc675cd564404b24ef5b2329dfa4f68cd48ee59e1eb31e6560bd678e61eb9f067360bf15e5b65311b809f65e240a029d9ac72f5e0d1aa1e2e131ace4303f615f85839795434ba149e4a345cb26573e0ef05bcb46d7886fcfcf8a438a39e12f985dd6ee41828e616c5b32f53393c00a205a41849194a56e9e71cac2d6c2d7c92a565c5465957e5111a7f9e923b17870f515f2b6c919a50793a7ae03418d988baef832739616ec3c706e18571e4d6c47a556dee3d75bc22eb1e72d859a597d72636b0fbc0e31a08395277cd35da6c025e0114637109f6c9c88269803becde78b24df957d11529a81be38b851ea7a871b55f9b53a7c2c79e9fcb11e434ae0511d82ddcb3459dcbe9e39f90b71e08e8513505556b930f387e1ff20aeed57f5d1d8acb8aed051b96dece747fc7803ac45d0992a14351fb5e11f00341e43fabd7f168ff3dbdb26b1ebbe6217a02bafae08fa5f56c2699eabbbf4593d7d0b43d3b53157b9c366ae23bb1bb94cc444524111b29bae421d3ebd1638279068c35be3a9470fa0bbf867b9e36d83300cfd5c6834276109f023fb861658f42a036e6291f996450b79d63f6b465086ec350ab5124f728f1e271928d010f019acbad0b1a704ab3338b6b7a2d6a7934e8cc440f210ffb4fe8e6ec57f6f0b6465087c8a160c16f32b217fac6f036b557ea99a09d93c075c50a3ae0a0b6d74f6f9f89c055f1cb51bea24751488add4f6ce71f976249f8003d3456e128a2c071922af2be9df2d96db02e0cde05ec6757b4c6b9102ffb588ef588e72b63773987175cc0220fa794ac36ed6cf1fb11119a10b2f29ade162a9d955b25e521b06786d29b8b9b128ca5586a6b6b397cddef6d0e3a460a6eae8ca4205e69f51756142108c76a442a63de028360c6d57f2f50027f03186c6e755e646d1d6c009f5725bc64eb4ecf12d9bc993ace49195773727603da77fde94b9d00886a0c6c0adb7cb0620012fbf449641e7c0660c689ba7417d4b5c91ee7481b124f574bd485c58454605194f9b03c9ea2a0b4ae2d46afdc01d0c5ef1a04b8e8d0c092dd848c6140b0efd1caceb8761c7b64493173410f799e565025fba42bb546a72c9184c605adc86edebf783cf9201f37ed3017c543abfac30af728980af4386ec4917ee8fcb530da1d46f4fc0e730bdbeedfb8418d1f546ba2e2dfcab819490bd24013b4c3afb16621962649e42702ca710e6b83ed9a4b256352a9a4fadeda5ec0d7fe49b55c0e6018281b8acccb166faa4b6e10ae34e396878eeb7eeec1e79525a317d1de404006c0e758174667c764abdb1f6bbe130cdedfee08c9f268628fa7f4e3031233b80adaaa2b3a249fb37b24a0774f458c38452e45571f05658dd8612733b15b1ef791db41fedd21dc8b0c5b16d25023fb5c8761206ac0347f14b240b6ede5a8146b4470fcd64424524c20782f417b40c6491eb2227520dd6d456d46bac301431e7b3822fe30151575687933970bb1317ee2b03a23ce9a4cf470071dda880db5f9f14b4bd398885a7926ea85bf586e1fb10d1a73bee388bd83391516cf7f6e18dd8ff3f46237d09609d8eb5223899e91131c9885b8f87042e465372153370d445e2d751821f09b7d678e086a9fdceab00c10d419295716e35ac19f57d6afe549364c4056a99e93139bf8d501169f29e27850f3f85bc66e42e3fc228a"}, {0x90, 0x103, 0x3, "01956f4bd3cdfae071c0f38041f251e519dac7c8bf11e51ab7ce64679500af7370bbfd07e8ee9f37a762025e9efaa948b0743c864aa9795bb62976e05f48d63032437ccebae2fc590d61581e1745bb6ee621e125dbb72de5391cf8f1284a31ae16bf84fbea4bcd0d447e765bf3310240e5793028c5bfc5071dd1"}, {0xa8, 0x104, 0x81, "25b54a2037e9b7c9b73b65d851712a3ab8c80a4bb9aecfa1dfe5427659a439e882478a118fe8b634e018f0076386dcb1047cd7ea8e4b5a81fb58fef5f290611b536838187ab93e22386c40bafa8fb6d6539ae887d8a0e0e62e1a0e26668aee36b07f0f173d059ea1ee22357456ad5ca7ca1614cb63d894de71891ea5aa9644ae6e30f514e96b1e6b48fa121efb7449a994a4f92a26"}, {0x10, 0x112, 0x5}], 0x1320, 0x8000}, 0x40) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000019c0)=[{0x68, 0x13f, 0x7, "a78aaefb5aecfe96e4eac3044c7ffe7e2f1a9492965159060a608548faee9fb25d76f52d642a828ee78ffb7cd0c2680358489993836aeaae9c630352143381e3db322ed6fa8372835240677d8f410c39749c4f8754c62d"}, {0x1010, 0x108, 0x9c9, "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"}, {0xd8, 0x104, 0x8, "42ff16d172738961e98090cf2bd2353e81a8ee07c2b1c6c5bac4131b13ca1fc418fc1bc2f5334fa07749f1bc49908dfbdab488edd7f0d6e3e817d9647d8f0ee04f53b57d3d9af997d40251ebb9fd7e3a8ec97f9b2b1fef099d7f33eb73b4c23b40fb79f517320952f2805b655b223a8f74d0bfd2d4e17faf36b9d283a2782d3c1dc7ca49e2427c4201b60361d2368181e03cfe76a356ee338299c29e031f0f264a650e0e31a67d1d50ede4cd02984fb938dab167c354b9f05efac77b528dd423c1c47c"}], 0x1150}, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000018c0)={'filter\x00', 0x9d, "0d91b70885a343645fe10160f6db03eaf58499c6753d83be3f37defa25acdf5d61d6df5d20941029f2f0e7a80ac194a10057a5357fa93036578f89ce1c2412d44b7200be9f9d6decce72011d0756bc3520d6975841cc920d3f53b0f4098b4da0d5dba330c84b55fc39b411a9fca4be4ab3e709858c80f7ed54015b6254c7eaa62f3d0b8c54ad64ef56de49051dd8ee56e49c88881b0c2d0abc1e279941"}, &(0x7f00000001c0)=0xc1) 10:04:14 executing program 7: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={"0061a40000ffebf9000000000200", 0x9d01}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) r2 = userfaultfd(0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)=0x0) fchown(r2, r3, r4) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)=0x1) pwrite64(r0, &(0x7f00000004c0)='d', 0x1, 0x0) 10:04:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88a8ffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:14 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}, 0x10) 10:04:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa000003fe, 0x0, 0xfffffffffffffff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80}}, 0x1d) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000000040)={'vcan0\x00', @ifru_ivalue=0x7}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x24, 0x3, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_getoverrun(r2) 10:04:14 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e24}, 0x10) listen(r0, 0xffffffffffffffbe) sendto$inet(r0, &(0x7f0000000200)="d3", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0) 10:04:14 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x2fc000}}) [ 555.232195] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 555.270360] device lo left promiscuous mode 10:04:14 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100), &(0x7f00000001c0)=0x8) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:14 executing program 2: r0 = socket$inet(0x2, 0xffffffffffffffff, 0x7f) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @loopback}, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000080)=0xe8) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0xaf, @rand_addr=0x7ff, 0x4e24, 0x4, 'none\x00', 0x8, 0x7fffffff, 0x3}, {@multicast2=0xe0000002, 0x4e22, 0x2000, 0x7, 0x10001, 0x9}}, 0x44) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0xff, 0x90000) 10:04:14 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x10) 10:04:14 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0xe3000}}) [ 555.334294] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 555.361566] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:04:14 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00'}, 0x10) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x80200, 0x82) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:14 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x10) [ 555.443840] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready 10:04:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8906000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:14 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0xfffffffffffffe17, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:14 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x27a0, 0x4) 10:04:14 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x144000}}) [ 555.511285] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 555.561124] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 555.667816] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:14 executing program 7: r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xe440, 0x8000000001) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) 10:04:14 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf903000000000000]}, 0x10) 10:04:14 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x2) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x2000)=nil, 0x2000}, 0x20000080000003}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x1}) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x4008af13, &(0x7f00000127c0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ip6gre0\x00'}) close(r0) 10:04:14 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @multicast1=0xe0000001}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0x2}, &(0x7f0000000300)=0x8) r2 = socket$inet(0x2, 0x805, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e24, @multicast2=0xe0000002}, 0x10) set_thread_area(&(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x8, 0x1, 0xff, 0x7fffffff, 0xb0a, 0x9d25, 0x400}) listen(r2, 0x6) sendto$inet(r2, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) sendmsg$inet_sctp(r2, &(0x7f0000000580)={&(0x7f0000000340)=@in6={0xa, 0x4e20, 0x80000000, @dev={0xfe, 0x80, [], 0xb}, 0x4}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000380)="a3c33be7e8442028e3140696b1e804cf3c9eb0748b7d9aa65a8df47fd4ec62b58765ebbf15c10e1617dec9f11f2119b7f10bfea966087cdbf9d4f211b66f9bea41c5b37f9152b018d602a69c8cf88b47b2d37833af67f95dc227af0cc811e41f2a7cf58d7478090308adcfb390bde191a7913d8a81f36e939a29d025547fa74d37d54c7a33b2bf0c891baab4c6ce78ddbac2f057aca300c5d881bb84fb1de7507f0b7b1295047279f41294a37753ff1fbb9e35d6d04343d23eaf890a4579461a85bbde18be9fafdf892d33f5ac6c74e36913615adc9f4b12e591d02647fb70a5faf04086", 0xe4}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800004e0d3b1000000000008400000007000000e00000020000000020000000000000008400000008000000fe8000000000000000000000000000aa20000000000000008400000008000000ff020000000000000000000000000001180000000000000084000000000000001f0003000400800018000000000000008400000006000000e1ff00000000000018000000000000008400000007000000ffffffff"], 0xa0, 0x10}, 0x4000000) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000005c0)={0x201, @time, 0x9, {0x8, 0x8}, 0x8533, 0x0, 0x200}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f0000000700)={{0x3}, {0x3, 0x9}, 0xeffffffffffffffc, 0x2, 0x180000001}) 10:04:14 executing program 5: r0 = socket$inet(0x2, 0x6, 0x20000000000001) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000000c0)={'veth1_to_bridge\x00', {0x2, 0x4e23}}) 10:04:14 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x5f000}}) 10:04:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf401000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:14 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x208203, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000040)={0x80000001, 0x4, 0xfffffffffffffc01, 'queue0\x00', 0x41}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000007000)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000780)=@updsa={0x140, 0x1a, 0x401, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {@in=@broadcast=0xffffffff, 0x0, 0x6c}, @in=@dev={0xac, 0x14, 0x14}, {}, {}, {}, 0x0, 0x0, 0xa}, [@tfcpad={0x8, 0x16}, @algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0xfed8}, 0x1}, 0x0) [ 555.915763] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 555.929550] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:14 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7fffdfd6e000}}) 10:04:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x60000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:14 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @broadcast=0xffffffff}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x2, 0x0, 0x0, 0x3, 0x5}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r1, 0x101}, 0x8) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x8800, &(0x7f00000001c0)={0x2, 0x4e03, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:14 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x2, 0x20080) open_by_handle_at(r1, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], 0x0) ioctl$TIOCNXCL(r1, 0x540d) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000004c0)=""/139) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x8000, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000280)={0xae, {{0x2, 0x4e24, @multicast2=0xe0000002}}}, 0x88) 10:04:14 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x10) 10:04:14 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d345f8f762070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000415fc8)={&(0x7f000034c000)={0x10}, 0xc, &(0x7f00000daff0)={&(0x7f0000417e08)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1=0xe0000001}, {@in6=@loopback={0x0, 0x1}, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x13c}, 0x1}, 0x0) socketpair$inet6(0xa, 0x7, 0x1, &(0x7f0000000000)) 10:04:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8dffffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:14 executing program 7: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f0000000140)="d532194676340640f6f3c7c2c1dcf8cff6f5de75f6f25dfd6afb5742207d4ae3e30df1594b467c2a232ae9af8a3ece067a1db3e4cb72ab057d09ccae253455098d229f5fbcde3f3663d2440ad7e49a551f9ba5c271c13c677e10dac38df49bf6c0bc1f1a94de5750d05e17496a92956b3a907baaf14e06305ef14673a671f8f0f3f94db6c6c50d8bee1420fd3c6b083ba1dada09bc38fe82384554e4bab790fbfdff73116ebcd0c760e0e918a8a61ed6dbe8554a259eb8080c02db42c70ae0d674528fbde0518fbc540f9f65b88b06f3da9086631dcbb061b5fb98d63105f9c8af0d71", &(0x7f0000000280)=""/37}, 0x18) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bond_slave_0\x00', 0x5200}) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r3 = socket(0xa, 0x1, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) rt_sigpending(&(0x7f0000000340), 0x2c) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) bind$can_raw(r4, &(0x7f0000000000)={0x1d, r5}, 0x10) setsockopt(r4, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 556.084381] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:15 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x2ad000}}) 10:04:15 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e24}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:15 executing program 5: r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) recvfrom(r0, &(0x7f00000000c0)=""/11, 0xb, 0x40002000, &(0x7f00000001c0)=@can={0x1d, r1}, 0x80) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x6000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000500)={0x2, 0x80, 0x1}) r3 = socket$inet(0x2, 0x5, 0x0) sendmsg(r3, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r4 = dup(r3) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) sendmsg(r3, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88caffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 556.156780] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:15 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6403]}, 0x10) 10:04:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x806], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:15 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x15e000}}) 10:04:15 executing program 2: r0 = socket$inet(0x2, 0xa, 0xfffffffffffffffe) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000340)={'nat\x00'}, &(0x7f00000002c0)=0x78) r1 = shmget$private(0x0, 0x1000, 0x1802, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/66) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f00000002c0), &(0x7f0000000300)) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000003c0)) init_module(&(0x7f0000000400)='nat\x00', 0x4, &(0x7f0000000440)='nodevselinux\x00') recvfrom(r0, &(0x7f0000000140)=""/185, 0xb9, 0x20, &(0x7f0000000240)=@rc={0x1f, {0x6, 0x81, 0x0, 0x3, 0x100000000, 0x7}, 0x8}, 0x80) 10:04:15 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000100)) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/dev\x00') ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000380)) rt_sigaction(0x7, &(0x7f0000000300)={0x3ff, {0x4}, 0x80000005, 0x9}, 0x0, 0x8, &(0x7f0000000340)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, r3, 0x30, 0x0, @in={0x2, 0x4e20, @loopback=0x7f000001}}}, 0xa0) ioctl$BINDER_SET_MAX_THREADS(r1, 0xc0306201, 0x400000) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x2) [ 556.306627] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 556.308166] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:15 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000200)="b9b78ff4ed", 0x5}], 0x1, 0x0, 0x0, 0x40091}, 0x8000) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:15 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x10) [ 556.360785] binder: 22112:22114 ioctl c0306201 400000 returned -14 10:04:15 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x183000}}) 10:04:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 556.404569] binder: 22112:22114 ioctl 40046205 2 returned -22 10:04:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000300)="0eb3d7dd7511a1d4453a69bb8d240367efa6ec7d5469cb4b220ca6c764c72db1bee478d2dfeed9d8f4c5d1692657e1d9558241c582a31bbdc05771c3676a21b7e8b66bedda239e8a366db5acb8af85364e979a13c7ad9ff86a08726f31bbb3ad14f5572d", 0x64, 0x5}], 0x4000, &(0x7f0000000400)={[{@quota_off='quota=off', 0x2c}]}) r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x100000000}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000001c0)={r1, 0x1f}, &(0x7f0000000200)=0x8) 10:04:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x806000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 556.449138] binder: 22112:22125 ioctl c0306201 400000 returned -14 [ 556.464915] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 556.487761] binder: 22112:22114 ioctl 40046205 2 returned -22 [ 556.520131] gfs2: not a GFS2 filesystem [ 556.550048] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 556.559259] gfs2: not a GFS2 filesystem 10:04:15 executing program 7: r0 = socket$inet6(0xa, 0xb, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001540)=[{{&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x110}}], 0x1, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23, @rand_addr=0x9}, 0x10) r2 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x4000000000002d0, 0x0) 10:04:15 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x10) 10:04:15 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x340000}}) 10:04:15 executing program 6: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b707000001000000407000000000e0ff50000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x400000, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000240)={0x800}, 0x4) r3 = socket$inet6(0xa, 0xb, 0x100000000) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x0, 0xf, 0x100, &(0x7f00000002c0)="00000000000000000000000000009e", &(0x7f0000000140)=""/256, 0x9de}, 0x28) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) geteuid() r5 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) dup2(r0, r4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000001, 0x4012, r5, 0x0) 10:04:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf4010000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:15 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r1 = memfd_create(&(0x7f00000000c0)=':/\\keyring\x00', 0x2) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000200)='./file0\x00', 0x1) 10:04:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x2000000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 556.894289] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 556.897747] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:15 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x313000}}) 10:04:16 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000000)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 10:04:16 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000]}, 0x10) 10:04:16 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@sco={0x1f, {0x2, 0x4, 0xfffffffffffffffe, 0x5, 0x531, 0xaa}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)="ace712945c3ff88fabd7c63bbf1773e4f63d7102d9d10cc90aebcc18e5e303b88e327ff643617beeabf06093c465a3fb6ff108276ec6535fa130f647a5e3f252accfde70beb33768bfe8d47f21929783ada18eb57cc0761d58a764f9540899ed151e21a4846e3aae2a3c12ee5cb4a2446591134f02f4375a182ea9537aad63c8dfe28a01f9e6f017a91c8c12", 0x8c}, {&(0x7f00000001c0)="cc3f01d4c333450c853cf49d527e968f4c36c34d0db43251f6135bbc692123a5e0dc2b87f8f3c965a3397d", 0x2b}, {&(0x7f00000004c0)="8eeadbf399561c859153cd2cd9152803771f28399df39e7590265acb93255fe36c065f4f436617f2b34eb4f4298e0789b0978556c98e95d12f11540227df0e2862a213eb5ebe9c2f96f3852c57f298e70b68b89a916d7d840b28c91482e60fd5e30e2d64ac2b6bb76a3f86e65481d595c4fb0dde6409e2528cddbcd2ec801db86dde02c6b86b8db5c2", 0x89}, {&(0x7f0000000580)="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", 0xfe}, {&(0x7f0000000680)="ae9ac5b753e049ce66ebb6f4b7e47a4647bc1ddaed23800885d072bb666947b36ad0988e8a2a9295a0a7d493258f17bb165dfa167e3b60128dcdef0fcc52e44aecf52f7ee6370ea6cffb950cf584f5813b6b44aa26389bf9a437a9b8f2758474ca6165102ca60e50a755c238819ca6b6082c90681ba319fcfc784a4740a970b4b2e5587d2cf27446a9d0f4939647ad829542394cf3171fa81ea8b047f69fa2ee1f230215ac977ddcf93ed50fc6dbed1ed4bd9aa157a388ae9450df5d658412aa9016f93dabfdd4c10d8982483239edbe", 0xd0}, {&(0x7f0000000200)="2d17a86c43e745", 0x7}], 0x6, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x208, 0x20000040}, 0x80) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0xfffffffffffffdf2}], 0x1, &(0x7f0000000600)}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='coredump_filter\x00') setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000a00)=0x7fff, 0x4) 10:04:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x74000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:16 executing program 7: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) shutdown(r1, 0x0) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r4, r5) sched_rr_get_interval(r3, &(0x7f0000000180)) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x20000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000108}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000075624386a89d7b172bed9b3c7dfce2424288d4c0c12d1f4ed8887c7ef3ac46b515230aee41cbec2e2cd8f5e61a3dcdb049206251e33173c409784f58b3d326af81254542c36066fc6520545cae38e4e4b908ca32b3b6f554cc5a3a6982b66ce201aeb02257e89889d32bab1ae3d6f601567877445d2da2d1df51b4ed0a5cda0852df49c95a7e22f05fda8d179a5abce574d86399754587129417cde16ae64af677c0dd218380bbf06f0e15dc9af04603b125fd796fcb8d769eef95c7b7e51357fb368a5b65c5ce9f54a9d2ee9", @ANYRES16=r6, @ANYBLOB="200027bd7000fcdbdf250c0000000800060074000000"], 0x1c}, 0x1, 0x0, 0x0, 0xc811}, 0x20008000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7ab27191a01002356ba602e0905000b", 0xfffffffffffffd92) 10:04:16 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x2, 0x101}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x3a0) sendmmsg(r0, &(0x7f000000c300)=[{{&(0x7f00000000c0)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000000840), 0x0, &(0x7f0000000900)}}, {{&(0x7f0000002400)=@ipx={0x4, 0x0, 0x0, "527fc4f4b987"}, 0x13, &(0x7f00000057c0), 0x0, &(0x7f0000005880)}}], 0x2, 0x0) 10:04:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8864000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:16 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x29b000}}) 10:04:16 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}, 0x10) 10:04:16 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x1, [@remote={0xac, 0x14, 0x14, 0xbb}]}, 0x14) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) [ 557.223283] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 557.235102] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x80350000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:16 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x20000000000) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:16 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0xd3000}}) 10:04:16 executing program 6: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000600)='./file0/file0\x00', 0x3fffa, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x400000, 0x0) open(&(0x7f0000000000)="2e2f66696c65302f662e6c6530f0", 0x40003ffd, 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x100000213) 10:04:16 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0xfffffffffffffe3d) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) sendmmsg$inet_sctp(r0, &(0x7f0000002680)=[{&(0x7f0000000240)=@in={0x2, 0x4e22, @rand_addr=0x8}, 0x10, &(0x7f0000002400)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="8fc12fe9b88651b75fd2651db786c664ead671c5d49a7c1d3a13a79352e1cbaa0bbd92b60bd9a9607adcca5db0af2a7e1c48d03eb1a35f8a2b2cd42518f20cb16ab3eb7fc8d79e1ffaa96c7f98c76203c4f2d2c2214244ba6e86602c7e802d28ba6cc671d5c163147cbeb28aa404c5655cb66543cbad855bbb4d65f0ca8cf4a8e14b90821b4d915b70d75ff489551ae79b3f75bbc10594549c30453f06baada57a73b6e86e5cd7ff63b184dda0dced70ffcaa7573492d84be9c92060e120cf05d265d3cf3bf71d1d6ec8b15d6113c1d413adddc782eec65259dd0778ffabec2e57a9", 0xe2}, {&(0x7f0000001380)="151ddff3348c81a57252962e47df6f3860a754099363a17b344df8677d646a23b80b2b60d1fbe9886cfe23b97c6297cbd8eceaf0fd7efe7c2c009f76fe48f5", 0x3f}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f00000023c0)="52d596d269ea51767a4a814b5eba9dff704ee6f7469c06c625fa6580b9a95b11a72bea7a99ca370c3750bfbba3575d53aafb353f5e1279ad87075a6620", 0x3d}], 0x5, &(0x7f0000002480)=ANY=[@ANYBLOB="18000000000000008400000005000000300000000200000020000000000000008400000008000000000000000001000000000000080000000000000087f9ea92e0196b0000000000"], 0x58, 0x40000}, {&(0x7f0000002500)=@in6={0xa, 0x4e24, 0x33b5, @dev={0xfe, 0x80, [], 0xd}, 0x2}, 0x1c, &(0x7f0000002600)=[{&(0x7f0000002540)="7eb3d0f8697245cda8e23b38fb6139da576d25d05d3d128bb67a5a3d67e47c91dbb2fb562eba058edba0741c9b6551c288d62b3b7d583cec4d6691636a23552a4c8f65f89b268f365990b591039d8dacd6c8fb02ceb4856722d12a1e40012c020f13b706191eeaf45dce259751942bb106d4120680a8af1474c44e1724504d1b3035ea71fe3cea819aaee1eb71746ef81cfe06cf0b16b1471b7602ccf64988caf4016ebe6916ed38aa9d599110215b7b099feb708057c1b720c4bc5b2cc138a8", 0xc0}], 0x1, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000084000000050000003000000241d00b0052ea000018000000000000008400000007000000ac14140b11f77729514040ad7c36b6fa7b8757a392ff3b2ae2ba63f280620f3052706fb2279a019b0b63f9b3c085ca1fa82537ee37aa678c04a147a7be2efa"], 0x30}], 0x2, 0x4000800) listen(r0, 0x3) fcntl$setlease(r1, 0x400, 0x0) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002840)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000002900)={&(0x7f0000002640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x14, r2, 0x2, 0x70bd2a, 0x25dfdbfb, {0xe}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) ioctl$sock_ifreq(r1, 0x8942, &(0x7f0000002980)={'bcsf0\x00', @ifru_data=&(0x7f0000002940)="5390e0315c9a58b195c64911624079f6b59f3af451ceece8e79956b768703ca7"}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30f) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000000)={0xcb, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}}}, 0x88) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000002700)=""/177) 10:04:16 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x10) [ 557.367395] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 557.377889] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffff5], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:16 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x61000}}) 10:04:16 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000dc5f98)={0x0, 0x0, 0x0, {0x0}}) timer_create(0x6, &(0x7f0000009e40)={0x0, 0x3c, 0x4, @thr={&(0x7f0000009dc0)="6c2252b2db34ff1d05b92449f3ab08ff1ac1395995cbe2f695a3d560279b018a546a8bf5838d4febe52a7d4fee6f9c99524b", &(0x7f0000009e00)="6113b6e0ccdfe5f2fc8aa68634453cd13a74552a42e24da643dc8f2474979f0c0a8a7938aeef139a4fac0e"}}, &(0x7f0000009e80)=0x0) timer_gettime(r2, &(0x7f0000009ec0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000009b00)=[{{&(0x7f0000000000)=@pptp={0x0, 0x0, {0x0, @local}}, 0x80, &(0x7f0000002340)=[{&(0x7f0000000080)=""/87, 0x57}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/42, 0x2a}, {&(0x7f0000001140)=""/71, 0x47}, {&(0x7f00000011c0)=""/25, 0x19}, {&(0x7f0000001200)=""/83, 0x53}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000002280)=""/181, 0xb5}], 0x8, 0x0, 0x0, 0x10001}, 0x1}, {{&(0x7f00000023c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002680)=[{&(0x7f0000002440)=""/7, 0x7}, {&(0x7f0000002480)=""/172, 0xac}, {&(0x7f0000002540)=""/123, 0x7b}, {&(0x7f00000025c0)=""/77, 0x4d}, {&(0x7f0000002640)=""/4, 0x4}], 0x5, 0x0, 0x0, 0x552cb2de}, 0x80}, {{&(0x7f0000002700)=@generic, 0x80, &(0x7f0000003c00)=[{&(0x7f0000002780)=""/248, 0xf8}, {&(0x7f0000002880)=""/121, 0x79}, {&(0x7f0000002900)=""/54, 0x36}, {&(0x7f0000002940)=""/165, 0xa5}, {&(0x7f0000002a00)=""/4096, 0x1000}, {&(0x7f0000003a00)=""/172, 0xac}, {&(0x7f0000003ac0)=""/212, 0xd4}, {&(0x7f0000003bc0)=""/42, 0x2a}], 0x8, &(0x7f0000003c80)=""/30, 0x1e, 0x3}, 0xffffffff}, {{&(0x7f0000003cc0)=@in={0x0, 0x0, @dev}, 0x80, &(0x7f00000041c0)=[{&(0x7f0000003d40)=""/232, 0xe8}, {&(0x7f0000003e40)=""/219, 0xdb}, {&(0x7f0000003f40)=""/152, 0x98}, {&(0x7f0000004000)=""/88, 0x58}, {&(0x7f0000004080)=""/231, 0xe7}, {&(0x7f0000004180)=""/63, 0x3f}], 0x6, &(0x7f0000004240)=""/4096, 0x1000, 0x9}, 0x5}, {{&(0x7f0000005240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000005340)=[{&(0x7f00000052c0)=""/71, 0x47}], 0x1, &(0x7f0000005380)=""/222, 0xde, 0x4}, 0xecb}, {{&(0x7f0000005480)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000008700)=[{&(0x7f0000005500)=""/14, 0xe}, {&(0x7f0000005540)=""/4096, 0x1000}, {&(0x7f0000006540)=""/4096, 0x1000}, {&(0x7f0000007540)=""/167, 0xa7}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/207, 0xcf}], 0x6, &(0x7f0000008780)=""/186, 0xba}, 0x8}, {{&(0x7f0000008840)=@un=@abs, 0x80, &(0x7f0000008ac0)=[{&(0x7f00000088c0)=""/131, 0x83}, {&(0x7f0000008980)=""/104, 0x68}, {&(0x7f0000008a00)=""/137, 0x89}], 0x3, &(0x7f0000008b00)=""/4096, 0x1000, 0x9}}], 0x7, 0x0, &(0x7f0000009cc0)={0x77359400}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000009d00)={0x0, 0x71c52625}, &(0x7f0000009d40)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000009d80)={0x0, 0x4, 0x1, 0x20, r4}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f000021af98)={0x0, 0xb6, 0x40, {r1}}) 10:04:16 executing program 5: truncate(&(0x7f0000000200)='./file0\x00', 0x1) r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0xb3, 0x75}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1}, 0x8) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x2000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:16 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e26}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x10000, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000002c0)=@req={0x34, 0x194, 0x0, 0x4400000000000000}, 0x10) sendto$inet(r0, &(0x7f0000000000)="8ee3a186d46397aeb5da6bd3f5208161df9ae05256f2a805be6f96459440b689857a4496e69d3154fc3a0b04e529ce0d03097cfd42297cf062199de15fdd0a638197b2668cd3d7b7204030de88340c6f583bbda875614292e64bd74ea7c1c6fca2cc092dc1b23e0745ca2dcbc2bfbee029805230fd829396f67b32851fe00eab81047eefa08ea93304524ac83c", 0x8d, 0x40000, &(0x7f0000000140)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) 10:04:16 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x105000}}) [ 557.529039] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:16 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x10) 10:04:16 executing program 5: r0 = socket$inet(0x2, 0x800, 0x80000d) flistxattr(r0, &(0x7f0000000540)=""/252, 0xfc) r1 = memfd_create(&(0x7f00000000c0)="2ce527296e6f6465766367726f757000", 0x1) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000100)={0x3, 0x800, 0x1, 0xfffffffffffffffc}) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)="950b593b92d3541325cd7a485a021e92fe978a50448c6b86b49ed6ea38c4bc679001c2093ae33e0a33d285cc8a691068077b7302346a3660795dece171c92b45dc5e56a3f6498d5f9c2df33858be7b948222817e27250522713ab180cc3d558b860beaeb", 0x64, 0xfffffffffffffffe) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) getgroups(0x4, &(0x7f00000003c0)=[r4, 0x0, r4, 0xffffffffffffffff, 0xee01]) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000004c0)=[@in6={0xa, 0x4e23, 0x7, @loopback={0x0, 0x1}, 0x9}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0xf}, 0x101}, @in={0x2, 0x4e24, @loopback=0x7f000001}], 0x58) keyctl$chown(0x4, r2, r3, r5) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) [ 557.572588] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:16 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r3, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = gettid() r8 = getuid() r9 = getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000008c0)=0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() sendmmsg$unix(r3, &(0x7f0000000a40)=[{&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000440)="4276f66363ee4d8e195427ca42fa91753f63d83d751f2af918f132b210d7066a145a9b2532a898c41bd0af61ea7788197493047df08c7db3764a34c75c328903110d549af95bcb697e8be552a9b65a4c27726b11f81d7764424b8721bf78face929ccecefe331d8465d976154e2327ad", 0x70}, {&(0x7f00000004c0)="5ffe49a457f23f1085debbf59ca8939e880d972dc0c0729ab436032cb0e6d4c8080e371df468a2e70d201444539c7c7a935f3812d8470962993915a28f9e9d4b413b910919f0d298833bd124750c0f1957ee217bede82adf67ab8891fe6450cf66b1822e6f229605ef20f8a438687f162aeb893ce5ae52f4576f7ab42f97caf02835886e4aad1042cada544fdfcc94617854439fcdb187a59c26adf26278a63c1cea9d939b4a62217f42e7606ef917c015a10365368acd88d01b78d1bfd645f2f3c27d338fce04024856e1387a00d65bd6a1fa639688ed889242de3a6edb", 0xde}, {&(0x7f0000000640)="5a06a7f0f02a050b9b75ea0ca268f82de11b759f3024cc11cd10dc9800b03e7c60211afdac479b9b5d1f7d4dadb78cdb4564deca61f078c9fe5752567f34b75bbeb6", 0x42}, {&(0x7f0000000040)="90fdd51f76ca0a225f86", 0xa}], 0x4, &(0x7f00000009c0)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x18, 0x1, 0x1, [r1, r3]}], 0x78, 0xc0c0}], 0x1, 0x80) write$binfmt_elf64(r3, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}], "", [[], []]}, 0x278) truncate(&(0x7f0000000100)='./file0\x00', 0x0) sendmsg$key(r2, &(0x7f0000cd0000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85000)={0x2, 0x1, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}}]}, 0x60}, 0x1}, 0x0) sendmsg$key(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 10:04:16 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000140)={{0x1d, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e22, 0x2, 'lblc\x00', 0x10, 0x2c, 0x40}, {@loopback=0x7f000001, 0x4e20, 0x10002, 0x20, 0x81, 0x9}}, 0x44) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0x3a, @multicast1=0xe0000001, 0x4e24, 0x2, 'wlc\x00', 0x21, 0x5, 0x5f}, {@empty, 0x4e21, 0x10004, 0x8, 0x1, 0x40}}, 0xfffffffffffffecf) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x20000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xffffffc0], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 557.744367] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 557.752728] IPVS: set_ctl: invalid protocol: 29 172.20.20.170:20002 [ 557.776547] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:16 executing program 6: r0 = open(&(0x7f0000000000)='./file0\x00', 0x100ffe, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000000c0)=0x4, 0x4) write$FUSE_LK(r0, &(0x7f0000000100)={0x28, 0xffffffffffffffff}, 0x28) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x3) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x90802) sendfile(r1, r2, 0x0, 0x100007fffffff) 10:04:16 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x13d000}}) 10:04:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88480000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:16 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x10) 10:04:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x7], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:16 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r3, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = gettid() r8 = getuid() r9 = getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000008c0)=0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() sendmmsg$unix(r3, &(0x7f0000000a40)=[{&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000440)="4276f66363ee4d8e195427ca42fa91753f63d83d751f2af918f132b210d7066a145a9b2532a898c41bd0af61ea7788197493047df08c7db3764a34c75c328903110d549af95bcb697e8be552a9b65a4c27726b11f81d7764424b8721bf78face929ccecefe331d8465d976154e2327ad", 0x70}, {&(0x7f00000004c0)="5ffe49a457f23f1085debbf59ca8939e880d972dc0c0729ab436032cb0e6d4c8080e371df468a2e70d201444539c7c7a935f3812d8470962993915a28f9e9d4b413b910919f0d298833bd124750c0f1957ee217bede82adf67ab8891fe6450cf66b1822e6f229605ef20f8a438687f162aeb893ce5ae52f4576f7ab42f97caf02835886e4aad1042cada544fdfcc94617854439fcdb187a59c26adf26278a63c1cea9d939b4a62217f42e7606ef917c015a10365368acd88d01b78d1bfd645f2f3c27d338fce04024856e1387a00d65bd6a1fa639688ed889242de3a6edb", 0xde}, {&(0x7f0000000640)="5a06a7f0f02a050b9b75ea0ca268f82de11b759f3024cc11cd10dc9800b03e7c60211afdac479b9b5d1f7d4dadb78cdb4564deca61f078c9fe5752567f34b75bbeb6", 0x42}, {&(0x7f0000000040)="90fdd51f76ca0a225f86", 0xa}], 0x4, &(0x7f00000009c0)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x18, 0x1, 0x1, [r1, r3]}], 0x78, 0xc0c0}], 0x1, 0x80) write$binfmt_elf64(r3, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}], "", [[], []]}, 0x278) truncate(&(0x7f0000000100)='./file0\x00', 0x0) sendmsg$key(r2, &(0x7f0000cd0000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85000)={0x2, 0x1, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}}]}, 0x60}, 0x1}, 0x0) sendmsg$key(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 10:04:16 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x8000000000000000) clock_gettime(0x80, &(0x7f0000000100)={0x0, 0x0}) clock_settime(0x3, &(0x7f00000001c0)={r1, r2+30000000}) syz_open_dev$sndpcmc(&(0x7f0000001840)='/dev/snd/pcmC#D#c\x00', 0xffff, 0x2) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@ethernet={0x306, @random="7447c2d44a88"}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000200)}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)="32737b8e5ba70e2772ede7a9943a49211c5c03c91b8ed3d23b5b0f32856463511979970dd29d1d6391da0f933220419ef577e7a04e74da04ed005d7293686a087a40f45575622c8cff2b929d2e947bd3bc2c079941bddb41e5fca5870a78a1495cf985f88421535a2cbe88a05c43cfcc8355a984949efd005619992aa5251e86", 0x80}, {&(0x7f0000000280)="0be280f9cafdef71b56387ea9faeb2c5b47764858bdb36a51442bcb196c53ddf99cb4cc673d15b94d05e395d51ddbff118e61163f327535d40a1e5945f7faa137694d1200bf417ab1f040e91e9e427eb", 0x50}, {&(0x7f00000004c0)="95eb2de1b7b2f5d0fdaac00277107c777b2c0aab02b72325fbc5d342a2cac883d285c375e676bc8a86623ccc3713dad06069686863b9447eac1787b1073d5d672f0af181a92a9a0a8bbf6e6fb970d6d373afd927eb153adb93a404306089b8a08366826bf5e4f23e302941ac58edc1bc1b88450adbcbade0c881602c648f1c19f106c90a5b8859bc384ea77ed3e0adb3c27e1882ecce956c64b97caa5e859dfaee5204213017004f384819ddc65a25ff19", 0xb1}, {&(0x7f0000000300)="3eded39f93a01888d6e6d685686f62fd962cf2fdacf323daf1d4adb7dab8b084e6b7c6b37f2671b36d67e94e8e1e359f1a0f209987cc5d33fdad6acb7c11d3d42eb2e97a8a78a65f1136cc9b59667f5e6118e80f32244cd1639eb411278106620cacffb4bbcdd2", 0x67}, {&(0x7f0000000580)="d85e826dc470c2f79d721e812474efb9024d495822e6b2523b3f014dca730fb7b87a9f6e71cfcb75b17d9010ac28ae71edaf976656068dd1f0ac9edcba252e03782db799a7be38335e2f9f3583916b6fa24066f4d599afcb33471196ff68de3105ab27051e607ac49cd9ab8712ef0192a0e01d77c1002e3bf74331eef6826fc4dad7aac841955153ddfc001ad1c80b9524f59270980cb696fc3fab337079e70f55aefa7473f4a0553e3b4632fb0b200317db2bfaca9beffcc2be8f2b406ef6961ddb46f99794f269e25d4ebef7c8ba0f66ede2d3af728fcbd998c1f6cb9b29b65357ee601b0fd32a484c131fb0972d7f6242af1b53307c4dd3cd4b971cc3fb8328532b75ad0de199b2c141716d64976b7a712ace3437411d8b6dd157df7652aeaa1b335abc150e06af7be0e7e22af3baca2e0e708f7dc3e320d0829ea2950dd65deb602d5283e84484e67d9b867b28a614f4a532c5b26a3aea81549afb57d40d3a6bc33979980e9642f0d198f93c341544df7b886e86c8dd7ee158589f9aa108d0fe474d81b381d766924dbdad65f22934b1aa1e781bbc3c6817d794bfd5f86b1fdc9615d61a77ab7aee7edb5db12640fd166a16fdb8fe7c21ec1c0fb45c37859233f51d0194a54a841b7bc87ae7edc977ca8f0877af16de3878c9b2787473189403e7d026b493c0e3dae8fa3fe579f011795608fc824db1fde7dfb437386e1356e7ab1e7e50c7a940d17a3ebaf7b4cf31e02de42531f39960664068e220d1fe55c9ff4903d352513d25f59db5127400197697452e9044c1ef2a06598d413c2a86658874f0eddfdbcc3003a7eb73f9ab8a6e13e133b490944338a14a6db5160005966269a388a907ad0903790fea11d65b84c4e51f2ceb49d6433e9b0c08f3ec8fe44eed573afc795b0ef204814e0b8eb768649d540f857284046e07e3dc686a56eb4b52ddb04f1b6b084d5b262a459bac86d06caf86e5abf28c847e433be32beb241b8976787d9b56cc732efeb5efd766b0abb61d2fcf9d8db609724beaabc7a12293d09ec803f4da38929b7a830a970e277380dddc4a90ff8e0e587426f4cf9e0beecafc9dd88cec441adbbf583b85ee81e275b96d4d8968d0fdbaadb08dd2aa77d9c578179bd6f6ae2437309d2f37eb379cafbb939f2ceaff1cc139dec8c75707d6b25401bb8c0d034ab7f0bbc19e6c3681dba56d3bb2a917c7206be6f722feb5e3c0ee144e425585aa0fae05219072306496a1e5a535757e61e2ef6199bcf18ede80fb2e329bc5b62a20c6ffc3be1a9e55dd6a1b1d1c4addad94998e24697a1895b6213c54095801a0f5830b827d5efc1e100447eb399dbfa248b3fa377f066fbf4a04bd1d279cc3247ebb7750280a67ad89103f55fb7cae2513c99fbebfd6aefe2d6a9f07362fdb73b6d73d13e0794b400bec5b056c0bb2cd517073ef2974a53c4a9a5588c47e7e6a6b0a9a66f1e50922ec83fb19f9780953ce38f6deceb9e49fe4095fb8d2a4e49878a29a7a059d398050748ff6d34ec0619caca4b6c43ad308c3644f538307d2f95ba6b3cfda41ae10d335a2b3b874edb782ef5ece17851754002c6c177b842356811720b528022b9a09f2e2aeaea895ed8c2f7f0377597279686af437e35b6b1b16f46362b23288d40d113fef22c5cc10b86102294a23a21345ca49f7e94d4d8598089339aed78df9c86bb1d19842fa4b0eaa990b8813c065c298ae4f9843a039b133c5d09303ca55df76f007f36bda5f3087ae64e00c585405c40cb8b1096eb2a661d52e76283a4c523def128b3a9de2579340a76acbc49d1dbc3b767074590ef37bb60e9baf4511ebd180017b5003fdada6edc5521601929864009670c5ec37518427ce447e659bbc13d9fc4689ae56e3624e621b27310a1e197883d00ce05bdb20b63bc4ebae53e69faedf5311152a6d819a826de52f790d700d2ea0fc8fc977da2be4bd99688d0e6e7af57f4c82de0432a5f260a0dbf012218db8a55ccdcd1e2a5fb6efaff62235fb092021e2772c55f5bd2bbaba093b280eccccfc260f83017322a09680a57eb8b305fca101146df07effb53864ba4de8ddb9f4271dec09fa13cb2a7eb8785706a73ee4c417a4822813cc81c121e24a500da88bcdaa96fa26304a6c7e7e6235be20e129038fb6024c34853ea88ebef06d8f91f96a8ddb92656215bd0666ead5a164a875133016a2c1eeb336140b6f8f16a9eea79d3e7582b825f716d0b9c48ba3d8bafb121eeaff00f143e7a4f27d92055c1a0f2c21fd652d21762edc66683cf6791ee58e82da32cc4f0fe0b06a28f9ee3b28725ed27b813508e88c6776081bfc088a06a6a94f5d016db8fa9da1384c976d264d9a63e4fa809facaa909a202b65a117610666bd697ac2e023f1c3b7b986844e8d28f3dcd2d208c4976c68cadc71cbc18441eade917360423a26aed5a5aa24ca8180c5589684103427b764fec440ca8c679dbd0a793979174383f032e0c1fade213f2f32bb778c757eb44af5ef5b90fccb5199ba4f5b285a94902192a8000717cb7650144f0adf6e34153688875c1e60293c65d8e93dff6e9ed1c7ccac6e50b441b8b369c8d586be4639de604e0606b0e113779ea6096789d723290dc94fb0906b0480d09161d51fb90fdf3ecfcff56ea64ac90454f86dc8e1faa10385f931f08f59e890cead825dab90f57b13ca6e3ca3c362cf292823cd3aa36909a07ffc9efacc93e1a1e2283cfd79023cf560706a6cd648bac85dcf02c7d1c1a43f44de24e76de7c1998930fda50fa0179e593464a29e3d1e4a546c8a327d9ce2d84d7ff96181d0b3556c9f4400d38f3be313251a49cd02a35cc8290394c8925511e5ce8332c36a8b28a3993007f27a1267dbcb1b0004b65b87b134b72f39bd861efe275cf9f1611dbbc37ec9f014359f4a5b0604b9cd8bbe04ce0a95a699d083716515138746296fd3fd0929ec56491ed353ac3478585d3692dba10880681c29b15baf927d8ba971c5d653d30856855fcce930d994fabb831dc5e614c848ced0ac5f60eed933255c6ab70e2bcf48e576a5eaa2a603bf708a52bc61b872b6ff8591bdb915dae238e4884f1f399ef367f4ac7839f7b019b792e1922510e1f0f69542517b80968ed3ade7e9d3fdde2e39fe9bb863c3b36a47198ee89911ae0f379905d982a7c2741abf53523cf9f2a885b8dee0d886a00ad12eb4c32599e2a10bdbd2513a72b4adb2fd24fc75d4932fe8bebab2fc2f8a9881d405eb84bd21cbaa3498ec2a5843f3e0892e9075cc2498049af7e9c0ac9ee4cff3911c05b9f09ee9db4a6f2587847e2622431402324d0b9794c43cf17cb04551a2a84c154caddd892ae0ce32ce73a88b19ad1e5120bccb5d0c8541587ae31746f8cded30e7642ae82d5fd401fc50e50e0b8efd341b29fed1552ccbbf8a2a3e0c0f9a6925acfc961491e5f69ee45fb729385fd97ba7f251174d8b986e9b295181deedefd9f75cc80130435c09a5fc31ea49f3b7b2df20c02fc66437bf21ca609228a655b2b4f87f32bff7cca9f21c9bfa16c7104644a1a38a4b647316256b244444e77620769c5bb12638da7ed25333ec7310ddff2312e5de003b43bba748fc677b5af3fe3ca654d3270398d7e49d725a1a5d36e929ccc1e2488ecd51cdf781122bdd9a1aa749c07adce877e3222e6e97245f3060058c7fdacdef6f896f55872183ea6d1797fae060a87a92c023401bd07a46427c1c3e27eff005ace933d32a0413cae2d5805a7a517c0bad9e526b453402bc4cb721fc9aca338966d8bacadca312d99892dbb4f98243ba41de47d153addf0da392110345b5e7e5922a173dbceebb1401e1fb0f0f7ac8a93a2aec27d2c346b541c3e14de127cd1a74369e9fb8b4070edacc7a28ee90db25c5259855f0bdfcdfb48082fdddf6d8aa9a73acb28d264dd228c9b8fba1281c081d89f107a309cc9307afbf6a044f5e9f72d22fec0bc6cd0535eee013087a2051b6c352351caa4f652df1dc6be0526ee0665b8b4ee48ce803f7479738035be822107513411240657e19940c50cf7859bcc0fd842d009c4ce785c943a7985aac1e2ae13e1c0885467f5f41abc6e29e1a5b77c14abcc2efd565cbff9de8e85b88dd30042d26b4b432a340aef9195e154965cb5a3c363b38c61ec205a7c0e67614a2aeed5d38f0fee727dccadfe64c8e467facbe8e8c22f6562c22ef40ef8c6f96b618619ec0c9d59cd965229ec66d1b000901b40e036dcb9034e629270c360f87a21b718683aec3420443f6f579f943bda6e45050d76100576604617d19116fdcce497ed264dbc686264dd0bc0912efb4b476b9b2428882f6bc6cfe0c876b3493bba917cf60d654ba85b8150ea142cfdf5711d88eb3c84550a417e2ea5c9d9f4a3b8959782749fb53f9493ce93ac34ebf5b3935e038865627dc9e90306702f5b1333b9350b81973ad2ae7a8dc28859896f0dad12a3b8483df3a7d9ce8ff9a0aa2b3335b5ebc16dd4c0c4ef4cc5fca30e9562efefcae38df91cdbee8f8ba943afdc049ed89abcd5f98f67fc792269ab365842c1d43e55a73e8543f74c4bf46f508d83fd0ffa95c9d3d98a83f2d67de7d75429f4b34c9c4dd9f7eafe57c1918e927aea8532053387087ddeb0725c2d66998ed7ad63b6226c09dda971eaaeffb3dfefe852c21a484410efbf91664c2cff9546ef961bb8f5297da870849e0cb84db98efdf62e08505cf37377f4e4cedae394e08f147b68814dd639451333dfd321ef4a57daa2d7e70c52405259ae0c853754ae4af360b064d96cd7cc201378b63e057dde52a3d844153ea2f8c5dfa34b7609523066a7f5b7ee779e318c8bbe5a2a6ea4cb32d0747e5d4e80d2c5907c85109ea080fbfaa4349fee04454e52dd0bab253facb42400fef9e5dab61ca38c733edf7bebecd1b894819471dc0c26f2a8047d28f656a3a4b6aa1f24896ea3ba75e6051809a8a8cc19932020898462816c3675aa647cd72e87df780df2da9ffda2f614ff208e4895b8bfe8e49e292c80c38ea0b46dbd80f2b600ee87aa57704f77d42bdaabd14b9449bdb6d30ea3906f03265af6cd098218464ee703faaa7104de784e59aa4ed664d5096031d61a75a82fd36db6a7978ca654c57e2a68a47ac3741efc5d9f5ce818f7fc82b2966a2b3f13730449363819ae6ccd3bd1b4d7f0b4a7a1894cd96976cc506380f572d98e565694b1c3e3ad6cb55b0386d31f82769feb482fefc2442e0cf8c367800f016b6a5689b45736188e6f33e9cf82a803e20f11e790e8c2fac7bc666177afc3b92323abde42132510e8534fdf5442ec69ceaf5c31637ad6190a5bfce49db6fe47ee9d6b1001485dbf847a29ee63e51fd64a5f247acbe89a5447cabc70fc43fc8266393152c2298e0929057bb23f50d1175b962bf9e6e37641ebe699f496227ef6a364aec861bfd7abdbe16e1d973157018a0e56da8a84fb70461e661046d202526c128370e328dedc4409fbed873ef25866930eb95235640b4dbf125e93279c43536a8743fee4a05177306d08dc32540ca6582eb8b9f3ef41e10ec7ea65bc5642d4a8f2613077430761d72953d708fa67a86949eb7530d85f15ee03313cdbf6436249c1da9277ba652c05095b13b9e9ad0df0a1bb280f4a96d8e34890c19bb2cb8c984d17657f3b66c30bc195046075a35c7ea9b5207279dd06a041b76d85cf681828d9bad63ebda68d78a93b75707c9ec473bdf9c092344853c90a17f2a93362a3460a59aa68acce5536b4924ba250900ed97800ceae066fb1bd8710241b5d0819f3aaa", 0x1000}], 0x5, &(0x7f0000001580)=[{0x28, 0x113, 0xc04, "95ab3d07b587067e5748e3e10b5c982f63"}, {0xe0, 0x111, 0x8000, "2401f08987013b727720cb9d4c225682ed93a21bf7dcfe2f4fe03cff0e64d7f0c92cb4eb32eaac5ebe5b0ee13ebead5e46bb98e89bf86fd615a375dbeee6056d747b31130badab6196c46d08985ad13600fd83ca7a22cc865056aa3715b95806116d668be2821d4a28e14018c0dba2414ec2163a5f45e37644545b084727663a3703439c6644ed8b233236f528a8749f3f9b3035b79042fd69251a3d88a7d1846080370f99aa882dba3864c10bb7471e8091afd7240f6bac2b797a2d99a9aad1571c53dab327d63647"}, {0x50, 0x108, 0x0, "ab7ca13f3cefeb2f18cdb5310752ba766251e23f8f65475e3872e6017678fc00c395bfc2e2aecea91d3d8734df70018b76100a51f43398d5b3eea1"}, {0x30, 0x111, 0x0, "e1cd02cedcef925a34cb3b5052408a2f411dedb98085613553412713183b06"}, {0x110, 0x13b, 0x9712, "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"}], 0x298}, 0x4000) [ 557.835403] IPVS: set_ctl: invalid protocol: 29 172.20.20.170:20002 10:04:16 executing program 2: r0 = socket$inet(0x2, 0x805, 0x400) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:16 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x2ac000}}) 10:04:16 executing program 5: r0 = socket$inet(0x2, 0x40000000000000f, 0xffffffffffffff7f) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f00000000c0)}, 0x0) [ 557.908753] FAT-fs (loop6): error, fat_get_cluster: invalid cluster chain (i_pos 1041) [ 557.916945] FAT-fs (loop6): Filesystem has been set read-only [ 557.917100] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 557.942436] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:16 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x10) 10:04:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xffffa888], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:16 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x4240, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000140), &(0x7f0000000080)=0x68) write$P9_RCLUNK(r1, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) listen(r0, 0x3) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x80350000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:16 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r3, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = gettid() r8 = getuid() r9 = getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000008c0)=0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() sendmmsg$unix(r3, &(0x7f0000000a40)=[{&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000440)="4276f66363ee4d8e195427ca42fa91753f63d83d751f2af918f132b210d7066a145a9b2532a898c41bd0af61ea7788197493047df08c7db3764a34c75c328903110d549af95bcb697e8be552a9b65a4c27726b11f81d7764424b8721bf78face929ccecefe331d8465d976154e2327ad", 0x70}, {&(0x7f00000004c0)="5ffe49a457f23f1085debbf59ca8939e880d972dc0c0729ab436032cb0e6d4c8080e371df468a2e70d201444539c7c7a935f3812d8470962993915a28f9e9d4b413b910919f0d298833bd124750c0f1957ee217bede82adf67ab8891fe6450cf66b1822e6f229605ef20f8a438687f162aeb893ce5ae52f4576f7ab42f97caf02835886e4aad1042cada544fdfcc94617854439fcdb187a59c26adf26278a63c1cea9d939b4a62217f42e7606ef917c015a10365368acd88d01b78d1bfd645f2f3c27d338fce04024856e1387a00d65bd6a1fa639688ed889242de3a6edb", 0xde}, {&(0x7f0000000640)="5a06a7f0f02a050b9b75ea0ca268f82de11b759f3024cc11cd10dc9800b03e7c60211afdac479b9b5d1f7d4dadb78cdb4564deca61f078c9fe5752567f34b75bbeb6", 0x42}, {&(0x7f0000000040)="90fdd51f76ca0a225f86", 0xa}], 0x4, &(0x7f00000009c0)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x18, 0x1, 0x1, [r1, r3]}], 0x78, 0xc0c0}], 0x1, 0x80) write$binfmt_elf64(r3, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}], "", [[], []]}, 0x278) truncate(&(0x7f0000000100)='./file0\x00', 0x0) sendmsg$key(r2, &(0x7f0000cd0000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85000)={0x2, 0x1, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}}]}, 0x60}, 0x1}, 0x0) sendmsg$key(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 10:04:16 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x182000}}) [ 558.140732] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 558.153746] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:17 executing program 6: r0 = request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000000c0)='\\posix_acl_access\x00', 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000244000)) keyctl$setperm(0x5, r1, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000000140)={@rand_addr, @broadcast}, &(0x7f0000000180)=0xc) 10:04:17 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000000c0)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:17 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4003000000000000]}, 0x10) 10:04:17 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = socket$inet(0x2, 0x800, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x9}, 0x4) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0xc, @multicast1=0xe0000001, 0x4e22, 0x1, 'lc\x00', 0x2, 0x6, 0x3b}, 0x2c) 10:04:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x74], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:17 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x1f8000}}) 10:04:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xe803], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:17 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}, 0x10) [ 558.278746] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:17 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, r2) 10:04:17 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r3, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = gettid() r8 = getuid() r9 = getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000008c0)=0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() sendmmsg$unix(r3, &(0x7f0000000a40)=[{&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000440)="4276f66363ee4d8e195427ca42fa91753f63d83d751f2af918f132b210d7066a145a9b2532a898c41bd0af61ea7788197493047df08c7db3764a34c75c328903110d549af95bcb697e8be552a9b65a4c27726b11f81d7764424b8721bf78face929ccecefe331d8465d976154e2327ad", 0x70}, {&(0x7f00000004c0)="5ffe49a457f23f1085debbf59ca8939e880d972dc0c0729ab436032cb0e6d4c8080e371df468a2e70d201444539c7c7a935f3812d8470962993915a28f9e9d4b413b910919f0d298833bd124750c0f1957ee217bede82adf67ab8891fe6450cf66b1822e6f229605ef20f8a438687f162aeb893ce5ae52f4576f7ab42f97caf02835886e4aad1042cada544fdfcc94617854439fcdb187a59c26adf26278a63c1cea9d939b4a62217f42e7606ef917c015a10365368acd88d01b78d1bfd645f2f3c27d338fce04024856e1387a00d65bd6a1fa639688ed889242de3a6edb", 0xde}, {&(0x7f0000000640)="5a06a7f0f02a050b9b75ea0ca268f82de11b759f3024cc11cd10dc9800b03e7c60211afdac479b9b5d1f7d4dadb78cdb4564deca61f078c9fe5752567f34b75bbeb6", 0x42}, {&(0x7f0000000040)="90fdd51f76ca0a225f86", 0xa}], 0x4, &(0x7f00000009c0)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x18, 0x1, 0x1, [r1, r3]}], 0x78, 0xc0c0}], 0x1, 0x80) write$binfmt_elf64(r3, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}], "", [[], []]}, 0x278) truncate(&(0x7f0000000100)='./file0\x00', 0x0) sendmsg$key(r2, &(0x7f0000cd0000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85000)={0x2, 0x1, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}}]}, 0x60}, 0x1}, 0x0) sendmsg$key(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 10:04:17 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0xb0000}}) 10:04:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe80], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:17 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x6, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000200)}, 0x10) pread64(r0, &(0x7f0000000040)=""/154, 0x9a, 0x0) [ 558.340603] IPVS: set_ctl: invalid protocol: 12 224.0.0.1:20002 [ 558.368918] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 558.411565] IPVS: set_ctl: invalid protocol: 12 224.0.0.1:20002 10:04:17 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x10) 10:04:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6800], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r1, 0x8}, &(0x7f0000000140)=0x8) ioctl(r0, 0x8912, &(0x7f0000000180)="025cc83d6d345f8f762070") r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 10:04:17 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r2 = semget(0x2, 0x0, 0x0) semctl$SEM_INFO(r2, 0x2, 0x13, &(0x7f0000000280)=""/137) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600), 0xffffffffffffff5a}, 0x0) [ 558.467449] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:17 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:17 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x288000}}) [ 558.551346] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f00000007c0), 0xfd06, 0x20000008, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x4, 0x8}, {0x2, 0x10001}, {0x401, 0x7}, {0x7fff}, {}, {0x7fff, 0x4}]}) 10:04:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffdd86], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:17 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x10) 10:04:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x100000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:17 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r3, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = gettid() r8 = getuid() r9 = getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000008c0)=0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() sendmmsg$unix(r3, &(0x7f0000000a40)=[{&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000440)="4276f66363ee4d8e195427ca42fa91753f63d83d751f2af918f132b210d7066a145a9b2532a898c41bd0af61ea7788197493047df08c7db3764a34c75c328903110d549af95bcb697e8be552a9b65a4c27726b11f81d7764424b8721bf78face929ccecefe331d8465d976154e2327ad", 0x70}, {&(0x7f00000004c0)="5ffe49a457f23f1085debbf59ca8939e880d972dc0c0729ab436032cb0e6d4c8080e371df468a2e70d201444539c7c7a935f3812d8470962993915a28f9e9d4b413b910919f0d298833bd124750c0f1957ee217bede82adf67ab8891fe6450cf66b1822e6f229605ef20f8a438687f162aeb893ce5ae52f4576f7ab42f97caf02835886e4aad1042cada544fdfcc94617854439fcdb187a59c26adf26278a63c1cea9d939b4a62217f42e7606ef917c015a10365368acd88d01b78d1bfd645f2f3c27d338fce04024856e1387a00d65bd6a1fa639688ed889242de3a6edb", 0xde}, {&(0x7f0000000640)="5a06a7f0f02a050b9b75ea0ca268f82de11b759f3024cc11cd10dc9800b03e7c60211afdac479b9b5d1f7d4dadb78cdb4564deca61f078c9fe5752567f34b75bbeb6", 0x42}, {&(0x7f0000000040)="90fdd51f76ca0a225f86", 0xa}], 0x4, &(0x7f00000009c0)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x18, 0x1, 0x1, [r1, r3]}], 0x78, 0xc0c0}], 0x1, 0x80) write$binfmt_elf64(r3, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}], "", [[], []]}, 0x278) truncate(&(0x7f0000000100)='./file0\x00', 0x0) sendmsg$key(r2, &(0x7f0000cd0000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85000)={0x2, 0x1, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}}]}, 0x60}, 0x1}, 0x0) 10:04:17 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x10800, 0x0) 10:04:17 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0xc9000}}) 10:04:17 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(r2, &(0x7f00000075c0)=[{&(0x7f0000006300)=""/247, 0xf7}, {&(0x7f0000007500)=""/192, 0xc0}], 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) fchdir(r2) listen(r0, 0x3) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000240)=&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000000)={0x9, 0x2, 'client0\x00', 0x4, "c7a4c90e82d553dd", "b530d04d9357c4b781661fa010ecbc32f2958c3c9b0ebcce63150cef0039ba31", 0x3, 0x5}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e22, 0xff8, @ipv4={[], [0xff, 0xff]}, 0x869}, @in6={0xa, 0x4e20, 0x1, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x1}, @in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x3, @loopback={0x0, 0x1}, 0x4000}], 0x64) name_to_handle_at(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="c2000000ffffffff9a88634801d281f31cd584fb8e886c34b609f3b704dbf35fa8112c6490589ff8246e4d0650bb41fdf2c4a0e9b808bc6c2aca87de071f5554b31360622bd6be575cb44735136d7228b795b1983a2c9bc342c369002b506ebb7a1d9b8f9b834c84ba27676ac137952aa831603590184642ca247a346f37d7d213209bc8a98703b87246360e66dd1dd077e9cfb68ed6c8a6d69ec9a8cecd9d8112c2a0892efb62c358340ace12aac5847c53553a868d04a46bdebd26eac41568e0ed45ec0ed156c245f16424428f55e5d18a28d1457001265062368e5d4cd62147be6263227131b795afbb728081d91cb70abbc42cd2a45d73b2ce78a2dc6c965763a4b6aa9bb3877b45bb68f7503b41bd0cf8a2fd2e84a5226abfe3e370fd1c43db940913392303405db83d99a5f13db4e9d12ffbe267cabe638c9dc5a46faacb53462fa2ed4bf1506df56d3c6bb94f095779ced910a2054d330f2f7591417decc543c67af0c62b1b54eb0bf73f481a24b8b15aa8525696876e68acee52d72cd5015dd563897453e03dba77b2a0f78949439cb749ade560eee2136eac363120b0a33c02b995a096b4a87a7b253d81"], &(0x7f0000000180), 0x1000) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:17 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x5) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x2, 0x100000001}) bind$alg(r0, &(0x7f00001e3fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent)\x00'}, 0x58) r1 = dup2(r0, r0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000040)={0x2, 0x6, 0x6, 0x0, 0x2, 0x0, 0x10001, 0x101, 0x81, 0x3ff, 0x0, 0x8, 0x0, 0xaf0, 0x0, 0x31, 0xfffffffffffffff7, 0x7453, 0x1}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x397) [ 558.702538] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:17 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, 0x10) [ 558.753072] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x86ddffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:17 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x124000}}) 10:04:17 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0xe9d7) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) epoll_create(0x4) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x2, 0x1, 0x2, 0x2, 0x97}}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000002c0)=""/246) 10:04:17 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r3, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = gettid() r8 = getuid() r9 = getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000008c0)=0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() sendmmsg$unix(r3, &(0x7f0000000a40)=[{&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000440)="4276f66363ee4d8e195427ca42fa91753f63d83d751f2af918f132b210d7066a145a9b2532a898c41bd0af61ea7788197493047df08c7db3764a34c75c328903110d549af95bcb697e8be552a9b65a4c27726b11f81d7764424b8721bf78face929ccecefe331d8465d976154e2327ad", 0x70}, {&(0x7f00000004c0)="5ffe49a457f23f1085debbf59ca8939e880d972dc0c0729ab436032cb0e6d4c8080e371df468a2e70d201444539c7c7a935f3812d8470962993915a28f9e9d4b413b910919f0d298833bd124750c0f1957ee217bede82adf67ab8891fe6450cf66b1822e6f229605ef20f8a438687f162aeb893ce5ae52f4576f7ab42f97caf02835886e4aad1042cada544fdfcc94617854439fcdb187a59c26adf26278a63c1cea9d939b4a62217f42e7606ef917c015a10365368acd88d01b78d1bfd645f2f3c27d338fce04024856e1387a00d65bd6a1fa639688ed889242de3a6edb", 0xde}, {&(0x7f0000000640)="5a06a7f0f02a050b9b75ea0ca268f82de11b759f3024cc11cd10dc9800b03e7c60211afdac479b9b5d1f7d4dadb78cdb4564deca61f078c9fe5752567f34b75bbeb6", 0x42}, {&(0x7f0000000040)="90fdd51f76ca0a225f86", 0xa}], 0x4, &(0x7f00000009c0)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x18, 0x1, 0x1, [r1, r3]}], 0x78, 0xc0c0}], 0x1, 0x80) write$binfmt_elf64(r3, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}], "", [[], []]}, 0x278) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:17 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x810, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040)={0x0, 0x0, 0xb99, 0x10001, 0x80, 0x7, 0x5}, 0xc) 10:04:17 executing program 5: r0 = socket$inet(0x2, 0x6, 0x7) socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x0, 0x4400) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000100)}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xcc, &(0x7f0000000280)=[@in6={0xa, 0x4e22, 0xfffffffffffffffb, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x910}, @in6={0xa, 0x4e24, 0x7fff, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0xc61}, @in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e23, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x5}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e20, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}, 0x80}, @in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e23, 0xf53, @mcast2={0xff, 0x2, [], 0x1}, 0x80000001}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}]}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000400)={r2, 0x10000}, &(0x7f00000004c0)=0x8) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:17 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe0]}, 0x10) 10:04:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf5ffffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:17 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x26d000}}) [ 558.941983] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:17 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x80040) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) read(r1, &(0x7f0000000240)=""/206, 0xce) [ 559.004023] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:17 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0]}, 0x10) 10:04:17 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r3, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = gettid() r8 = getuid() r9 = getgid() ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000008c0)=0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() sendmmsg$unix(r3, &(0x7f0000000a40)=[{&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000440)="4276f66363ee4d8e195427ca42fa91753f63d83d751f2af918f132b210d7066a145a9b2532a898c41bd0af61ea7788197493047df08c7db3764a34c75c328903110d549af95bcb697e8be552a9b65a4c27726b11f81d7764424b8721bf78face929ccecefe331d8465d976154e2327ad", 0x70}, {&(0x7f00000004c0)="5ffe49a457f23f1085debbf59ca8939e880d972dc0c0729ab436032cb0e6d4c8080e371df468a2e70d201444539c7c7a935f3812d8470962993915a28f9e9d4b413b910919f0d298833bd124750c0f1957ee217bede82adf67ab8891fe6450cf66b1822e6f229605ef20f8a438687f162aeb893ce5ae52f4576f7ab42f97caf02835886e4aad1042cada544fdfcc94617854439fcdb187a59c26adf26278a63c1cea9d939b4a62217f42e7606ef917c015a10365368acd88d01b78d1bfd645f2f3c27d338fce04024856e1387a00d65bd6a1fa639688ed889242de3a6edb", 0xde}, {&(0x7f0000000640)="5a06a7f0f02a050b9b75ea0ca268f82de11b759f3024cc11cd10dc9800b03e7c60211afdac479b9b5d1f7d4dadb78cdb4564deca61f078c9fe5752567f34b75bbeb6", 0x42}, {&(0x7f0000000040)="90fdd51f76ca0a225f86", 0xa}], 0x4, &(0x7f00000009c0)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x18, 0x1, 0x1, [r1, r3]}], 0x78, 0xc0c0}], 0x1, 0x80) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:17 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000240)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000950000000000000000000000000000000000000000000800000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xf8) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x900000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x500000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:18 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f00000001c0)={0x1, 0x2de, 0xffffffffffffb528}) 10:04:18 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x12c000}}) [ 559.134124] kernel msg: ebtables bug: please report to author: Wrong nr of counters [ 559.163466] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:18 executing program 6: r0 = socket$inet(0x10, 0x2, 0x6) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x22, &(0x7f000001bc78)=@raw={"0500000002000200000000000000000018000000030300", 0x9, 0x3, 0xffffffffffffff22, 0x0, 0xffffffff, 0xffffffff, 0x120, 0xffffffff, 0x258, 0xffffffff, 0xffffffff, 0x258, 0xffffffff, 0x3, &(0x7f000002cfd0), {[{{@uncond, 0x0, 0xa8, 0x52}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x4, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x2e) sendmsg(r0, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000006ff0)=[{&(0x7f0000005000)="10000000150061dd18c84c16290c729b", 0x10}], 0x1, &(0x7f0000001f88)}, 0x0) recvmsg(r0, &(0x7f0000005fc8)={&(0x7f0000035ff8)=@un=@abs, 0x8, &(0x7f0000027000), 0x0, &(0x7f000002b000)=""/12, 0xc}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x827, 0x400000) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f00000000c0)=0x1) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) 10:04:18 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa03000000000000]}, 0x10) 10:04:18 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r2, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000008c0)) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) getgid() truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x700000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 559.193880] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 559.232633] kernel msg: ebtables bug: please report to author: Wrong nr of counters 10:04:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x200000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:18 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockname$packet(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000002c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001d40)={0x0, @local, @multicast2}, &(0x7f0000001d80)=0xc) accept4$packet(r1, &(0x7f0000001dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001e00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002100)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@rand_addr}}, &(0x7f0000002200)=0xe8) getpeername$packet(r1, &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000002280)=0x14) recvmmsg(r0, &(0x7f0000005680)=[{{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000022c0)=""/218, 0xda}, {&(0x7f00000023c0)=""/45, 0x2d}, {&(0x7f0000002400)=""/160, 0xa0}, {&(0x7f00000024c0)=""/220, 0xdc}, {&(0x7f00000025c0)=""/174, 0xae}, {&(0x7f0000002680)=""/9, 0x9}, {&(0x7f00000026c0)=""/151, 0x97}, {&(0x7f0000002780)=""/92, 0x5c}], 0x8, &(0x7f0000002880)=""/148, 0x94, 0x9}, 0x4}, {{&(0x7f0000002940)=@in={0x0, 0x0, @broadcast}, 0x80, &(0x7f0000002a80)=[{&(0x7f00000029c0)=""/115, 0x73}, {&(0x7f0000002a40)=""/25, 0x19}], 0x2, &(0x7f0000002ac0)=""/81, 0x51, 0x3}, 0x5b7}, {{&(0x7f0000002b40)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000002bc0)=""/216, 0xd8}, {&(0x7f0000002cc0)}], 0x2, &(0x7f0000002d40)=""/114, 0x72, 0xffff}, 0x2}, {{0x0, 0x0, &(0x7f0000002f00)=[{&(0x7f0000002dc0)=""/17, 0x11}, {&(0x7f0000002e00)=""/207, 0xcf}], 0x2, &(0x7f0000002f40)=""/40, 0x28, 0x3}, 0xfffffffffffffff8}, {{&(0x7f0000002f80)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000003100)=[{&(0x7f0000003000)=""/14, 0xe}, {&(0x7f0000003040)=""/180, 0xb4}], 0x2, &(0x7f0000003140)=""/253, 0xfd, 0x8000}, 0xe17}, {{&(0x7f0000003240)=@hci={0x0, 0x0}, 0x80, &(0x7f00000042c0)=[{&(0x7f00000032c0)=""/4096, 0x1000}], 0x1, &(0x7f0000004300)=""/10, 0xa, 0x3}, 0x2}, {{&(0x7f0000004340)=@in={0x0, 0x0, @multicast2}, 0x80, &(0x7f0000005580)=[{&(0x7f00000043c0)=""/220, 0xdc}, {&(0x7f00000044c0)=""/4096, 0x1000}, {&(0x7f00000054c0)=""/48, 0x30}, {&(0x7f0000005500)=""/81, 0x51}], 0x4, &(0x7f00000055c0)=""/177, 0xb1, 0x6}}], 0x7, 0x40, &(0x7f0000005840)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000058c0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000006100)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000006200)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000073c0)={@loopback, @loopback, 0x0}, &(0x7f0000007400)=0xc) recvmmsg(r1, &(0x7f0000007940)=[{{&(0x7f0000007440)=@can={0x0, 0x0}, 0x80, &(0x7f0000007580)=[{&(0x7f00000074c0)=""/181, 0xb5}], 0x1, &(0x7f00000075c0)=""/11, 0xb, 0xffffffff}}, {{&(0x7f0000007600)=@l2, 0x80, &(0x7f0000007880)=[{&(0x7f0000007680)=""/183, 0xb7}, {&(0x7f0000007740)=""/221, 0xdd}, {&(0x7f0000007840)=""/22, 0x16}], 0x3, &(0x7f00000078c0)=""/75, 0x4b, 0x80000000}, 0x7}], 0x2, 0x10040, &(0x7f00000079c0)={0x0, 0x989680}) accept4$packet(r1, &(0x7f0000007a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000007a40)=0x14, 0x80000) getsockname$packet(r1, &(0x7f0000007a80)={0x0, 0x0, 0x0}, &(0x7f0000007ac0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@rand_addr, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000007c00)=0xe8) recvmsg$kcm(r1, &(0x7f0000007e00)={&(0x7f0000007c40)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000007d40)=[{&(0x7f0000007cc0)=""/55, 0x37}, {&(0x7f0000007d00)}], 0x2, &(0x7f0000007d80)=""/110, 0x6e, 0x8}, 0x40) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000007e40)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000007f40)=0xe8) recvmmsg(r1, &(0x7f00000094c0)=[{{&(0x7f00000081c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008240)=""/140, 0x8c}], 0x1}, 0xffffffffffffff81}, {{&(0x7f0000008340)=@nfc_llcp, 0x80, &(0x7f0000008500)=[{&(0x7f00000083c0)=""/70, 0x46}, {&(0x7f0000008440)=""/191, 0xbf}], 0x2, &(0x7f0000008540)=""/75, 0x4b, 0x3ff}}, {{&(0x7f00000085c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000008b80)=[{&(0x7f0000008640)=""/78, 0x4e}, {&(0x7f00000086c0)=""/134, 0x86}, {&(0x7f0000008780)=""/142, 0x8e}, {&(0x7f0000008840)=""/246, 0xf6}, {&(0x7f0000008940)=""/132, 0x84}, {&(0x7f0000008a00)=""/211, 0xd3}, {&(0x7f0000008b00)=""/16, 0x10}, {&(0x7f0000008b40)=""/54, 0x36}], 0x8, &(0x7f0000008c00)=""/87, 0x57}, 0x8}, {{&(0x7f0000008c80)=@l2, 0x80, &(0x7f0000008e80)=[{&(0x7f0000008d00)=""/170, 0xaa}, {&(0x7f0000008dc0)=""/189, 0xbd}], 0x2, &(0x7f0000008ec0)=""/159, 0x9f, 0x10200000}, 0x6}, {{&(0x7f0000008f80)=@ax25, 0x80, &(0x7f00000093c0)=[{&(0x7f0000009000)=""/64, 0x40}, {&(0x7f0000009040)=""/248, 0xf8}, {&(0x7f0000009140)=""/47, 0x2f}, {&(0x7f0000009180)=""/242, 0xf2}, {&(0x7f0000009280)=""/115, 0x73}, {&(0x7f0000009300)=""/171, 0xab}], 0x6, &(0x7f0000009440)=""/127, 0x7f, 0x4d37}, 0xc51}], 0x5, 0x10102, &(0x7f0000009600)={0x77359400}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000009640)={'syzkaller1\x00', 0x0}) getpeername$packet(r1, &(0x7f0000009680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000096c0)=0x14) getsockname(r1, &(0x7f0000009700)=@hci={0x0, 0x0}, &(0x7f0000009780)=0x80) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000009e00)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80002}, 0xc, &(0x7f0000009dc0)={&(0x7f00000097c0)={0x5c8, r2, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x1ac, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x1e4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r13}}, {0x8, 0x7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0x84, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xa4}}, {0x8, 0x7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r17}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r18}}}]}}, {{0x8, 0x1, r19}, {0xf4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r20}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x10001}}, {0x8, 0x6, r21}}}]}}]}, 0x5c8}, 0x1, 0x0, 0x0, 0x8000}, 0x54) connect$rds(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:18 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x24000, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x8001, 0x80000000, 0xd}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0x3}, &(0x7f0000000100)=0x8) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000008000f0fffeffe809000000fff5dd00000010000100090a0800410400000000fcff", 0x58}], 0x1) 10:04:18 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x214000}}) 10:04:18 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x10) 10:04:18 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000040)=0xdf93) r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r1, 0x3) sendto$inet(r1, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:18 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r2, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000008c0)) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) truncate(&(0x7f0000000100)='./file0\x00', 0x0) [ 559.321296] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 559.348856] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:18 executing program 6: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x400000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x40, 0x0, 0x100000000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00006e9ff8)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@mcast1, 0x0}, &(0x7f0000000080)=0x3b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev={0xfe, 0x80, [], 0x1a}, @in=@dev={0xac, 0x14, 0x14, 0x16}, 0x4e22, 0x2, 0x4e22, 0x7fffffff, 0xa, 0x80, 0x0, 0xec, r2, r3}, {0xc3, 0x69, 0x100000001, 0x5, 0x1d7, 0x0, 0x4, 0x7}, {0x4, 0x2, 0x3, 0xcde}, 0x4, 0x6e6bbf, 0x1, 0x1, 0x1, 0x3}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4d3, 0xff}, 0xa, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x34ff, 0x4, 0x0, 0xfd, 0x8, 0x101, 0x3}}, 0xe8) write$P9_ROPEN(r0, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x52, 0x4, 0x7}, 0x1}}, 0x18) ioctl$TIOCSCTTY(r1, 0x540e, 0x5) getxattr(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000b29f57)=@known="73656375726974792e6361706162696c69747900c9bd3012983e02155960196a2a84585f19c1c826172982a8de1ccc4cdc6987ffc9715cef22cee4c673d4388d5e5604a0b838afb35bd352e4c9ee649a771208309ca436bf919fd9636bfa255ff4b31f40f88ecc9c2d812171c412624f0c142fc54f65f49239f27686c17d489e925da19bf31e30ec75cd92237957661ce8a1568418e6d3d428174f89a11cc821fbf64122a36f6b411c", &(0x7f0000227f74)=""/140, 0x0) 10:04:18 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x333000}}) 10:04:18 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}, 0x10) 10:04:18 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0xe80) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x48000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xe8030000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:18 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r2, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) gettid() getuid() getgid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000008c0)) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:18 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x1f3000}}) 10:04:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper={0x630c}], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20080, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0xffffffc5, 0x0, &(0x7f00000003c0)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)}}], 0x1a, 0x0, &(0x7f00000000c0)="6ff98816142b1bcd965e56c8668ff8696b3893447235d8a8d5ea"}) accept$nfc_llcp(r3, &(0x7f0000000180), &(0x7f00000002c0)=0x60) 10:04:18 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x4, 0x100) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f00000001c0)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) 10:04:18 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xd8e4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r2, 0x5, 0xa, [0x7fffffff, 0x2, 0x3, 0x4, 0x3, 0x6, 0xfffffffffffffff7, 0x8, 0x1c40000000000, 0xa7a]}, &(0x7f0000000180)=0x1c) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 559.558894] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 559.581952] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:18 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x10) 10:04:18 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r2, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) gettid() getuid() getgid() truncate(&(0x7f0000000100)='./file0\x00', 0x0) [ 559.629508] binder: 22605:22606 got transaction to invalid handle [ 559.636050] binder: 22605:22606 transaction failed 29201/-22, size 0-0 line 2852 10:04:18 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x35b000}}) 10:04:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x608], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1100], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 559.744016] binder_alloc: binder_alloc_mmap_handler: 22605 20001000-20004000 already mapped failed -16 [ 559.777985] binder_alloc: 22605: binder_alloc_buf, no vma [ 559.778363] binder: BINDER_SET_CONTEXT_MGR already set 10:04:18 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8802, 0x0) readv(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/1, 0x1}, {&(0x7f0000000280)=""/62, 0x3e}], 0x2) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000140)={0xfffffffffffffffb, 0x1, 'client1\x00', 0xffffffff80000005, "2e654ff8e8966df1", "597dd568481ef7c5fdc5f708ebdd318c70fe10b4219a4e6bdcdceff02505f971", 0x0, 0x4}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80000, 0x0) 10:04:18 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) 10:04:18 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x10) 10:04:18 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x151000}}) [ 559.783652] binder: 22605:22629 transaction failed 29189/-3, size 24-8 line 2967 [ 559.802407] binder: 22605:22606 ioctl 40046207 0 returned -16 [ 559.804504] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 559.819420] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:18 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r2, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) gettid() getuid() truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x2], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1f4], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:18 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x10) [ 559.934078] binder: undelivered TRANSACTION_ERROR: 29189 [ 559.940891] binder: release 22605:22606 transaction 38 in, still active [ 559.947751] binder: send failed reply for transaction 38 to 22605:22606 [ 559.968061] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:18 executing program 6: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7ff, 0x88000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) r1 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x2, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@random="c9b6adf3fe7b", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0xac14140b, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 10:04:18 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x4040, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x8001) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000100)={'icmp\x00'}, &(0x7f00000001c0)=0x1e) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) ioctl$VT_WAITACTIVE(r1, 0x5607) 10:04:18 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x1c4000}}) 10:04:18 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt(r0, 0x1, 0x4, &(0x7f0000000000)="6816d76c6920890b46e208b53b854ef09d240cb67b50817064c91f9ac71d12a2a3bc90d51f204b39be7aaffcd755314f72", 0x31) sendto(r0, &(0x7f0000000240)="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", 0x1000, 0x4000, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x4, 0x0, 0x0, {0xa, 0x4e21, 0x6b, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x80) fremovexattr(r0, &(0x7f0000001240)=ANY=[@ANYBLOB="73f39ac8f2c475e06f518138d34f1605eff78499af8db67572697469b4e578150800511186d789782e7b6c6f00"]) r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r1, 0x3) sendto$inet(r1, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getpeername$inet(r1, &(0x7f0000000080)={0x0, 0x0, @dev}, &(0x7f00000001c0)=0x10) 10:04:18 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r2, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) gettid() truncate(&(0x7f0000000100)='./file0\x00', 0x0) [ 559.992002] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 560.010396] binder: undelivered TRANSACTION_COMPLETE [ 560.015577] binder: undelivered TRANSACTION_ERROR: 29201 [ 560.021070] binder: undelivered TRANSACTION_ERROR: 29189 10:04:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:18 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x10) 10:04:18 executing program 6: r0 = eventfd(0x80000001) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000980)=""/230, 0xe6}], 0x1) write$eventfd(r0, &(0x7f00000000c0)=0xffffffffffffff90, 0x8) r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x40000) setsockopt$inet6_buf(r3, 0x29, 0x2a, &(0x7f0000000100)="6705abbb0643ea7946896efba4e044590ea390d12ac9ca5736c7f3db979f2b08e6c26e08d675406a6de5e5ef51d6b92eac9e3c0e", 0x34) write$eventfd(r0, &(0x7f0000000240), 0x8) read$eventfd(r0, &(0x7f0000000000), 0x8) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000140)) 10:04:19 executing program 5: io_setup(0xf09, &(0x7f00000000c0)=0x0) io_submit(r0, 0x0, &(0x7f0000000100)) r1 = socket$inet(0x2, 0x5, 0x0) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) write$FUSE_INIT(r2, &(0x7f00000001c0)={0x50, 0x0, 0x6, {0x7, 0x1b, 0x3ff, 0x8000, 0xffffffffffffff83, 0x4, 0x9, 0x7fffffff}}, 0x50) 10:04:19 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x4a000}}) 10:04:19 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xfff, 0x6, @ipv4={[], [0xff, 0xff]}, 0x9}, 0x1c) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x62, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080)=0x4, 0x4) 10:04:19 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r2, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) truncate(&(0x7f0000000100)='./file0\x00', 0x0) [ 560.142290] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 560.173149] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6000000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:19 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r2, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:19 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x10) 10:04:19 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x33d000}}) 10:04:19 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x60000, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x2}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000001c0)=0x5, 0x4) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x806], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:19 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffd) getresuid(&(0x7f0000000080), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r3 = getgid() keyctl$chown(0x4, r1, r2, r3) keyctl$negate(0xd, r1, 0x53, r1) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000240)={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}, {0x1, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x28, {0x2, 0x4e23, @loopback=0x7f000001}, 'rose0\x00'}) [ 560.318446] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:19 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r2, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xfe63) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:19 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0xc1000}}) 10:04:19 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x10) [ 560.361419] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4c00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 560.471491] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:20 executing program 6: getgroups(0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff]) setfsgid(r0) setfsgid(r0) 10:04:20 executing program 5: r0 = socket$inet(0x2, 0x4, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2002, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@loopback={0x0, 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @empty, 0x8, 0x8, 0x100000001, 0x100, 0x0, 0x20000, r2}) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x500], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:20 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0xb}, @multicast1=0xe0000001, 0x1, 0x2, [@local={0xac, 0x14, 0x14, 0xaa}, @multicast2=0xe0000002]}, 0x18) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:20 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r1, 0x40086602, &(0x7f00000000c0)=ANY=[]) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:20 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x25b000}}) 10:04:20 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x10) 10:04:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:20 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x78000}}) 10:04:20 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x10) [ 561.355388] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 561.376054] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:20 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) getsockopt$packet_int(r1, 0x107, 0x1f, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$llc(r3, &(0x7f0000000000)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f0000000200)={0x8}) ioctl$sock_inet_udp_SIOCINQ(r5, 0x541b, &(0x7f0000000280)) ioctl$KVM_GET_DEBUGREGS(r4, 0x8080aea1, &(0x7f0000000100)) 10:04:20 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x241, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000140)) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:20 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r1, 0x40086602, &(0x7f00000000c0)=ANY=[]) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x89060000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:20 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000001940)={0x0, 0x48, &(0x7f00000018c0)=[@in6={0xa, 0x4e20, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x1f}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e24, 0xbb7, @mcast2={0xff, 0x2, [], 0x1}, 0x9}]}, &(0x7f0000001980)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000019c0)={r2, 0x1000, "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"}, &(0x7f0000002a00)=0x1008) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffff, 0x7, &(0x7f0000001780)=[{&(0x7f0000000280)="2ab7b82f8b2e53374decd028a9fb2b5a88d2036fce5a36a3a2f15ecc455e1c7f14e17d98b02e788b81437fe32048b61962e52671d06af763204a44def86fc431bb55cab885ea582cee959897439a6f96656b883d62cd3ff0960495e660af69d555624f1471feee1bf15a053e7afc5aa350e08687da7cd1436fb5ce7d968d5fc4d59c65465da132a991963fca9af67f53ef2ec58f95e3314755de907401e4bf24e59b9a0f7b57c8dd79b7354593c547d605976cb26138051a3e4e17fb4e98094e516d1f16ceb76ee101fdd8e0236fe7a830a57183cd939784f0a5701dcbe54a37", 0xe0, 0x1586110a}, {&(0x7f00000001c0)="7990bd12b6535985c949b7e6688036b67cb2740f3227dffbdb32be06c53d88eb953f16f1faf9760fa62f58724be3f6", 0x2f, 0x4d4a}, {&(0x7f00000004c0)="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", 0x1000, 0x9}, {&(0x7f00000003c0)="6848c14d6f84b4e02f66cf2fca54ef408b36e484f94e97d5cca09f8747383794e870960d9688e3f1e8037ccf3020a48f2e2586331e4edba9f1e0e92961e38196d0", 0x41, 0x5}, {&(0x7f00000014c0)="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", 0xfa, 0xff}, {&(0x7f00000015c0)="efcec9716e402ca484884b0714393efa342afdbda375abf73478e86c32c9dc318b50c115c70a72b0c85bcea44004dc6d9d678abbde1f6b36407999ec20151be60c22da4f1a00e500107166d2a6c484a0fb8339c4e415bfd6a96d97dc94b82c14ce032d6a45a78138484e69befc1ac8e73c21b1e753bb0d6d25895b6e8c29309e9936c7b1864970c84a4fe46c64b93524207440d3514f1cd6326160b9e3d9b9062a0eea17444f7c78360db66291b685c1c793c3c8e8bd68b877436edb0a8067d4", 0xc0, 0x4}, {&(0x7f0000001680)="c721587bde0915628579f770a74956e774618e10f23fc45a8a1dba10c34128636d330f7b38bf22763491b41ff38c77dab4f51358da215f1d216834da9c2b14692175384858703983f370077be72abcafa87465d1f7cfbbf468a4ca64f552ace401e2dbb872360407967cd01298fa4d5bf3e346d5f2568731ecdfe96c97aa5f6d4e91bc7397e7c7c907fcd03683bdd1b0d0c680da0fdcccd7bbff7fffb7ca204b9631c299c3e3ba4135444bdcc4102bf2564405f62e70c90e358a5f10aa81877f233dcedb0caa02e41ff5b8913b36630273e37ba0169c61c570006cb165e8958512ec9f10", 0xe4, 0x80}], 0x1001, &(0x7f0000001840)={[{@sysvgroups='sysvgroups', 0x2c}, {@journal_checksum='journal_checksum', 0x2c}, {@max_batch_time={'max_batch_time', 0x3d, 0x8960}, 0x2c}, {@debug='debug', 0x2c}, {@quota='quota', 0x2c}]}) 10:04:20 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x2dd000}}) 10:04:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xfffffffffffff000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:20 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x10) 10:04:20 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r1, 0x40086602, &(0x7f00000000c0)=ANY=[]) truncate(&(0x7f0000000100)='./file0\x00', 0x0) [ 561.533069] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:20 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:20 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x156000}}) 10:04:20 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0xfffffffffffffffc, 0xea, 0x4, @buffer={0x0, 0x7b, &(0x7f0000000280)=""/123}, &(0x7f00000004c0)="a79c496d368185438fa2fdb232aeaef5f063c671c72e279a40df62c633350c501a7ca8c75bef3ce8b85f177d6d5eadd9abf7f894340023a1bd074d75bf21b44b8f891ca3b233628d24da930ef13a38cee7ff6bda5a2889933f7c943e6ee23ba077c7fc46612dafb10d72c4bdc6e2e72736291afd04dcc6030a52bceb8efa899d071ec9af603d1af9a5bc7302b74096fccd3994540bf30d163648e553cebb00e73af3c1b9e41f625dd630c412893155aa634528ff962d06304a4a8e8d828ccae1c07019302f52b4ba5ee3cb3ae07b35bcb38c94a85adafe2f8d10ff6054e4fcc2c5424087f40da0b57f76", &(0x7f00000005c0)=""/4096, 0x2000, 0x10004, 0x0, &(0x7f0000000200)}) accept4$inet(r0, &(0x7f0000000080)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10, 0x80000) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000040)="b6", 0x1ba}], 0x1b1, &(0x7f0000000600)}, 0x0) 10:04:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 561.627527] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:20 executing program 6: syz_emit_ethernet(0x56, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@canfd={0xd, {{0x3, 0x2, 0x6, 0x5}, 0x1c, 0x3, 0x0, 0x0, "f4952f554472ba9e39e59b9d96e860f38ed97a2e7501fdf979d6106d7e8717b69198eb1ea68e31586161cb2f63e610351e4ff7cd8bad24e9b65f086f09460a3a"}}}}, &(0x7f0000000100)={0x0, 0x0, [0x665]}) 10:04:20 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) ioctl$fiemap(r1, 0x40086602, &(0x7f00000000c0)=ANY=[]) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:20 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0ff]}, 0x10) 10:04:20 executing program 2: r0 = socket$inet(0x2, 0x805, 0xb27e) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x6) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x3) 10:04:20 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x28f000}}) 10:04:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4305000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 561.719678] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:20 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='security-wlan1^mime_type\x00', 0x2) sendmsg(r0, &(0x7f0000000340)={&(0x7f00000001c0)=@generic={0x8, "32087cdd0aad622cd6f2c4e270bf2349ff4dc79349f6c65cc8b068f4b57fcffb1d69e07a0950c6930757f2305fa68ce158a776d34d9be4f452496b1070b9be23ba02ac3a31d79f9a144d592f3280c8be62e439350322d62043e792c85e46bccbb9d2ef5f30c0871717e9b322512c116acdfc8e7d27e9a4f9e05acaab2ca6"}, 0x80, &(0x7f0000000300)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000100)}, {&(0x7f0000000280)="710087f32484e69ecd6d915a715373f945f375f833763f7518e95e866a319e94e99e7e0a777bfe97087ee6d6c39655183d595d997a59856aa67a589f97a3424f238061d0bab6cc2390fb306cf2d4fb1873342d7b24beeeb4cf84d510257c72267db14ae3c3cf379fb3728e9ccb525a", 0x6f}], 0x3, 0x0, 0x0, 0x20000000}, 0x4) r1 = socket$inet(0x2, 0x5, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000001540)=""/121) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000100)=0x400, 0x4) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:20 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) close(r0) fstat(r0, &(0x7f0000000040)) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480)=""/225, 0xe1) 10:04:20 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c989c70]}, 0x10) 10:04:20 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6800000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:20 executing program 6: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000040), &(0x7f0000000400)) 10:04:20 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000600)=@assoc_value, &(0x7f00000000c0)=0x8) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) [ 561.853268] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:20 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x2d0000}}) 10:04:20 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000000c0)={0x1, {{0x2, 0x4e24, @rand_addr=0x1}}}, 0x88) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) [ 561.938538] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:20 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}, 0x10) 10:04:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x2800000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:20 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:20 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'\x00', {0x2, 0x4e22}}) 10:04:20 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x82000}}) 10:04:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf5ffffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:20 executing program 5: r0 = socket$inet(0x2, 0x12, 0x98c) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)="16ea0459a2000000000000000099f27af1264f5100c5021cf32c08db797c95c0df4c49c69d5f7d97f7f000", 0x1}], 0x100000bb}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x40000000000000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000080)) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x404, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1000004, 0x32, 0xffffffffffffffff, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000100)) [ 562.116628] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:21 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:21 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6403000000000000]}, 0x10) 10:04:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xc0ffffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:21 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0xf9000}}) 10:04:21 executing program 6: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000500)={0x8, 0x0, &(0x7f00000003c0)=[@increfs={0x40046304}], 0x0, 0x0, &(0x7f0000000400)}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/148, 0x94) prctl$intptr(0x24, 0x7fffffff) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0xa0, 0x0, &(0x7f0000000400)=[@exit_looper={0x630d}, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x18, &(0x7f0000000040), &(0x7f0000000080)=[0x68, 0x0, 0x38]}}, @reply_sg={0x40486312, {{0x4, 0x0, 0x4, 0x0, 0x10, 0x0, 0x0, 0x18, 0x50, &(0x7f0000000280)=[@flat={0x77622a85, 0x1, r1, 0x1}], &(0x7f00000002c0)=[0x48, 0x0, 0x0, 0x28, 0x68, 0x40, 0x38, 0x38, 0x38, 0x38]}, 0x9}}, @decrefs={0x40046307, 0x1}, @register_looper={0x630b}], 0x9e, 0x0, &(0x7f0000000540)="2f0820d4bac65c06ac74bcf5b4c6f07ac098e3e3ebdc91f7a79b112ccda974a512d298d70bed148f78d3d07adcf2d4a42f6b9f77a5fed20ad5966f1885e41b92e0b9bcdd76b51d71e58fdffaa5c085c1ab5c210c5991e791f797e656ef69671f739dd4867289eea70c7422a7c654f95293ddc0d05d9f1a4b44a4aea4048bbdbd05fea30bb296c687c6d9506e96aaa70e67b65ecb7aca3854c9ca4daebba3"}) 10:04:21 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e0000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:21 executing program 5: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='\x00', 0xffffffffffffff9c}, 0x10) ioctl$sock_bt(r0, 0x5411, &(0x7f00000001c0)="1d7048de5cef7947ce88242e31ec5ba7fef00010d2f1800da04cceee4e15aff1dcd8d4a1fb3a44f9e25e27b00d8ae1db34f595832e2bf71f743ee1a103ce4d1f987a1c3679e3ed5a5873ea792481b2f8e3b01843c0041de77d") r1 = socket$inet(0x2, 0x5, 0x0) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:21 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23}, 0xfffffffffffffeb6) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:21 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x10) 10:04:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x48000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 562.167278] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 562.238925] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:21 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x2000) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000040)={0x2d, 0x8, [0x2, 0x35ed0250]}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, &(0x7f0000001700), 0x0, &(0x7f0000002a40), 0x0, 0x0) [ 562.372390] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:21 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x11d000}}) 10:04:21 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e23, @broadcast=0xffffffff}, @in6={0xa, 0x4e22, 0x8, @remote={0xfe, 0x80, [], 0xbb}, 0x400000}, @in={0x2, 0x4e24, @multicast2=0xe0000002}, @in={0x2, 0x4e23, @broadcast=0xffffffff}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x8c) r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r1, 0x3) sendto$inet(r1, &(0x7f0000000200)='-', 0x1, 0x10, &(0x7f0000000000)={0x2, 0x4e26, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xd) [ 562.423720] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:21 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:21 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x40, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000100)=0x8, &(0x7f00000001c0)=0x2) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000200)=0x68) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000280)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000430a6506fe040bf9464fe600000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) 10:04:21 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) statfs(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/39) 10:04:21 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcff]}, 0x10) 10:04:21 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x289000}}) 10:04:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8060000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x900000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:21 executing program 2: r0 = socket$inet(0x2, 0x80800, 0x1) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x4, 0x20, 0x1, r2}) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000240)={0x55, 0x7, 0x8, "22af10e81d8ab4837eb62be7eacb6fb8d3ffb3347796f1db65731c96b3d243523db05c899abae235a47c8673afe3e972db72d97b98a19fbee90c07dde1c5934771daad3dd39db6c91f65c6dcefcdbb42ab88e35b58"}) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000180)) mknod(&(0x7f0000000140)='./file0\x00', 0x80, 0x6) 10:04:21 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:21 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) accept(r0, 0x0, &(0x7f00000000c0)) [ 562.617340] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 562.631008] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:21 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000000000000]}, 0x10) 10:04:21 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) statfs(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/39) 10:04:21 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0xd8000}}) 10:04:21 executing program 7: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/sequencer\x00', 0x200000, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6800], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xe00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:21 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f0000000180)={0x1, {&(0x7f0000001640)=""/194, 0xc2, &(0x7f0000000000)=""/10, 0x0, 0x2}}, 0x68) r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r1, 0x3) sendto$inet(r1, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:21 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x30d000}}) 10:04:21 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}, 0x10) 10:04:21 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) r3 = socket$inet(0x2, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0x7, 0x3, &(0x7f0000000640)=[{&(0x7f00000004c0)="9acab0c62cc0f9d0a6987882faf4e7e50d963ecd0431f8d6f0717dee32fab301a866ce625133127abad5fedc5158945406bd3849152911973b9233649d9a2a6c708699148d63f788cd06b41a638414814f1969866f9002fbfc89fb8037be044e26608eb573dbd6feefba5965693553565e6f01d223bae9b678070e12d8b4af6024c9403bdd7013752f1fb8df804e1deb7260ca64e3f2e0cf0ec61481800239fda0c8a4a91f90e7fa21685eae63fa0db4d9c95f1d010c1e7d2369b1cf8ff57e76875574f47e434d5ea5cd601c9c643b3c2ee2dbee66865260ef736cc58befdde2fa4a757916a344b297d30392fb523524474a8dfa", 0xf4, 0x5}, {&(0x7f00000005c0)="f1bb141bac5ded053b2a7768a38d48ee630a6f3b097b8268e19aca86623667ec2d70cca08381d78787641c5632bed90c64aaf70d732f02377ae90be6f3f1c7039b9b3ccff08c446f6912413f1ede328bcc3c02810f78aa0f36a8c37a47bfc9b14d3573abc65865697386f6b86e5fea76", 0x70, 0x1}, {&(0x7f0000000400)="3b82088ca573eba9f06fc7fab13723a26b0e61ddaaf75be4f1bd00f170ff65bceb05a4743072f442a1263f2d1d61ef21bac07f62de00", 0x36, 0x100000001}], 0x800, &(0x7f00000006c0)={[{@shortname_lower='shortname=lower', 0x2c}, {@shortname_lower='shortname=lower', 0x2c}, {@uni_xlateno='uni_xlate=0', 0x2c}]}) sendmsg(r3, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x2, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) fstat(r0, &(0x7f0000000300)) sendmsg(r3, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) [ 562.806392] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 562.813456] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:21 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) statfs(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/39) 10:04:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4800], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 562.922980] FAT-fs (loop5): invalid media value (0x09) [ 562.928362] FAT-fs (loop5): Can't find a valid FAT filesystem 10:04:21 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x310000}}) 10:04:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3e8], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:21 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0), 0x10) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) sendmmsg$alg(r1, &(0x7f0000001a80)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="6dfa9f9bf0cc369f510575ba5945e3eef76ec145d47ed986cde61aedc6a346efa384924453465955c347c26ba1676a38e2f0e05bc2e9627ea4500a2642dfaaa4c7a95d7013de8e224dcf0b40df69afd000363c7d5a469c6667271e4ff3c5c098772872ba28a2ac8c0398153bb8ef65f1098c60cc6967", 0x76}, {&(0x7f0000000240)="487ddcd5088549b9654f6d5c65ec7250f466d7e14287274ffeb1175d55b10e7dabcc93d4541495b1b9e8e9ab7c7aa4573dd79d162b159ad85129612d4da60f6f955eb522520f7be0a1521e1f0cd561e54fbe7b8237469ca38ca2a657af99ddc1f11bb7dd760c85c941447bf5508a2ad583f56188a24d15524f7d8021a5192a36880fe7df723d145d9313d9c6e994d259d64503e311922ccd9a259706b31fdbd6dd7a3d03e45296962f56be3819dbf4590399c51db65210b252e50076fad0518ae730bf92c4ce5a48bbb1c8031b8ca05a38ea4dac2053c331f1c820ffc3afa29a", 0xe0}, {&(0x7f0000000340)="a7157d4352dfa24a7bbdb74400cb15d4125b3013eaa7b1325b4a0a17ef8637c031b7a0d2804f8fc4a9cfe9612517599d6fd223d69c5e183eba21492d4ee1a2ec7b1f5305b3f97a94b56f8cd3f6ec84a5234fa6af429a2cd77137c466d503d48aa08bca52b520cfef948fe06426b9c7153ce7ea8056ffcd93460ba89685c5fc269febcc67c877269707332f9d88ed7c473e66ee5f29107ec4c232203774f5443bc8603cd7c4ac432ae3f33d3ccdfd7adb4c983bfcd8cf3fc8b7564d5c43b543482075bd", 0xc3}, {&(0x7f0000000140)="ce6c590fa30e9001a16a24ec17b12226344df87524fef5cac11545444e0111aa65e6ba2bc7847f078e1674", 0x2b}], 0x4, &(0x7f0000000440)=[@iv={0x20, 0x117, 0x2, 0x5, "2018311e21"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2}, @iv={0xa8, 0x117, 0x2, 0x90, "6311cbf94ef49f337e015b60324a4d64904f3b91caceb22fc1d8ff76028e2b4376af90636db3cef92cd21f0a0a62406f1f6cb84bdfca6864c3b1b2ce7b640776aece00d84f9cb0ad2d5a8802d6b32fb71110b6293a5e14a3f516146748bac39f929ad971f3d89ce9c6597b2f43bfad30bbfdf7f9456e37a4ea456d3439bb4e3aefabf71ae7792bd407e172f4b6c6293d"}, @iv={0xf8, 0x117, 0x2, 0xe4, "3d1b34b9101c937b8411e3f967703fadc58fb1cde152f476d6af16d6a45830994dac625b2ffe9fa7b6dc7a215de8c42bae419274beca58bb5931b77113b0be3deb51f3bc2102632337eb6778c8edc5ae29cb4eb676cee79c1663fae266dbd1e0afb6909efe53276eb60a9833f2f807b609a1fbe448562a9bbddc6456c3971631a7d02c6fdc376354f1f661a00c9da92a30eacd67784d772a0f2855732cba707fe2ed55e38d8cf0a17953c61308733af959a618b4b510e40575006c2c2875717da2720e6058c3aa9edbe279feaa75c954b7f54f3226fe2529ff0ef9ed1fea9cb2c9f82a99"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x4540}, @op={0x18, 0x117, 0x3}], 0x238, 0x8880}, {0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000680)="d9dc5fc242bd1e3ebb6a9f35a682c8633c6e6d1d462bf77f056a343994c00674789817e920fdb6a90d6869915bb1733eb913aa97bf84d1574e7846df5cc5d8ce3afb88f1c34d47692c3afb0dfc231e0f8a7fd60bbe61c3a725c559190eadac306bea968e2446854a61eb484563f9bfe44305be13b7c68b49be6567a6a632483b505cf4e8857a25445a15319c9ff4f2ff13acc74e88d5750e0f9ff33ff08671", 0x9f}, {&(0x7f0000000740)="98bd2e9ea7996bf8312aab811ef8ec8acdbda0f3cfa52cfc8f3a416bcc971141de5a1e0ad12530de8ef9b05a1e86a77ff4fffd9c2c8d393c64ce7a00207cc624c5a0c071365ebf42a2c3b8f13ee77902cf5929dd976d9ac8a8d75c1129e2ad3793017d5dbdd91ce86dee63aa6a393f42cff374298a78e1dd4d0579a7995b654c02c7e94d8aeaa4afc0682b32d92e3e1863dd841d59b905e4fd1461ab422a9f12c1f51d8b754bfa9543d42b1d77fa92de578e0375d43040d19d79a8d38bd5ecf1dc734ce26d77994b7d", 0xc9}, {&(0x7f0000000840)="66ba1008606a8a3d4500c1a6a84ab074f4a58c34a30e5e796de87dfd5c6e23a592f726055c53bf171f70e29e0d47dbe0c56a42a975e2936465ecd05874ea70d3eea7160f021cc02be4a93fcd5ef039e0b52319dd35e1f7585dcf34fbf093a56be83cf806ee7942ae100132c53c7b3723e145eced20cd6b290dc4820065f7d54d5dee755f54b1b64239c5fc72c7b5ddbc1197569c2e13b45e9edd039ac33e1a55fe83374306fa3da0583f36d7c65d36421b9fb96c6541f51d7437836600c8eab7429fc4f433ee69f2e4cc5d6efbaf65c74843773ae58f71f98eb0acb20f4037eda7a8cb9045071cdc4378a6a6d943c505064816", 0xf3}, {&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000001940)="97afb5fae9dc620d40f4ba96d420db6e28ee85a401569699e813ec66681d23b4f8729f4aca26ae7c5a401fbc386aafa216610147ac79f8ee198922904a073a0cf538b550fc8ec0a6f9752630c0397ed788659361ff625a31023a43f77d3de6b5113b7f827738d98bf19b6c0c5ee7799c27b75170286d136099b43a1108d7dbd8b905ebbb29e35a9ca1178e58eca8542655f0f5", 0x93}], 0x5, 0x0, 0x0, 0x20000000}], 0x2, 0x4000000) 10:04:21 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ec]}, 0x10) 10:04:21 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) statfs(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/39) [ 563.011018] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 563.058038] FAT-fs (loop5): invalid media value (0x09) [ 563.063397] FAT-fs (loop5): Can't find a valid FAT filesystem 10:04:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:22 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x132000}}) 10:04:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf401], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 563.116928] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:22 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000440)=[{&(0x7f00000002c0)="d6b11f1ab6e3c841acdd6293fe515888844f4515b186174b6e87e06ff233ccb924219e8c9b6cd57b5830f0882067e4386abb90d7c97675a9435ad66368bc4bed57413347295b90d4ef073677b8ef8f5fd0686403c3bc5d969d09e459c0b8eda67eee4c19", 0x64}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={0x0, 0xd0, 0xff, 0x1, 0x0, 0x9}, &(0x7f0000000340)=0x14) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000380)=@sack_info={r1, 0xffffffffffffffe1, 0x8000}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x28, &(0x7f00000000c0)=""/81, &(0x7f00000001c0)=0x51) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000200)=ANY=[@ANYBLOB="ac1414aa000007ff0000000006000000ac897648de2b14bbe0000002ac14141dac1414bb7f000001"], 0x28) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:22 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b000000000000]}, 0x10) 10:04:22 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) 10:04:22 executing program 2: unshare(0x60000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21}, 0x10) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x10b200) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000040)={0x0, 0x9a}) listen(r1, 0x3) sendto$inet(r1, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x689], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:22 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet(0x2, 0x8, 0x9) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000000c0)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x20}}, 0x2, 0x3, 0x4, 0x2}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) [ 563.238913] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:22 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x25c000}}) 10:04:22 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x10) [ 563.326441] IPVS: ftp: loaded support on port[0] = 21 10:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6c00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:22 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) [ 563.349706] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:22 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x47b) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:22 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x10a000}}) 10:04:22 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x10) 10:04:22 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) [ 563.462776] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:22 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x42) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000040)=0x4) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:22 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="390000001100090469000300810800000700fd3f07000000450001e50000001419001a0003000000000080000001090000009183a8a5000200", 0x39}], 0x1) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f00000004c0)=[{0x70, 0x129, 0x1, "ee67012ab5f3db642f4aa066daef0007336b0580df304843c6fd923673d76fbfa5156927a74e32678b7773e413d590af20b6ee6499fdc74132d273cf60cc91dbf2f2a7f02df253d75e4b313274249ae42c62fcd5c248f019ad24d6d0e592"}, {0xb0, 0x108, 0x40, "2e615761223b3704c3a6a6dc0617ecd347e2afa4519afd04848f87762deb1b10978bcbff3463b499bb3aa5e2c879078b223195190bbd54a2bf2b028951d5009b5e067cb21b2b9a94455672badd959af80d3f05a7dcb510de4c7aedde26612d37c1104e00b93b4011afcdfe0920596695f357157f43a69c7d5d4e14bbffe105e4fd6b1aa6d3669f63c220fada6a31f8698378dceccfcac4a084c3a2"}, {0x88, 0x1, 0x7a3c, "661792250e32ea550b9bf3acf80a93004c0c8793011f3c3c58488d327bca6a5f904a5faa4dc6a31b204d11655e586d2bf774fd1d320b455ed0210af64e47533f9b5ec9e713725a4df57885d6453acc624eeee108dbf8b7c0c0d16279d9ce79a1b1970a9b9b64f3b9608aeb672e9d37d9ebac25"}, {0x80, 0x29, 0x401, "f90d60dd1ba5b621a6871397e9176cc08e86ea32698a16e5c1e4b28b2d01aa319d199e7e4941bf5cf14399f5c785d443b22dfe8c8c577b665bc6608eabe8c5b8a7c462ed46a8f1f531f44bdba02d46615ccb722c717de5f1f9600d104b9d719e072cea6f4ff618c955b607a0a520af7b"}, {0x10, 0x10f, 0x9}, {0x1010, 0x1ff, 0x81, "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"}, {0x48, 0x10f, 0x8, "0f99534982550d9576b8263c297bd3546d4fbf622c7b92ecf2fcc5f83de96045222f7c681e5e2dcf65ee2c8040fd5efcd7df8f"}, {0xe8, 0x11f, 0x1c78, "4efcfe766272496513329479c18c41f3ad877e8f60895d1f3de5c837c72c791367481eb6a4586cb149ae287a59320f7fbd2320c7596c800024ae6e61a00f3ebac5a9a59307a49030e3865e4afefac2c6f03aa35ed120d6394af19e251a277be51e0aa349ca3c3b06ca068f53c04b6a92e10ea4280dc620a42e32cb443e7991922efe7cf25e51bde719c25fa499f13442cdefa2993b562fb666b858214a580b1bcf2c70c36143caa3107341fa52234ddebaa8f483e0a1741d798a51fa3a82168ae5667e8b887deb89642d5610d3be1913153779bdf6"}, {0x78, 0x3a, 0x8000, "eafef985755c2823a124cf90ac6d22f346e8164123f93802e6cfef8375a9445e1a1b5fbb02138256c13477bd2956bb8f1bcd051772a904ef65db9a141db94f0f4b8151eed3b27a6855704e50bfc8fafce15ce297ac33925de9c635691df5cb2bf5e7dcf528"}], 0x13f0}, 0x0) 10:04:22 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) [ 563.583143] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:22 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x17b000}}) 10:04:22 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x10) 10:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8035], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 563.676380] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:22 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x314000}}) 10:04:22 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x444, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f00000000c0)={{0x33, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e20, 0x1, 'rr\x00', 0x1, 0x860, 0x72}, {@multicast1=0xe0000001, 0x4e22, 0x1, 0xe3, 0x2, 0x7ff}}, 0x44) 10:04:22 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) socketpair(0x15, 0x0, 0xcd48, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getgroups(0x5, &(0x7f0000000140)=[0xee00, 0x0, 0xee01, 0xee00, 0x0]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) write$P9_RSTATu(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="970000007d010000007b000400ff7f000011020000000000000000000000000000900100008059459b4a7b9ef87ecfffff0000ff7f0000000000000700b1446e367e6b01cc00766d6e6574316d643573756d6370757365746b657972696e67776c616e315b5e707070311700707070302c40275b7379536c087e1c8b656c66656d7070703006006c6f70707030", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5], 0x97) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) getsockname$inet(r1, &(0x7f00000001c0)={0x0, 0x0, @multicast2}, &(0x7f0000000340)=0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:22 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) 10:04:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3580], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) [ 563.823303] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:22 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}, 0x10) 10:04:22 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x1e7000}}) 10:04:22 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x8, 0x501100) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000240)={@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x2, 0x1, {0xa, 0x4e21, 0x6, @local={0xfe, 0x80, [], 0xaa}, 0x5}}}, {&(0x7f0000000140)=""/67, 0x43}, &(0x7f00000001c0), 0x3}, 0xa0) r2 = socket$inet(0x2, 0x805, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x400, 0x4) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r2, 0x3) sendto$inet(r2, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:22 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) [ 563.922297] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 563.947498] IPVS: set_ctl: invalid protocol: 51 172.20.20.30:20000 10:04:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:22 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x23d000}}) 10:04:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf5ffffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:22 executing program 5: r0 = socket$inet(0x2, 0x205, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f00000000c0)={@loopback, @multicast2}, &(0x7f0000000100)=0x8) socket$unix(0x1, 0x4, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000040)="84", 0x1}], 0x15e, &(0x7f0000000600)}, 0x0) 10:04:22 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0]}, 0x10) 10:04:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:23 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) 10:04:23 executing program 2: r0 = socket$inet(0x2, 0x805, 0xfffffffffffeffff) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 564.102842] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 564.123088] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:23 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x1b000}}) 10:04:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sctp\x00') openat$cgroup_ro(r0, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x5, 0x0) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x0}) r3 = dup2(r1, r1) ioctl$TIOCGPTPEER(r3, 0x5441, 0x10000) getresuid(&(0x7f0000000100), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in=@dev={0xac, 0x14, 0x14, 0x15}, @in6, 0x4e22, 0x9, 0x4e24, 0x0, 0xa, 0x80, 0x80, 0xaf, r2, r4}, {0x1f, 0x620f, 0x10bd, 0x8, 0xc3, 0x2, 0xae2c, 0x4}, {0x9, 0x1, 0x5, 0x100}, 0x1ff, 0x6e6bbc, 0x1, 0x1, 0x1, 0x3}, {{@in=@multicast2=0xe0000002, 0x4d6, 0x3f}, 0x2, @in=@loopback=0x7f000001, 0x0, 0x0, 0x0, 0x7f, 0x8, 0xfff, 0x1}}, 0xe8) 10:04:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x400000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:23 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}, 0x10) 10:04:23 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) 10:04:23 executing program 2: r0 = socket$inet(0x2, 0x805, 0x3) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000140)="3c0052da02ccac4ea3fd55aac7b53a141205203b09c2a1898ee08ef92925e1693989166421b5dd2e8698eaeb5608b9a038111201bc17ed6623d820ed1b54de24483fa9e703364f03ea96bd9a547bf689cafddba0ab410737322266fcec1a02", 0x5f, 0x24b3eaa82f5b016f, &(0x7f0000000080)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x414000) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000040)={0x2, 0x2, 0x4, 0x100}) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:23 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x295000}}) [ 564.308628] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 564.333086] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:23 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000280)="3e0f8bd8b4f08b1c4cf489246d1590400595efeb015898c2686285dad1e0dd49004fff1ccd0d16382bfce9807d8df720dc1548881e24d15443341bc7bca84fd38e504fe131c7937205f6c41d433d9e98b609a5493f31375df5e24504354b7f4532ff2197af74299728968feb933126796309087aba3ccb1139e786d2aa0701648b3176d882db91392e0618dd72178e76b1072b01f7400f87bee510270922a209bf454b67140582ea9d752eac990fc86c195eb1c04673ce81dcf7cbeff1940d9e0f789dd138cfe9973cf5a72a0e2ce5ddea9bdbbe33059545dee9d007aebd5f5c69b87837440f22e1a596ed5a42e2", 0x49d, 0x3}, {&(0x7f00000004c0)="20838d41174e9c291ecc81dde8efdd1f3715b402ff0517fbc8493465292ad9c5c4193698439863aecd770603058c3031ef7606f4cf79b7d926ecced851f81d32e90e16d49fab12389ab1646338f07c87ceb014e5d13e4751b3edf090debde295dfa307b9b0cb8774c48549af1245e2da40ddc908376292319c96368d2255942dc719b0a20bffcfbec898ae7fbfd8a5d58ada094103aae99f06b0903a42c35d4e06194773e092f94630887caa4848ccf3e3e4e6a10cfb1f60c5f3730b7f236362a8e5f9af5c933d34dd2b95dc4cb8b18f08142a8a3c779bc119eb32774fedf8864256dcf0304dd0e9fe3ca4477def6eac0361ff546eb12759e79a8539", 0xffffffffffffff44, 0x1}], 0x4020, &(0x7f0000000200)='\\[security\x00') sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)="0536ba93ce09b708a0c7fe76fea2fee7c4", 0x11}], 0x1, &(0x7f0000000600)}, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x20) recvmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000001680)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1, &(0x7f00000016c0)=""/192, 0xc0, 0x4000000}, 0x120) 10:04:23 executing program 7 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:23 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000]}, 0x10) 10:04:23 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) [ 564.469188] FAULT_INJECTION: forcing a failure. [ 564.469188] name failslab, interval 1, probability 0, space 0, times 0 [ 564.480504] CPU: 1 PID: 23316 Comm: syz-executor7 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 564.488922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.498285] Call Trace: [ 564.500894] dump_stack+0x1c9/0x2b4 [ 564.504545] ? dump_stack_print_info.cold.2+0x52/0x52 [ 564.509775] should_fail.cold.4+0xa/0x11 [ 564.513884] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 564.519026] ? lock_release+0xa30/0xa30 [ 564.523022] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 564.528578] ? pid_task+0x115/0x200 [ 564.532225] ? find_vpid+0xf0/0xf0 [ 564.535795] ? __f_unlock_pos+0x19/0x20 [ 564.539789] ? lock_downgrade+0x8f0/0x8f0 [ 564.543962] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 564.549524] ? proc_fail_nth_write+0x9e/0x210 [ 564.554051] ? lock_acquire+0x1e4/0x540 [ 564.558050] ? fs_reclaim_acquire+0x20/0x20 [ 564.562409] ? lock_downgrade+0x8f0/0x8f0 [ 564.566589] ? check_same_owner+0x340/0x340 [ 564.570928] ? vfs_write+0x2f3/0x560 [ 564.574663] ? rcu_note_context_switch+0x730/0x730 [ 564.579614] ? lock_release+0xa30/0xa30 [ 564.583618] __should_failslab+0x124/0x180 [ 564.587881] should_failslab+0x9/0x14 [ 564.591704] kmem_cache_alloc+0x2af/0x760 [ 564.595889] getname_flags+0xd0/0x5a0 [ 564.599713] user_path_at_empty+0x2d/0x50 [ 564.603883] do_sys_truncate+0xb0/0x190 [ 564.607876] ? vfs_truncate+0x840/0x840 [ 564.611873] ? syscall_slow_exit_work+0x500/0x500 10:04:23 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) 10:04:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x28], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xd00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:23 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) [ 564.616745] __x64_sys_truncate+0x54/0x80 [ 564.620947] do_syscall_64+0x1b9/0x820 [ 564.624851] ? finish_task_switch+0x1d3/0x870 [ 564.629367] ? syscall_return_slowpath+0x5e0/0x5e0 [ 564.634316] ? syscall_return_slowpath+0x31d/0x5e0 [ 564.639266] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 564.644301] ? prepare_exit_to_usermode+0x291/0x3b0 [ 564.649344] ? perf_trace_sys_enter+0xb10/0xb10 [ 564.654032] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 564.658903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 564.664101] RIP: 0033:0x455ab9 [ 564.667295] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 564.686980] RSP: 002b:00007fd8a6537c68 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 564.694846] RAX: ffffffffffffffda RBX: 00007fd8a65386d4 RCX: 0000000000455ab9 [ 564.702137] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 564.705520] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:23 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x7f000}}) [ 564.709412] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 564.709423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 564.709432] R13: 00000000004bbc47 R14: 00000000004d4308 R15: 0000000000000000 10:04:23 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x17e000}}) 10:04:23 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000]}, 0x10) [ 564.765868] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:23 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x5) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:23 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) 10:04:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88caffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:23 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x301000}}) 10:04:23 executing program 7 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) [ 564.927459] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 565.028021] FAULT_INJECTION: forcing a failure. [ 565.028021] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 565.039887] CPU: 1 PID: 23378 Comm: syz-executor7 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 565.048314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.057688] Call Trace: [ 565.060311] dump_stack+0x1c9/0x2b4 [ 565.063971] ? dump_stack_print_info.cold.2+0x52/0x52 [ 565.069187] ? perf_tp_event+0xc40/0xc40 [ 565.073284] should_fail.cold.4+0xa/0x11 [ 565.077362] ? memset+0x31/0x40 [ 565.080666] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 565.085793] ? perf_trace_lock_acquire+0x4f9/0x9a0 [ 565.090750] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 565.095884] ? trace_hardirqs_on+0x10/0x10 [ 565.100145] ? perf_tp_event+0xc40/0xc40 [ 565.104235] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 565.109794] ? _kstrtoull+0x188/0x250 [ 565.113618] ? _parse_integer+0x190/0x190 [ 565.117790] ? memset+0x31/0x40 [ 565.121092] ? perf_trace_lock_acquire+0x4f9/0x9a0 [ 565.126044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 565.131937] ? should_fail+0x246/0xd86 [ 565.135845] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 565.140974] __alloc_pages_nodemask+0x36e/0xdb0 [ 565.145656] ? pid_task+0x115/0x200 [ 565.149305] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 565.154334] ? __f_unlock_pos+0x19/0x20 [ 565.158321] ? lock_downgrade+0x8f0/0x8f0 [ 565.162482] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 565.168035] ? proc_fail_nth_write+0x9e/0x210 [ 565.172550] ? lock_acquire+0x1e4/0x540 [ 565.176535] ? fs_reclaim_acquire+0x20/0x20 [ 565.180867] ? lock_downgrade+0x8f0/0x8f0 [ 565.185038] ? lock_release+0xa30/0xa30 [ 565.189022] ? check_same_owner+0x340/0x340 [ 565.193361] cache_grow_begin+0x91/0x710 [ 565.197449] kmem_cache_alloc+0x689/0x760 [ 565.201638] getname_flags+0xd0/0x5a0 [ 565.205471] user_path_at_empty+0x2d/0x50 [ 565.209645] do_sys_truncate+0xb0/0x190 [ 565.213629] ? vfs_truncate+0x840/0x840 [ 565.217631] __x64_sys_truncate+0x54/0x80 [ 565.221794] do_syscall_64+0x1b9/0x820 [ 565.225685] ? finish_task_switch+0x1d3/0x870 [ 565.230188] ? syscall_return_slowpath+0x5e0/0x5e0 [ 565.235124] ? syscall_return_slowpath+0x31d/0x5e0 [ 565.240066] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 565.245090] ? prepare_exit_to_usermode+0x291/0x3b0 [ 565.250139] ? perf_trace_sys_enter+0xb10/0xb10 [ 565.254819] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 565.259680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 565.264873] RIP: 0033:0x455ab9 [ 565.268074] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 565.287651] RSP: 002b:00007fd8a6537c68 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 565.295373] RAX: ffffffffffffffda RBX: 00007fd8a65386d4 RCX: 0000000000455ab9 [ 565.302647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 565.310010] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 565.317289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 565.324568] R13: 00000000004bbc47 R14: 00000000004d4308 R15: 0000000000000001 10:04:24 executing program 5: socket$unix(0x1, 0x5, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x19d7, 0x200) rt_sigpending(&(0x7f00000001c0), 0x5) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x277) 10:04:24 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x10) 10:04:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x28000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:24 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) 10:04:24 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24}, 0x1) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:24 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x290000}}) 10:04:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffffc0], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:24 executing program 7 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) [ 565.470016] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 565.471574] FAULT_INJECTION: forcing a failure. [ 565.471574] name failslab, interval 1, probability 0, space 0, times 0 [ 565.491961] CPU: 0 PID: 23398 Comm: syz-executor7 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 565.500404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.509801] Call Trace: [ 565.512435] dump_stack+0x1c9/0x2b4 [ 565.516095] ? dump_stack_print_info.cold.2+0x52/0x52 [ 565.521348] should_fail.cold.4+0xa/0x11 [ 565.525447] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 565.530586] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 565.536155] ? perf_tp_event+0x91b/0xc40 [ 565.540289] ? trace_hardirqs_on+0x10/0x10 [ 565.544579] ? perf_swevent_event+0x2e0/0x2e0 [ 565.549135] ? perf_tp_event+0xc40/0xc40 [ 565.553278] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 565.558474] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 565.563633] ? check_same_owner+0x340/0x340 [ 565.564565] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 565.567990] ? perf_tp_event+0xc40/0xc40 [ 565.568025] ? rcu_note_context_switch+0x730/0x730 [ 565.568059] __should_failslab+0x124/0x180 [ 565.591617] should_failslab+0x9/0x14 [ 565.595439] kmem_cache_alloc+0x2af/0x760 [ 565.596671] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 565.599601] ? perf_trace_lock_acquire+0x4f9/0x9a0 [ 565.599629] jbd2__journal_start+0x1e7/0xa80 [ 565.619862] ? jbd2_write_access_granted.part.9+0x430/0x430 [ 565.625590] ? rcu_note_context_switch+0x730/0x730 [ 565.630558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 565.636117] __ext4_journal_start_sb+0x182/0x600 [ 565.640884] ? ext4_setattr+0xaaa/0x2ae0 [ 565.644964] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 565.650692] ? perf_trace_lock_acquire+0x4f9/0x9a0 [ 565.655653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 565.661216] ? jbd2_journal_begin_ordered_truncate+0xcc/0x18f [ 565.667126] ext4_setattr+0xaaa/0x2ae0 [ 565.671027] ? memset+0x31/0x40 [ 565.674339] ? ext4_journalled_write_end+0x16f0/0x16f0 [ 565.679637] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 565.684670] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 565.689907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 565.695463] ? timespec64_trunc+0xea/0x180 [ 565.699715] ? inode_init_owner+0x340/0x340 [ 565.704060] ? lock_acquire+0x1e4/0x540 [ 565.708049] ? current_time+0x131/0x1b0 [ 565.712036] ? timespec64_trunc+0x180/0x180 [ 565.716372] ? lock_release+0xa30/0xa30 [ 565.720372] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 565.725496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 565.731085] ? ext4_journalled_write_end+0x16f0/0x16f0 [ 565.736395] notify_change+0xc0c/0x10f0 [ 565.740397] ? setattr_prepare+0x830/0x830 [ 565.744660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 565.750218] do_truncate+0x1ac/0x2b0 [ 565.753952] ? file_open_root+0x580/0x580 [ 565.758132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 565.763698] vfs_truncate+0x60e/0x840 [ 565.767524] ? do_truncate+0x2b0/0x2b0 [ 565.767599] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 565.771421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 565.771442] ? getname_flags+0x26e/0x5a0 [ 565.791466] do_sys_truncate+0x156/0x190 [ 565.795550] ? vfs_truncate+0x840/0x840 [ 565.799547] ? syscall_slow_exit_work+0x500/0x500 [ 565.804435] __x64_sys_truncate+0x54/0x80 [ 565.808602] do_syscall_64+0x1b9/0x820 [ 565.812525] ? finish_task_switch+0x1d3/0x870 [ 565.817040] ? syscall_return_slowpath+0x5e0/0x5e0 [ 565.821991] ? syscall_return_slowpath+0x31d/0x5e0 [ 565.826937] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 565.831975] ? prepare_exit_to_usermode+0x291/0x3b0 [ 565.837012] ? perf_trace_sys_enter+0xb10/0xb10 [ 565.841699] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 565.846662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 565.851862] RIP: 0033:0x455ab9 10:04:24 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) 10:04:24 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x400000, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@ethernet={0x0, @random="e554336bccd3"}, 0x80, &(0x7f00000000c0), 0x20d, &(0x7f0000000600), 0x364}, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{0x81, 0x5}, {0x7, 0x57}, {0x5}, {0xffffffffffffff10, 0xfffffffffffffff7}, {0x2, 0x49}, {0x3f, 0x8}, {0xffff, 0x5}]}) 10:04:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x60], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:24 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r1 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r3 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffe, 0x400) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000200)={r3, r0, 0x7fffffff}) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:24 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x38c000}) 10:04:24 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x8c71, 0x400000) accept$alg(r0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000800, 0xfffffffffffffffa) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000280)=@nfc_llcp={0x27, 0x0, 0x0, 0x1, 0x7b9, 0x7f, "5591820614cc94a947709df08e5bcb7d37fb9e1b9dd54ad3b4f5b958de9e24ef952368e2894f1e021735f8032acf84e10df4b015a893554608b6582e698dc7", 0x32}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0)}, 0x0) accept$packet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000001c0)=0x14) 10:04:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:24 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x8000000000000000}) 10:04:24 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) memfd_create(&(0x7f00000000c0)=']\x00', 0x1) [ 565.855059] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 565.874653] RSP: 002b:00007fd8a6537c68 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 565.882390] RAX: ffffffffffffffda RBX: 00007fd8a65386d4 RCX: 0000000000455ab9 [ 565.889674] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 565.896957] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 565.904235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 565.911603] R13: 00000000004bbc47 R14: 00000000004d4308 R15: 0000000000000002 10:04:24 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}, 0x10) 10:04:24 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0xfdfdffff00000000}) 10:04:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 565.919014] EXT4-fs error (device sda1) in ext4_setattr:5586: Out of memory 10:04:24 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:24 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000400)="f0", 0x1}], 0x1, 0x0, 0x9bfc20d4425ee489, 0x2}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000000c0)={@rand_addr, @local, 0x0}, &(0x7f0000000100)=0xc) sendmsg(r0, &(0x7f00000003c0)={&(0x7f00000001c0)=@xdp={0x2c, 0x4, r1, 0x3a}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)="a5a770b9b13b90cfae5fc70c9e582de133811af71b40c7c79289ed96cb98004671cce4a7ecfa1cb5a9903fb03ca20273524f0b223f4584f4fa5d9f0ddd6285c0490c481fc4ab6ffecbacd779706a5a3d44e44702a2b4907f25bf8f993bd452c7607d26b8e65b619e508e3307f7350d63b34b8e90eb27c00f84256083190e88078b623bfd6af85a9e95d76371b5c434948a83ab43a4056a5df5eb91c8bb8e26ee9d7766e190d744a59ea4fef5", 0xac}], 0x1, 0x0, 0x0, 0x40}, 0x4000) 10:04:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:24 executing program 7 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) [ 565.973686] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 566.007081] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 566.075118] FAULT_INJECTION: forcing a failure. [ 566.075118] name failslab, interval 1, probability 0, space 0, times 0 [ 566.086562] CPU: 0 PID: 23463 Comm: syz-executor7 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 566.094995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.104364] Call Trace: [ 566.106965] dump_stack+0x1c9/0x2b4 [ 566.110588] ? dump_stack_print_info.cold.2+0x52/0x52 [ 566.115783] should_fail.cold.4+0xa/0x11 [ 566.119841] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 566.124940] ? pagevec_lookup_entries+0x3a/0x80 [ 566.129618] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 566.134641] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 566.139742] ? trace_hardirqs_on+0x10/0x10 [ 566.143972] ? perf_tp_event+0xc40/0xc40 [ 566.148039] ? check_same_owner+0x340/0x340 [ 566.152355] ? rcu_note_context_switch+0x730/0x730 [ 566.157290] __should_failslab+0x124/0x180 [ 566.161518] should_failslab+0x9/0x14 [ 566.165308] kmem_cache_alloc+0x2af/0x760 [ 566.169451] ? perf_tp_event+0xc40/0xc40 [ 566.173501] ? kasan_check_write+0x14/0x20 [ 566.177737] jbd2__journal_start+0x1e7/0xa80 [ 566.182146] ? jbd2_write_access_granted.part.9+0x430/0x430 [ 566.187866] ? rcu_note_context_switch+0x730/0x730 [ 566.192798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.198345] __ext4_journal_start_sb+0x182/0x600 [ 566.203092] ? ext4_truncate+0x4ae/0x1670 [ 566.207231] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 566.212931] ? ext4_ext_index_trans_blocks+0x11f/0x150 [ 566.218203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.223734] ? ext4_meta_trans_blocks+0x25f/0x310 [ 566.228584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.234211] ? ext4_writepage_trans_blocks+0x182/0x350 [ 566.239480] ext4_truncate+0x4ae/0x1670 [ 566.243444] ? up_write+0x7b/0x220 [ 566.246974] ? up_read+0x110/0x110 [ 566.250504] ? ext4_punch_hole+0x1210/0x1210 [ 566.254904] ? __lock_acquire+0x36c0/0x5020 [ 566.259232] ? do_wp_page+0x1670/0x1670 [ 566.263224] ? down_write+0x8f/0x130 [ 566.266935] ? unmap_mapping_range+0x48/0x60 [ 566.271338] ext4_setattr+0x17e6/0x2ae0 [ 566.275298] ? memset+0x31/0x40 [ 566.278575] ? ext4_journalled_write_end+0x16f0/0x16f0 [ 566.283843] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 566.288850] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 566.294043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.299569] ? timespec64_trunc+0xea/0x180 [ 566.303793] ? inode_init_owner+0x340/0x340 [ 566.308107] ? lock_acquire+0x1e4/0x540 [ 566.312074] ? current_time+0x131/0x1b0 [ 566.316044] ? timespec64_trunc+0x180/0x180 [ 566.320352] ? lock_release+0xa30/0xa30 [ 566.324318] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 566.329334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.334861] ? ext4_journalled_write_end+0x16f0/0x16f0 [ 566.340130] notify_change+0xc0c/0x10f0 [ 566.344101] ? setattr_prepare+0x830/0x830 [ 566.348334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.353865] do_truncate+0x1ac/0x2b0 [ 566.357573] ? file_open_root+0x580/0x580 [ 566.361732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.367263] vfs_truncate+0x60e/0x840 [ 566.371060] ? do_truncate+0x2b0/0x2b0 [ 566.374945] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.380472] ? getname_flags+0x26e/0x5a0 [ 566.384547] do_sys_truncate+0x156/0x190 [ 566.388602] ? vfs_truncate+0x840/0x840 [ 566.392568] ? syscall_slow_exit_work+0x500/0x500 [ 566.397408] __x64_sys_truncate+0x54/0x80 [ 566.401546] do_syscall_64+0x1b9/0x820 [ 566.405421] ? finish_task_switch+0x1d3/0x870 [ 566.409908] ? syscall_return_slowpath+0x5e0/0x5e0 [ 566.414827] ? syscall_return_slowpath+0x31d/0x5e0 [ 566.419749] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 566.424756] ? prepare_exit_to_usermode+0x291/0x3b0 [ 566.429762] ? perf_trace_sys_enter+0xb10/0xb10 [ 566.434422] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 566.439264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 566.444455] RIP: 0033:0x455ab9 [ 566.447640] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 566.467049] RSP: 002b:00007fd8a6537c68 EFLAGS: 00000246 ORIG_RAX: 000000000000004c 10:04:25 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x2, &(0x7f0000001d80)) 10:04:25 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000100)="b9ffc9b52693", 0x6}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:25 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0xc0380000000000}) 10:04:25 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa030000]}, 0x10) 10:04:25 executing program 2: r0 = socket$inet(0x2, 0x805, 0xfffffffffffffffc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x3}}, [0x4b56, 0x1000, 0x7, 0x3b, 0x400, 0x4c2d, 0x5, 0x8, 0x7, 0xffffffffffffffea, 0x6, 0x7, 0x4, 0x0, 0xfffffffffffffffc]}, &(0x7f0000000080)=0x100) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r1, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_netfilter(0x10, 0x3, 0xc) 10:04:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x900], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 566.474759] RAX: ffffffffffffffda RBX: 00007fd8a65386d4 RCX: 0000000000455ab9 [ 566.482019] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 566.489276] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 566.496533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 566.505007] R13: 00000000004bbc47 R14: 00000000004d4308 R15: 0000000000000003 [ 566.514726] EXT4-fs error (device sda1) in ext4_setattr:5586: Out of memory 10:04:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x600000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:25 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x80) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000040)) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:25 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x80ffff}) [ 566.588619] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:25 executing program 5: r0 = socket$inet(0x2, 0x800, 0x6) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000280)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0xb, 0x8000, "ec82cb99802727dcc0f21026897770a9939df684f2df207560358c5a655f5dcec7feb544dd2c6ebb004cc24591c8266df451f876408ac3915837a8ea933a3d", 0x2e}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x2000000) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8847], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:25 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:25 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa03]}, 0x10) 10:04:25 executing program 7 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:25 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x9, 0x41fe, 0x5, 0x0, 0x0, [{r0, 0x0, 0x1}, {r0, 0x0, 0xdb3}, {r0, 0x0, 0x6}, {r0, 0x0, 0x3ff}, {r0, 0x0, 0x4}]}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000140)={0x40, 0x1, 0x5, 0x0, 0x0, [{r0, 0x0, 0xfffffffffffff848}, {r0, 0x0, 0x18}, {r0, 0x0, 0x2}, {r0, 0x0, 0xec}, {r0, 0x0, 0x3fce}]}) [ 566.655330] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:25 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0xfdfdffff}) [ 566.724187] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:25 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x10) [ 566.772247] FAULT_INJECTION: forcing a failure. [ 566.772247] name failslab, interval 1, probability 0, space 0, times 0 [ 566.783564] CPU: 0 PID: 23508 Comm: syz-executor7 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 566.791982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.801349] Call Trace: [ 566.803959] dump_stack+0x1c9/0x2b4 [ 566.807612] ? dump_stack_print_info.cold.2+0x52/0x52 [ 566.812828] ? lock_acquire+0x1e4/0x540 [ 566.816826] ? is_bpf_text_address+0xae/0x170 10:04:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7a], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:25 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0xfffffdfd}) [ 566.821369] should_fail.cold.4+0xa/0x11 [ 566.825457] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 566.830578] ? rcu_is_watching+0x8c/0x150 [ 566.834752] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 566.839451] ? is_bpf_text_address+0xd7/0x170 [ 566.843972] ? kernel_text_address+0x79/0xf0 [ 566.848401] ? __kernel_text_address+0xd/0x40 [ 566.852919] ? unwind_get_return_address+0x61/0xa0 [ 566.857880] ? __save_stack_trace+0x8d/0xf0 [ 566.862238] ? jbd2__journal_start+0x162/0xa80 [ 566.866857] ? rcu_note_context_switch+0x730/0x730 10:04:25 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x10) 10:04:25 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0xffff8000}) [ 566.869347] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 566.871810] ? save_stack+0xa9/0xd0 [ 566.871842] ? check_same_owner+0x340/0x340 [ 566.871865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.895626] ? rcu_note_context_switch+0x730/0x730 [ 566.900585] __should_failslab+0x124/0x180 [ 566.904840] should_failslab+0x9/0x14 [ 566.908664] __kmalloc+0x2c8/0x760 [ 566.912228] ? trace_hardirqs_off+0xd/0x10 [ 566.916479] ? _raw_spin_unlock_irqrestore+0x63/0xc0 10:04:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 566.921596] ? ext4_ext_remove_space+0x26aa/0x4bb0 [ 566.926544] ext4_ext_remove_space+0x26aa/0x4bb0 [ 566.931330] ? __kasan_slab_free+0x131/0x170 [ 566.935756] ? trace_hardirqs_on+0xd/0x10 [ 566.939928] ? ext4_ext_index_trans_blocks+0x150/0x150 [ 566.945222] ? ext4_es_can_be_merged+0x2a0/0x2a0 [ 566.949996] ? jbd2_write_access_granted.part.9+0x274/0x430 [ 566.955730] ? jbd2_journal_file_inode+0x690/0x690 [ 566.960689] ? rcu_note_context_switch+0x730/0x730 [ 566.965640] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 566.970687] ? __es_tree_search.isra.13+0x1ba/0x220 [ 566.975726] ? __es_remove_extent+0x9a3/0xba0 [ 566.980242] ? ext4_es_remove_extent+0x12a/0x4e0 [ 566.985016] ? lock_downgrade+0x8f0/0x8f0 [ 566.989186] ? ext4_es_scan+0x970/0x970 [ 566.989753] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 566.993177] ? lock_release+0xa30/0xa30 [ 566.993198] ? ext4_ext_truncate+0x96/0x220 [ 566.993223] ? do_raw_write_trylock+0x1c0/0x1c0 [ 567.016470] ? kasan_check_write+0x14/0x20 [ 567.020730] ? _raw_write_unlock+0x22/0x30 [ 567.024984] ? ext4_es_remove_extent+0x12f/0x4e0 [ 567.029751] ? rcu_note_context_switch+0x730/0x730 [ 567.034697] ? ext4_es_lookup_extent+0xde0/0xde0 [ 567.039475] ? down_write+0x8f/0x130 [ 567.043229] ? ext4_truncate+0xe90/0x1670 [ 567.047409] ext4_ext_truncate+0x1d1/0x220 [ 567.052477] ext4_truncate+0xef0/0x1670 [ 567.056463] ? up_write+0x7b/0x220 [ 567.060018] ? up_read+0x110/0x110 [ 567.063581] ? ext4_punch_hole+0x1210/0x1210 [ 567.068003] ? __lock_acquire+0x36c0/0x5020 [ 567.072364] ? do_wp_page+0x1670/0x1670 [ 567.076368] ? down_write+0x8f/0x130 [ 567.080105] ? unmap_mapping_range+0x48/0x60 [ 567.084536] ext4_setattr+0x17e6/0x2ae0 [ 567.088521] ? memset+0x31/0x40 [ 567.091829] ? ext4_journalled_write_end+0x16f0/0x16f0 [ 567.097126] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 567.102159] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 567.107371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.112924] ? timespec64_trunc+0xea/0x180 [ 567.117177] ? inode_init_owner+0x340/0x340 10:04:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xd], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:25 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcff0000]}, 0x10) 10:04:25 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x80ffff00000000}) [ 567.121521] ? lock_acquire+0x1e4/0x540 [ 567.125516] ? current_time+0x131/0x1b0 [ 567.129510] ? timespec64_trunc+0x180/0x180 [ 567.133847] ? lock_release+0xa30/0xa30 [ 567.137839] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 567.142875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.148430] ? ext4_journalled_write_end+0x16f0/0x16f0 [ 567.153727] notify_change+0xc0c/0x10f0 [ 567.157726] ? setattr_prepare+0x830/0x830 [ 567.161986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.166946] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 567.167559] do_truncate+0x1ac/0x2b0 [ 567.167579] ? file_open_root+0x580/0x580 [ 567.185865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.191427] vfs_truncate+0x60e/0x840 [ 567.195251] ? do_truncate+0x2b0/0x2b0 [ 567.199162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.204711] ? getname_flags+0x26e/0x5a0 [ 567.208798] do_sys_truncate+0x156/0x190 [ 567.212875] ? vfs_truncate+0x840/0x840 [ 567.216866] ? syscall_slow_exit_work+0x500/0x500 [ 567.221736] __x64_sys_truncate+0x54/0x80 [ 567.225921] do_syscall_64+0x1b9/0x820 [ 567.229819] ? finish_task_switch+0x1d3/0x870 [ 567.230769] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 567.234327] ? syscall_return_slowpath+0x5e0/0x5e0 [ 567.234348] ? syscall_return_slowpath+0x31d/0x5e0 [ 567.234370] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 567.259709] ? prepare_exit_to_usermode+0x291/0x3b0 [ 567.264747] ? perf_trace_sys_enter+0xb10/0xb10 [ 567.269437] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 567.274395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.279594] RIP: 0033:0x455ab9 [ 567.282793] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 567.302420] RSP: 002b:00007fd8a6537c68 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 567.310155] RAX: ffffffffffffffda RBX: 00007fd8a65386d4 RCX: 0000000000455ab9 [ 567.317435] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 10:04:26 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='maps\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000780)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000880)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000008c0)={@loopback={0x0, 0x1}, 0x1f, r2}) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) ioctl$int_out(r1, 0x5462, &(0x7f00000005c0)) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000400)={0x0, 0xacc}, 0x8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000580)) mount$9p_virtio(&(0x7f00000000c0)='cpuset\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x200820, &(0x7f0000000300)={'trans=virtio,', {[{@access_user='access=user', 0x2c}, {@access_any='access=any', 0x2c}, {@debug={'debug', 0x3d, 0x200}, 0x2c}, {@mmap='mmap', 0x2c}, {@cache_mmap='cache=mmap', 0x2c}, {@dfltuid={'dfltuid', 0x3d, r3}, 0x2c}]}}) 10:04:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:26 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) dup3(r0, r0, 0x80000) 10:04:26 executing program 6 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) [ 567.324714] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 567.331997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 567.339368] R13: 00000000004bbc47 R14: 00000000004d4308 R15: 0000000000000004 [ 567.355462] EXT4-fs error (device sda1) in ext4_setattr:5586: Out of memory [ 567.388190] FAULT_INJECTION: forcing a failure. [ 567.388190] name failslab, interval 1, probability 0, space 0, times 0 [ 567.399618] CPU: 1 PID: 23572 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 567.408057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.417598] Call Trace: [ 567.420213] dump_stack+0x1c9/0x2b4 [ 567.423869] ? dump_stack_print_info.cold.2+0x52/0x52 [ 567.429101] should_fail.cold.4+0xa/0x11 [ 567.433197] ? fault_create_debugfs_attr+0x1f0/0x1f0 10:04:26 executing program 7 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8035000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:26 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000040)={r0, 0x1420, 0x1ff, "0aa893c5cd5da96bb3ed7abaf2243e685ef4e5303836d86364ceb7c6efe92a7f74dad541fcef931b53d85d2a091e1bb8ba59e6a218b53ab3fb1689c44e6c42f13ffdcbcd7cfe8e1275ed9d470b5376d7b227fe121a20b713c49ec989561034ab047a98195110"}) listen(r0, 0x3) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:26 executing program 5: r0 = socket$inet(0x2, 0x5, 0xe65) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000000c0)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x200000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000280)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000005c0)={{0x2, 0x2, 0x6, 0x3, 0x9}, 0x6, 0x9, 'id1\x00', 'timer0\x00', 0x0, 0x101, 0x8, 0x8, 0x4}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000003c0)={@local={0xfe, 0x80, [], 0xaa}, 0x41, r2}) sendto$inet(r1, &(0x7f00000004c0)="417b3cc2d423c0d1a4f8cc26e07e68440c598961110f2ab5ac4f3fc7496ba83c8f304af4a07942d748a28c6817a17c81a8a53f58fd89b875cc09c7bd09810f6061aa0ec54d3ed158514247349ae988681de1a53dfac9592ad4012c76767b01cd9b1573505ad64f56b0c413ad195c7139aab60ded6ab5ce13ba81bb7b1f4af40d4fb69933dd", 0x85, 0x80, &(0x7f0000000400)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000100)="6246976610157a9e0709", 0xa, 0x4000811, &(0x7f0000000580)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) 10:04:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x700000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:26 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x10) 10:04:26 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0xffffffff00000000}) [ 567.438332] ? __schedule+0x884/0x1ea0 [ 567.442249] ? __sched_text_start+0x8/0x8 [ 567.446423] ? proc_fail_nth_write+0x9e/0x210 [ 567.450946] ? proc_cwd_link+0x1d0/0x1d0 [ 567.455038] ? lock_acquire+0x1e4/0x540 [ 567.459048] ? lock_acquire+0x1e4/0x540 [ 567.463049] ? fs_reclaim_acquire+0x20/0x20 [ 567.467392] ? lock_downgrade+0x8f0/0x8f0 [ 567.471569] ? check_same_owner+0x340/0x340 [ 567.475915] ? rcu_note_context_switch+0x730/0x730 [ 567.480863] ? schedule+0xfb/0x450 [ 567.484419] ? fsnotify+0x14e0/0x14e0 10:04:26 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0xc03800}) [ 567.488246] __should_failslab+0x124/0x180 [ 567.492508] should_failslab+0x9/0x14 [ 567.496239] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 567.496323] __kmalloc_track_caller+0x2c4/0x760 [ 567.511307] ? strncpy_from_user+0x510/0x510 [ 567.515731] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 567.521286] ? strndup_user+0x77/0xd0 [ 567.525113] memdup_user+0x2c/0xa0 [ 567.528669] strndup_user+0x77/0xd0 [ 567.532340] ksys_mount+0x3c/0x140 [ 567.535904] __x64_sys_mount+0xbe/0x150 [ 567.539898] do_syscall_64+0x1b9/0x820 [ 567.541719] FAULT_INJECTION: forcing a failure. [ 567.541719] name failslab, interval 1, probability 0, space 0, times 0 [ 567.543792] ? finish_task_switch+0x1d3/0x870 [ 567.543813] ? syscall_return_slowpath+0x5e0/0x5e0 [ 567.543833] ? syscall_return_slowpath+0x31d/0x5e0 [ 567.543853] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 567.543871] ? prepare_exit_to_usermode+0x291/0x3b0 [ 567.543894] ? perf_trace_sys_enter+0xb10/0xb10 [ 567.584020] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 567.588884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.594070] RIP: 0033:0x455ab9 [ 567.597254] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 567.617452] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 567.625167] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 567.632433] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 567.639696] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 567.646959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 567.654223] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000000 [ 567.661516] CPU: 0 PID: 23581 Comm: syz-executor7 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 567.669936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.679300] Call Trace: [ 567.681903] dump_stack+0x1c9/0x2b4 [ 567.685549] ? dump_stack_print_info.cold.2+0x52/0x52 [ 567.690761] ? kernel_text_address+0x79/0xf0 [ 567.695198] should_fail.cold.4+0xa/0x11 [ 567.699292] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 567.701882] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 567.704413] ? save_stack+0xa9/0xd0 [ 567.704432] ? save_stack+0x43/0xd0 [ 567.721980] ? __kasan_slab_free+0x11a/0x170 [ 567.726408] ? kmem_cache_free+0x86/0x2d0 [ 567.730568] ? jbd2_journal_stop+0x449/0x15c0 [ 567.735088] ? __ext4_journal_stop+0xde/0x1f0 [ 567.739627] ? ext4_truncate+0x649/0x1670 [ 567.743788] ? ext4_setattr+0x17e6/0x2ae0 [ 567.747949] ? notify_change+0xc0c/0x10f0 [ 567.752112] ? do_truncate+0x1ac/0x2b0 [ 567.756012] ? vfs_truncate+0x60e/0x840 [ 567.760003] ? do_sys_truncate+0x156/0x190 [ 567.764258] ? __x64_sys_truncate+0x54/0x80 [ 567.768604] ? do_syscall_64+0x1b9/0x820 [ 567.772684] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.778069] ? kasan_check_read+0x11/0x20 [ 567.782232] ? do_raw_spin_unlock+0xa7/0x2f0 [ 567.786702] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 567.791311] ? kasan_check_write+0x14/0x20 [ 567.795559] ? do_raw_spin_lock+0xc1/0x200 [ 567.799818] ? trace_hardirqs_off+0xd/0x10 [ 567.804074] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 567.809194] ? __wake_up_common_lock+0x1d0/0x330 [ 567.813761] FAULT_INJECTION: forcing a failure. [ 567.813761] name failslab, interval 1, probability 0, space 0, times 0 [ 567.813968] ? check_same_owner+0x340/0x340 [ 567.829471] ? rcu_note_context_switch+0x730/0x730 [ 567.834401] ? trace_hardirqs_off+0xd/0x10 [ 567.838642] __should_failslab+0x124/0x180 [ 567.842892] should_failslab+0x9/0x14 [ 567.846689] kmem_cache_alloc+0x2af/0x760 [ 567.850830] ? trace_hardirqs_on+0xd/0x10 [ 567.854974] ? kmem_cache_free+0x22e/0x2d0 [ 567.859221] ? jbd2_journal_stop+0x235/0x15c0 [ 567.863717] jbd2__journal_start+0x1e7/0xa80 [ 567.868129] ? jbd2_write_access_granted.part.9+0x430/0x430 [ 567.873833] ? rcu_note_context_switch+0x730/0x730 [ 567.878762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.884302] ? ext4_setattr+0x2ae0/0x2ae0 [ 567.888446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.893976] ? ext4_setattr+0x2ae0/0x2ae0 [ 567.898124] __ext4_journal_start_sb+0x182/0x600 [ 567.902875] ? ext4_dirty_inode+0x62/0xc0 [ 567.907023] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 567.912730] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.918278] ? inode_init_owner+0x340/0x340 [ 567.922607] ? ext4_setattr+0x2ae0/0x2ae0 [ 567.926759] ext4_dirty_inode+0x62/0xc0 [ 567.930735] __mark_inode_dirty+0x825/0x1550 [ 567.935144] ? __inode_attach_wb+0x13e0/0x13e0 [ 567.939724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.945255] ? ext4_truncate+0x961/0x1670 [ 567.949395] ? up_write+0x7b/0x220 [ 567.952935] ? ext4_punch_hole+0x1210/0x1210 [ 567.957340] ? ext4_setattr+0x1808/0x2ae0 [ 567.961498] ? lock_downgrade+0x8f0/0x8f0 [ 567.965656] ? do_wp_page+0x1670/0x1670 [ 567.969638] ? up_write+0x7b/0x220 [ 567.973175] ? up_read+0x110/0x110 [ 567.976716] ? unmap_mapping_range+0x48/0x60 [ 567.981122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.986673] ext4_setattr+0x1ad0/0x2ae0 [ 567.990644] ? memset+0x31/0x40 [ 567.993945] ? ext4_journalled_write_end+0x16f0/0x16f0 [ 567.999219] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 568.004234] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 568.009422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.014966] ? timespec64_trunc+0xea/0x180 [ 568.019201] ? inode_init_owner+0x340/0x340 [ 568.023522] ? lock_acquire+0x1e4/0x540 [ 568.027501] ? current_time+0x131/0x1b0 [ 568.031473] ? timespec64_trunc+0x180/0x180 [ 568.035789] ? lock_release+0xa30/0xa30 [ 568.039764] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 568.044781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.050315] ? ext4_journalled_write_end+0x16f0/0x16f0 [ 568.055599] notify_change+0xc0c/0x10f0 [ 568.059595] ? setattr_prepare+0x830/0x830 [ 568.063838] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.069488] do_truncate+0x1ac/0x2b0 [ 568.073200] ? file_open_root+0x580/0x580 [ 568.077371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.082910] vfs_truncate+0x60e/0x840 [ 568.086713] ? do_truncate+0x2b0/0x2b0 [ 568.090605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.096138] ? getname_flags+0x26e/0x5a0 [ 568.100205] do_sys_truncate+0x156/0x190 [ 568.104263] ? vfs_truncate+0x840/0x840 [ 568.108236] ? syscall_slow_exit_work+0x500/0x500 [ 568.113195] __x64_sys_truncate+0x54/0x80 [ 568.117341] do_syscall_64+0x1b9/0x820 [ 568.121222] ? finish_task_switch+0x1d3/0x870 [ 568.125718] ? syscall_return_slowpath+0x5e0/0x5e0 [ 568.130647] ? syscall_return_slowpath+0x31d/0x5e0 [ 568.135587] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 568.140602] ? prepare_exit_to_usermode+0x291/0x3b0 [ 568.145615] ? perf_trace_sys_enter+0xb10/0xb10 [ 568.150283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 568.155140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.160320] RIP: 0033:0x455ab9 [ 568.163510] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 568.183001] RSP: 002b:00007fd8a6537c68 EFLAGS: 00000246 ORIG_RAX: 000000000000004c 10:04:26 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x0, 0xfffffdfd}) 10:04:26 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}, 0x10) 10:04:26 executing program 6 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) [ 568.190715] RAX: ffffffffffffffda RBX: 00007fd8a65386d4 RCX: 0000000000455ab9 [ 568.197978] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 568.205240] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 568.212518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 568.219800] R13: 00000000004bbc47 R14: 00000000004d4308 R15: 0000000000000005 [ 568.227095] CPU: 1 PID: 23610 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 10:04:27 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x10) [ 568.235514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.244880] Call Trace: [ 568.247483] dump_stack+0x1c9/0x2b4 [ 568.251222] ? dump_stack_print_info.cold.2+0x52/0x52 [ 568.256438] should_fail.cold.4+0xa/0x11 [ 568.260522] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 568.265646] ? perf_trace_lock+0x920/0x920 [ 568.269897] ? save_stack+0x43/0xd0 [ 568.273526] ? kasan_kmalloc+0xc4/0xe0 [ 568.277423] ? __kmalloc_track_caller+0x14a/0x760 [ 568.282281] ? memdup_user+0x2c/0xa0 [ 568.286019] ? strndup_user+0x77/0xd0 10:04:27 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000000)="74a0d1cafc614be83bb8711332818fae54e0975f65dc854981c9e483d0c52156dd0aa4267d2aba31303c58423d1497712258782c6d7b853e62d1dd63c0ab2e0130ee943455c4941647dc5aeecbca7bd2cfe596cf922a1411e7888b3f44b9e0b554807d37d28351db2e2c0d33bf62454f2dd36351c5d644cad2aefde383", 0x7d, 0x44, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x28000000000000}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:27 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="539980d9ff54efe16437fcd93f97345fb3cf84626bd3f4fe0c40f76415aebfb98ef58b8c675ca3fea5d5e471be592c13b10b1468dce6bf11008f8394fce3792e3b997ef0eec1a3b81c238ab760d2794c151b12d234c297ec2e15ac91b95542d3e161aad53071cfe40220abe715d858fdd2dbe3794a9640fd86cccab20d7dbabd402f827b32f14633dcb00d3be0697877dfa3fafa040026e5c6f770e832691de196efa6fa7a06f21c18fdce95efbc4d14daf49dfe5a065a1656dca078f24d1b171637d0fa0f75cba863d702af2339083c11f0c4d54865f5", 0xd7}, {&(0x7f00000005c0)="bdb766c1453b1647c01cdb41682e91bbd8df479168d3fed0299429d705b43dc42c6952a9193d1ede65f20cabf00190ed6e4ddbc6a38f686684e3757a7997c72a07c464f0e113b507580edc5ff48c6acb1607b56d97be201a390350daa62efc4fe81c180ca8e2953092b05162a540eae601bbf90b77e446c9500ccf4bc410fa68e13638d0bd44b3f6cc28003cea90aaa7b0d027b104494f2398fbdeb27acce186b915f20c41351939a04c3ed6", 0xac}, {&(0x7f0000000300)="e7e8d1bb675ded65257d9f6d62bc8c42cb51047700d3b971712f805f0a6c2f0ce64f7b345e288fe3f4374741e8b5539be8c837f825061d00e6e47592c9dc51fac4656bc9efbadb6df33c36", 0x4b}, {&(0x7f0000000680)="723758b0545a1d695a079a052674ff4ca5de941b5233a9891e93c6b01e3a31fd98b8d1adf5f004738a25524250d0e9f5d6157a65c88779ed306a4597dcb7f29c2e335d86901c43afade6751a6d686869828d37012e5b77936dad53c9ec8798e57f7309c62ac8cbf47fe6266c77813ce54446c662997bb1b8ede57aeefddb2d91283de7", 0x83}, {&(0x7f0000000740)="f97ff4e0384f38df4a2a0c243aa6753264ba76cf041cf8837a2e93d331e99deb9e14e6d571bdd844ae25633a557972b76a2bd44c3954e7254e08292496974b766b66b74ad61ba0befb8f5c2360445feedcbbd8d34d06878c415294cc031c3bfcfb0deeb36a62c456e21c715a84389e08741f0efd5e1bd2c1c7efdc601c4f80902f1dd76c7499ad22bfb27b75b86b34606295fed2d37e79a8216e044dccc35b12c21cdcf23b745ca0c435ab038bd4e9abc385f330d83a2d37eece44fc302bd14168ff6b3a4c815cceadb10212fadcc15d92cb67e9b523870b323eb1ce7779e4bfe5c239d8a9c49b8a0962da4dad04c59f09105d5d52e5f796", 0xf8}, {&(0x7f0000000840)="13ebf8838a8f02cd5bd12b035953efe8d98229ced4ce45d4469770a1b5bdc2bfa486bb02d07cf6c9aa57e3ba245091578e885f9bb4b3f353827d9391d71248ffff0a6951c85ad383387d2ece857ad69f6bce64807d4d3264722f2f1de5f0cbcadb21335aac4025148b951801fc54b4428f7e5caec3ebcd22bef2fdba855d52c0cfec2666bf571e672c4f337855720e05c662ab0437524b977bc4d19a164c90216f07b784bc38d86269b8", 0xaa}, {&(0x7f00000003c0)="adfa082bdb3359b313d74720446bd630aba3e2adeaff9f749c21a3e88b1130be1ea2cab7ab95f7f4903c0b58ba47a840bd93173123396aaa301b7bfb266f84ba4afb0a7e", 0x44}, {&(0x7f0000000900)="6393cb17696ee0cc9f5ae2d5bb06fb921e5bfab5a37d9a83af9536c780028128655e4b1208f0fec517c2e010458c170cdfb05ff112f5812d0d8a0f1e262c4231bebd302cf4893758abaca7abe976d7029126c57c7fe8d269a40009594e2e4445d0cbeb440b8c701df71ccc60a767c8a9b6c47977cc2645aa7e68fc301bd8ee16c7a98c11fb9be490b2108477824816", 0x8f}, {&(0x7f00000009c0)="fa996200b3f830afd6ff3482b5fb2565981d2a83f3b365a31a9da37b372a5cf9f67ba2b903e252e0715912dced44d04c177399f4b035b6beccd1ef4d9cf7de4f95af0ee435d4afcd9a878ec054086f373d7d1140b1e5ea2c0380e592a717c7e57785c05ae2c42e", 0x67}, {&(0x7f0000000a40)="637c4692a6dca59f0a92b179cefaedfe636b6a0eccb053bea58e3345611c40fbfba70b670a86660806bd3a96ad72bddccd2596c4feb154369fb412742b4b4674918dc2479f11e9a10ef1bc79de37519495415cd7fa", 0x55}], 0xa}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000440)={&(0x7f0000000c00)=""/208, 0x20000, 0x0, 0xa8}, 0x18) semget(0x2, 0x2, 0x200) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000b80)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) socketpair(0x5, 0x5, 0x8, &(0x7f0000000380)={0xffffffffffffffff}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x8000, 0x0) write$P9_RXATTRCREATE(r3, &(0x7f00000002c0)={0x7, 0x21, 0x1}, 0x7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x28) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$BLKBSZSET(r4, 0x40081271, &(0x7f0000000100)=0x11) 10:04:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x28], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe803], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 568.289840] ? ksys_mount+0x3c/0x140 [ 568.293575] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.298958] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 568.304515] ? proc_fail_nth_write+0x9e/0x210 [ 568.309041] ? lock_acquire+0x1e4/0x540 [ 568.313050] ? lock_acquire+0x1e4/0x540 [ 568.317043] ? fs_reclaim_acquire+0x20/0x20 [ 568.321379] ? lock_downgrade+0x8f0/0x8f0 [ 568.325553] ? check_same_owner+0x340/0x340 [ 568.329894] ? lock_release+0xa30/0xa30 [ 568.333883] ? rcu_note_context_switch+0x730/0x730 [ 568.339089] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 568.344733] __should_failslab+0x124/0x180 [ 568.349001] should_failslab+0x9/0x14 [ 568.352836] __kmalloc_track_caller+0x2c4/0x760 [ 568.357528] ? strncpy_from_user+0x510/0x510 [ 568.361959] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 568.362118] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 568.367504] ? strndup_user+0x77/0xd0 [ 568.367526] memdup_user+0x2c/0xa0 [ 568.385255] strndup_user+0x77/0xd0 [ 568.388906] ksys_mount+0x73/0x140 [ 568.392333] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 568.392457] __x64_sys_mount+0xbe/0x150 [ 568.406737] do_syscall_64+0x1b9/0x820 [ 568.410639] ? finish_task_switch+0x1d3/0x870 [ 568.415156] ? syscall_return_slowpath+0x5e0/0x5e0 [ 568.420108] ? syscall_return_slowpath+0x31d/0x5e0 [ 568.425061] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 568.430097] ? prepare_exit_to_usermode+0x291/0x3b0 [ 568.435129] ? perf_trace_sys_enter+0xb10/0xb10 10:04:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 10:04:27 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x0, 0x38c000}) 10:04:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x81000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 568.439814] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 568.444686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.449883] RIP: 0033:0x455ab9 [ 568.453074] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 568.472661] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 568.480395] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 568.487676] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 568.494963] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 568.502280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 568.509565] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000001 10:04:27 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) prlimit64(r1, 0xb, 0x0, &(0x7f0000000100)) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:27 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x10) 10:04:27 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:27 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x0, 0xc0380000000000}) 10:04:27 executing program 6 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) [ 568.571949] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 568.598357] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:27 executing program 5: r0 = memfd_create(&(0x7f0000000280)='team0\x00', 0x1) ftruncate(r0, 0x7fff) r1 = socket$inet(0x2, 0x3, 0x0) fcntl$setsig(r1, 0xa, 0x2f) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x1a9082, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendto$packet(r2, &(0x7f0000000100)="d5f6959b786c00186282758eeb5809c3cb1ccad058d6a796c9f8a2f49eb69a5e6162d8e2f51a31133e9bf86c9745", 0x2e, 0x1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x4, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) [ 568.687618] FAULT_INJECTION: forcing a failure. [ 568.687618] name failslab, interval 1, probability 0, space 0, times 0 [ 568.699117] CPU: 0 PID: 23663 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 568.707567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.716963] Call Trace: [ 568.719585] dump_stack+0x1c9/0x2b4 [ 568.723237] ? dump_stack_print_info.cold.2+0x52/0x52 [ 568.728465] should_fail.cold.4+0xa/0x11 [ 568.732564] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 568.737695] ? perf_trace_lock+0x920/0x920 [ 568.741949] ? kasan_kmalloc+0xc4/0xe0 [ 568.745857] ? __kmalloc_track_caller+0x14a/0x760 [ 568.747869] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 568.750713] ? memdup_user+0x2c/0xa0 [ 568.750732] ? strndup_user+0x77/0xd0 [ 568.750751] ? ksys_mount+0x73/0x140 [ 568.750769] ? __x64_sys_mount+0xbe/0x150 [ 568.777403] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 568.783051] ? proc_fail_nth_write+0x9e/0x210 [ 568.787568] ? lock_acquire+0x1e4/0x540 [ 568.791574] ? lock_acquire+0x1e4/0x540 [ 568.795567] ? fs_reclaim_acquire+0x20/0x20 [ 568.799908] ? lock_downgrade+0x8f0/0x8f0 [ 568.804082] ? check_same_owner+0x340/0x340 [ 568.808418] ? lock_release+0xa30/0xa30 [ 568.812409] ? rcu_note_context_switch+0x730/0x730 [ 568.817354] ? __check_object_size+0xa3/0x5d7 [ 568.821878] __should_failslab+0x124/0x180 [ 568.824671] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 568.826137] should_failslab+0x9/0x14 [ 568.826155] kmem_cache_alloc_trace+0x2cb/0x780 [ 568.826178] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 568.850494] ? _copy_from_user+0xdf/0x150 [ 568.854672] copy_mount_options+0x5f/0x380 [ 568.858938] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 568.864513] ksys_mount+0xd0/0x140 [ 568.868076] __x64_sys_mount+0xbe/0x150 [ 568.872073] do_syscall_64+0x1b9/0x820 [ 568.875979] ? finish_task_switch+0x1d3/0x870 [ 568.880503] ? syscall_return_slowpath+0x5e0/0x5e0 [ 568.885458] ? syscall_return_slowpath+0x31d/0x5e0 [ 568.890418] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 568.895459] ? prepare_exit_to_usermode+0x291/0x3b0 [ 568.900511] ? perf_trace_sys_enter+0xb10/0xb10 [ 568.905202] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 568.910173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.915374] RIP: 0033:0x455ab9 [ 568.918570] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:04:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc0ffffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x300000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:27 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:27 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x840, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000040)={0x2a, 0x29, 0x2, {0x9, [{{0x40, 0x2, 0x6}, 0x4, 0x4, 0x7, './file0'}]}}, 0x2a) 10:04:27 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x10) 10:04:27 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x0, 0x80ffff}) 10:04:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x500000000000000) 10:04:27 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x8101) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000100)) [ 568.938120] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 568.945855] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 568.953141] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 568.960424] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 568.967707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 568.974995] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000002 10:04:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x100000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:27 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x0, 0xc03800}) 10:04:27 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x100) ioctl$TCSBRKP(r0, 0x5425, 0x200) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r1, 0x3) sendto$inet(r1, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x900) 10:04:27 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}, 0x10) 10:04:27 executing program 6 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) [ 569.081081] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:28 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) r4 = getegid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000500)={0x148, 0x0, 0x8, [{{0x4, 0x2, 0x464d, 0x66, 0x7, 0x3, {0x4, 0xfffffffffffffc1b, 0x7, 0x5, 0x4, 0x7, 0x8, 0x1, 0x8001, 0x1eb, 0x4, r2, r3, 0x3, 0x8}}, {0x1, 0x0, 0x3, 0x2, '),\x00'}}, {{0x4, 0x0, 0x8000, 0xfff, 0x1f, 0x6, {0x4, 0x400, 0x7, 0x1, 0x6, 0x401, 0x2db8, 0x3, 0x9, 0x5, 0x401, 0xee01, r4, 0x5, 0x7}}, {0x0, 0x9, 0x0, 0x100000001}}]}, 0x148) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='),\x00'}, 0x10) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f00000001c0)=@req={0x6, 0x5, 0x6, 0x200}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r5, 0x50, &(0x7f0000000680)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)=r6, 0x4) 10:04:28 executing program 2: r0 = socket$inet(0x2, 0x80006, 0x40000fffc) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x4200, 0x0) 10:04:28 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x0, 0xfdfdffff}) [ 569.126327] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:28 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x10) 10:04:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x400000000000000) 10:04:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe8030000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 569.218285] FAULT_INJECTION: forcing a failure. [ 569.218285] name failslab, interval 1, probability 0, space 0, times 0 [ 569.229646] CPU: 1 PID: 23741 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 569.238061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.247423] Call Trace: [ 569.250032] dump_stack+0x1c9/0x2b4 [ 569.253683] ? dump_stack_print_info.cold.2+0x52/0x52 [ 569.258910] should_fail.cold.4+0xa/0x11 [ 569.262997] ? fault_create_debugfs_attr+0x1f0/0x1f0 10:04:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x9000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:28 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x1000000005) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:28 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x0, 0xffff8000}) 10:04:28 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec03]}, 0x10) [ 569.268125] ? lock_release+0xa30/0xa30 [ 569.272124] ? kasan_check_read+0x11/0x20 [ 569.276293] ? rcu_is_watching+0x8c/0x150 [ 569.280471] ? is_bpf_text_address+0xd7/0x170 [ 569.284999] ? __kernel_text_address+0xd/0x40 [ 569.289521] ? lock_acquire+0x1e4/0x540 [ 569.293514] ? fs_reclaim_acquire+0x20/0x20 [ 569.297859] ? lock_downgrade+0x8f0/0x8f0 [ 569.302040] ? check_same_owner+0x340/0x340 [ 569.306381] ? save_stack+0xa9/0xd0 [ 569.310027] ? rcu_note_context_switch+0x730/0x730 [ 569.314985] ? kmem_cache_alloc_trace+0x152/0x780 [ 569.319853] ? copy_mount_options+0x5f/0x380 [ 569.324289] __should_failslab+0x124/0x180 [ 569.328552] should_failslab+0x9/0x14 [ 569.332374] kmem_cache_alloc+0x2af/0x760 [ 569.336545] ? lock_acquire+0x1e4/0x540 [ 569.340564] getname_flags+0xd0/0x5a0 [ 569.344397] user_path_at_empty+0x2d/0x50 [ 569.348574] do_mount+0x180/0x1fb0 [ 569.352131] ? check_same_owner+0x340/0x340 [ 569.356469] ? lock_release+0xa30/0xa30 [ 569.360470] ? copy_mount_string+0x40/0x40 [ 569.364747] ? kasan_kmalloc+0xc4/0xe0 10:04:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x900000000000000) 10:04:28 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x0, 0x80ffff00000000}) 10:04:28 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000140)={{0xffffffffb415f89b, 0x6}, 'port0\x00', 0x40, 0x0, 0x5, 0x3f, 0x2, 0x70000, 0x3, 0x0, 0x1, 0x9}) r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r1, 0x3) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x4, 0x8, 0x7, 0x8, 0x37, 0x3ff, 0x80000001, 0x80000001, 0x80000001, 0x5}) sendto$inet(r1, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000040)=0x3) [ 569.368661] ? kmem_cache_alloc_trace+0x318/0x780 [ 569.373527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 569.379082] ? _copy_from_user+0xdf/0x150 [ 569.383247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.388794] ? copy_mount_options+0x285/0x380 [ 569.393312] ksys_mount+0x12d/0x140 [ 569.396970] __x64_sys_mount+0xbe/0x150 [ 569.400976] do_syscall_64+0x1b9/0x820 [ 569.404882] ? syscall_return_slowpath+0x5e0/0x5e0 [ 569.409855] ? syscall_return_slowpath+0x31d/0x5e0 10:04:28 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}, 0x10) [ 569.414800] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 569.420784] ? prepare_exit_to_usermode+0x291/0x3b0 [ 569.425816] ? perf_trace_sys_enter+0xb10/0xb10 [ 569.430500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 569.435372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.440575] RIP: 0033:0x455ab9 [ 569.442262] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:28 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0xffffffff, 0x7fffffff, 0x1800000000000, 0x8}) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1d, &(0x7f0000000280)="d45b37fcfea43468c495cbe32004d5c3238981a9a28835d01c7259c29d41f1b25420b3dfb467dd1c37269d13fc1ec16a8ac01591630da8d7c9f9501f883c370cdcc428e5d54b93dce678f2974e097ff12d90273ab71c07f5f72df1765cf08944381379cce38140702d1a029d589864340b1bc5cc3c4c6baf6ac3d43bfa69230e4fa357ee2f94915116fd1a2405344a8fa0e2c38aca07655f427c37eb18192e77de2f346146f6f7c7ce4c5109e0a6c8005a1a372a28b5f3", 0xb7) [ 569.443759] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 569.473596] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 569.481321] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 569.488600] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 569.495883] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 569.503168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 569.510452] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000003 [ 569.534261] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:28 executing program 6 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:28 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x0, 0xfdfdffff00000000}) 10:04:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x8000000) 10:04:28 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0xfffffffffffff000) sendto$inet(r0, &(0x7f0000000040)="f1", 0xc9f7a764, 0x0, &(0x7f0000000080)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x5000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:28 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f9]}, 0x10) 10:04:28 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r1 = memfd_create(&(0x7f00000000c0)='!\x00', 0x2) open_by_handle_at(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x80) ioctl$FIONREAD(r1, 0x541b, &(0x7f00000001c0)) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000100)=0x2400, 0x4) [ 569.654432] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 569.673390] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 569.678054] FAULT_INJECTION: forcing a failure. [ 569.678054] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 569.695579] CPU: 1 PID: 23799 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 569.704001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.713395] Call Trace: [ 569.716008] dump_stack+0x1c9/0x2b4 [ 569.719666] ? dump_stack_print_info.cold.2+0x52/0x52 [ 569.724903] should_fail.cold.4+0xa/0x11 [ 569.729023] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 569.734170] ? perf_trace_lock_acquire+0x4f9/0x9a0 [ 569.739134] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 569.744266] ? trace_hardirqs_on+0x10/0x10 [ 569.748532] ? perf_tp_event+0xc40/0xc40 10:04:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x3000000) 10:04:28 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000900)='/dev/rfkill\x00', 0x40000, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000800)={'filter\x00', 0x0, 0x4, 0x8a, [], 0x5, &(0x7f00000006c0)=[{}, {}, {}, {}, {}], &(0x7f0000000740)=""/138}, &(0x7f0000000880)=0x78) getsockopt$inet6_buf(r1, 0x29, 0x2c, &(0x7f0000000100)=""/23, &(0x7f00000001c0)=0xfe4b) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) socket$pptp(0x18, 0x1, 0x2) sendfile(r1, r1, &(0x7f0000000680)=0x2d, 0xffffffff) syz_mount_image$nfs(&(0x7f0000000200)='nfs\x00', &(0x7f0000000280)='./file0\x00', 0x2, 0x4, &(0x7f00000005c0)=[{&(0x7f00000002c0)="8b6419b0530425b19074d798433ddfb090726ae826162eaf1747787d66ddfe7f8a47", 0x22, 0x4}, {&(0x7f0000000300)="a13e8c83c538f51f590d60ad90bba73a9fc95f0aa514569467c9aa97ba5921d2524b445416081c6c25e9c611916304f29ffa8321011ed57d58b2fdb758c9eabd55d3490268a35f36c37770190ad2b726a3d85b8b5b5e9b2f7cd8f4ee8c4d6d4fc3703b867ddba38626076af7e81daaac5424c1839642ee4568b80f", 0x7b, 0x400}, {&(0x7f00000003c0)="92d037eeac64b81901496be75057c02aebf1a635ed6dd4a269647ff1661b7d1ccf65afe7b66ad8ad7798f5424e4fdcfe949b089efb420b065e33d4b04009bb17cd1ad5b3b6b4702ddaf1c52a3d3170754fc6978432e2e2e767891bab766e6f8f12477bc78fb8c9d8138ea952599eb65db8dca569f918893bd6639479ef", 0x7d, 0xfff}, {&(0x7f00000004c0)="8c577d8f2911c1634ab94f2c8588c261f51e4650b2ccc03478c0b705cba06503901027b78f7a723ab9604a49204ccdab54cd9faf253edcf3d2b72d5505badce0db8d9561e7002f2ee0b58a3254300e3d03e0b614c32b4d7a5163eecf002b3b9ad2af330b9327b4a07ae90f6673b5a0465640d1ffae89b3c489ad26853ddc70798d2ddb96c7e819c79f3c804063bf440231ce5be0b2180b70377892919cb81445cfd7aa29d06f5a1eee9d337b0a01b54ce405eef45a67a5040a12cb0fabc5b296398f55947e628c69aaf773fc8c10a4c9170cb8c1adc5d4e4", 0xd8, 0xff}], 0x20800, &(0x7f0000000640)='/dev/rfkill\x00') ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000008c0)={'gre0\x00', {0x2, 0x4e20, @multicast1=0xe0000001}}) socket$pptp(0x18, 0x1, 0x2) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:28 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000000000000]}, 0x10) 10:04:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 569.752626] ? memset+0x31/0x40 [ 569.755935] ? perf_trace_lock_acquire+0x4f9/0x9a0 [ 569.760925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.766481] ? should_fail+0x246/0xd86 [ 569.770390] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 569.775526] __alloc_pages_nodemask+0x36e/0xdb0 [ 569.780236] ? kasan_check_read+0x11/0x20 [ 569.784424] ? rcu_is_watching+0x8c/0x150 [ 569.788597] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 569.793641] ? is_bpf_text_address+0xd7/0x170 [ 569.798162] ? __kernel_text_address+0xd/0x40 [ 569.802685] ? lock_acquire+0x1e4/0x540 [ 569.806680] ? fs_reclaim_acquire+0x20/0x20 [ 569.811021] ? lock_downgrade+0x8f0/0x8f0 [ 569.815216] ? lock_release+0xa30/0xa30 [ 569.819216] ? check_same_owner+0x340/0x340 [ 569.823579] ? save_stack+0xa9/0xd0 [ 569.827234] cache_grow_begin+0x91/0x710 [ 569.831323] kmem_cache_alloc+0x689/0x760 [ 569.835490] ? lock_acquire+0x1e4/0x540 [ 569.839496] getname_flags+0xd0/0x5a0 [ 569.843323] user_path_at_empty+0x2d/0x50 [ 569.847494] do_mount+0x180/0x1fb0 [ 569.851054] ? check_same_owner+0x340/0x340 [ 569.855214] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 569.855415] ? lock_release+0xa30/0xa30 [ 569.869710] ? copy_mount_string+0x40/0x40 [ 569.873968] ? retint_kernel+0x10/0x10 [ 569.877883] ? copy_mount_options+0x1a1/0x380 [ 569.882400] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 569.887267] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.892820] ? copy_mount_options+0x285/0x380 [ 569.897342] ksys_mount+0x12d/0x140 [ 569.900997] __x64_sys_mount+0xbe/0x150 10:04:28 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x100000406, 0xffffffffffffffff) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x3, 0x2, 0x4, {0xa, 0x4e20, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x6}}}, 0xfffffef2) setsockopt$inet_dccp_int(r0, 0x21, 0xa, &(0x7f0000000040)=0x7ffc, 0x4) r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r1, 0x3) sendto$inet(r1, &(0x7f0000000200)="f1", 0x1, 0x20000000, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [{0x20}, {0x20}, {0x20}, {0x20, 'md5sum'}, {0x20, '-&+'}, {0x20, ')('}], 0xa, "4dc286e6e70357f2fbc0676979a3016336df6cce0e7b4d821e3bc7f8e949981e864c85b07419bc2f97d8273148b05d71dffea19f"}, 0x50) 10:04:28 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x10) 10:04:28 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x0, 0xffffffff00000000}) [ 569.905001] do_syscall_64+0x1b9/0x820 [ 569.908916] ? finish_task_switch+0x1d3/0x870 [ 569.913460] ? syscall_return_slowpath+0x5e0/0x5e0 [ 569.918412] ? syscall_return_slowpath+0x31d/0x5e0 [ 569.923368] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 569.928409] ? prepare_exit_to_usermode+0x291/0x3b0 [ 569.933449] ? perf_trace_sys_enter+0xb10/0xb10 [ 569.938138] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 569.943013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.948213] RIP: 0033:0x455ab9 [ 569.951405] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 569.970993] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 569.978732] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 569.986026] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 569.993321] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 10:04:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x30000000) [ 570.000611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 570.007908] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000004 10:04:28 executing program 6 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x7000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:28 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}, 0x0, 0x8000000000000000}) 10:04:28 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x640, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0xf, 0x1f, 0x1, 0x100000000}, 0xf) 10:04:28 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x10) 10:04:28 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x1000007fff) getsockname$unix(r1, &(0x7f0000000300), &(0x7f00000003c0)=0x6e) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r2 = socket(0x17, 0x800, 0x42) sendmsg$nl_generic(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x11}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="800000002000200025bd7000fcdbdf25100000006800250024000600200000006e65743073656c696e75785d6264657676626f61000c009600776c616aae6e3295f620a6002ba4cfe80950a087b75d3ee6ee7562b607e1ac817db6000014003b000000000000000000000000000000000104009500ab448692b43f14919fddadfbb63a33485a50b38b34d668d6f0b36736085d723c3a7593cfcb77a13fa74f0aec63d4e281f33556c1eccc3490e08624251b9318f200f8e830b6ab9100e39012386103192cd2ba4051cf585e2ade39079e909766f7f5de1d254fab61c5c89ca84f51d43fc2139848"], 0x80}, 0x1, 0x0, 0x0, 0xc0c4}, 0x1) [ 570.159048] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 570.172789] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 570.189268] FAULT_INJECTION: forcing a failure. [ 570.189268] name failslab, interval 1, probability 0, space 0, times 0 [ 570.201080] CPU: 0 PID: 23870 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 10:04:29 executing program 3: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x100000000, 0x400000) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x2) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) close(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000140)={0x3717f539, 0x0, 'client1\x00', 0x5, "d646c6531a983c31", "64bbbc9623b0d3c6d71148c3dbab5b75ebbf8f7ccfddc2126d64bd74cdfc76c9", 0x1ff, 0x8c34}) 10:04:29 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) r1 = dup3(r0, r0, 0x80000) accept$alg(r1, 0x0, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) r2 = shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x3000) shmdt(r2) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 570.209496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.218864] Call Trace: [ 570.221476] dump_stack+0x1c9/0x2b4 [ 570.225143] ? dump_stack_print_info.cold.2+0x52/0x52 [ 570.230409] should_fail.cold.4+0xa/0x11 [ 570.234503] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 570.239648] ? save_stack+0xa9/0xd0 [ 570.243303] ? save_stack+0x43/0xd0 [ 570.246964] ? kmem_cache_alloc_trace+0x152/0x780 [ 570.251830] ? vfs_new_fs_context+0x5a/0x700 10:04:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88470000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 570.256259] ? do_mount+0x5cf/0x1fb0 [ 570.259990] ? ksys_mount+0x12d/0x140 [ 570.263813] ? __x64_sys_mount+0xbe/0x150 [ 570.267982] ? do_syscall_64+0x1b9/0x820 [ 570.272064] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.277459] ? trace_hardirqs_off+0xd/0x10 [ 570.281886] ? quarantine_put+0x10d/0x1b0 [ 570.286064] ? lock_acquire+0x1e4/0x540 [ 570.290060] ? fs_reclaim_acquire+0x20/0x20 [ 570.294413] ? lock_downgrade+0x8f0/0x8f0 [ 570.298595] ? check_same_owner+0x340/0x340 [ 570.302935] ? debug_mutex_init+0x2d/0x60 10:04:29 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x800) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000040)={0x9, [0xfffffffffffffffb, 0xce9, 0x4, 0x3, 0x1, 0xfff, 0x7, 0xf9f, 0x1f]}, 0x16) [ 570.307109] ? rcu_note_context_switch+0x730/0x730 [ 570.312069] __should_failslab+0x124/0x180 [ 570.316876] should_failslab+0x9/0x14 [ 570.320712] kmem_cache_alloc_trace+0x2cb/0x780 [ 570.325428] proc_init_fs_context+0x49/0x130 [ 570.329858] ? proc_fill_super+0x630/0x630 [ 570.334117] vfs_new_fs_context+0x2ba/0x700 [ 570.338467] do_mount+0x5cf/0x1fb0 [ 570.342032] ? check_same_owner+0x340/0x340 [ 570.346381] ? lock_release+0xa30/0xa30 [ 570.350391] ? copy_mount_string+0x40/0x40 [ 570.354643] ? kasan_kmalloc+0xc4/0xe0 10:04:29 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) userfaultfd(0x800) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80800, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000200)={r2, 0x1, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10) [ 570.358557] ? kmem_cache_alloc_trace+0x318/0x780 [ 570.363438] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 570.369005] ? _copy_from_user+0xdf/0x150 [ 570.373203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 570.373362] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 570.378746] ? copy_mount_options+0x285/0x380 [ 570.378774] ksys_mount+0x12d/0x140 [ 570.378795] __x64_sys_mount+0xbe/0x150 [ 570.378817] do_syscall_64+0x1b9/0x820 [ 570.405168] ? finish_task_switch+0x1d3/0x870 10:04:29 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10000, 0x101000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000040)="87825ad978981bbbc4d943ed91b70e5f8ef5caf9646d50645e9ea76c8cb6ac22f052eb0cac1a0af6c9600dc14bcbfc1a3154d98c25e6b88a80bc2e9e3971", 0x3e, 0xc010, &(0x7f0000000140)={0x11, 0x1f, r2, 0x1, 0x7fff, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0xfffffffffffffff5) listen(r0, 0x3) [ 570.409683] ? syscall_return_slowpath+0x5e0/0x5e0 [ 570.414635] ? syscall_return_slowpath+0x31d/0x5e0 [ 570.419588] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 570.424626] ? prepare_exit_to_usermode+0x291/0x3b0 [ 570.429659] ? perf_trace_sys_enter+0xb10/0xb10 [ 570.434349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 570.439233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.444440] RIP: 0033:0x455ab9 10:04:29 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000140)=0x2, 0x4) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = pkey_alloc(0x0, 0x3) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x159e43, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0xb, &(0x7f00000000c0)=0xb83, 0x4) pkey_free(r2) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000180)=[{0x4, 0x2eb9}, {0x4, 0x1}, {0xf, 0x3f}, {0xc, 0xe44}], 0x4) 10:04:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8864], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 570.447634] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 570.467317] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 570.475069] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 570.482350] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 570.489639] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 570.496926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 10:04:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x300) [ 570.504298] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000005 10:04:29 executing program 6 (fault-call:2 fault-nth:6): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:29 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={r1, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}, 0x8, 0x5, 0x9, 0x7fffffff, 0x20}, 0x98) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x28000, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000240)=""/253, 0x1000, 0x1000}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) r3 = accept(r0, &(0x7f0000000000)=@l2, &(0x7f0000000080)=0xfffffffffffffe16) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000140)=0xd, 0x4) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:29 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x709c982c]}, 0x10) 10:04:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8864], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:29 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) write$sndseq(r1, &(0x7f0000000240)=[{0x60000000000000, 0xbc9a, 0x4b4, 0x5, @tick=0x1599, {0x7, 0x22}, {0x9, 0x5}, @note={0x0, 0x5, 0x7, 0x5, 0x1}}, {0x100000000, 0x8001, 0x6, 0x9, @tick=0x2, {0x9, 0x401}, {0x100, 0x1f}, @ext={0x10, &(0x7f00000000c0)="2e6b34ca9291a8b14f977e22f05810b1"}}, {0x2, 0x3d97, 0x0, 0x6, @time, {0x3f, 0x46}, {0x9, 0x9}, @quote={{0x1, 0x9}, 0xac, &(0x7f0000000100)={0x3, 0x4, 0x1, 0x40, @time, {0x94}, {0x0, 0x3ff}, @addr={0x1, 0x4}}}}, {0xfffffffffffff880, 0x20, 0x81, 0x8, @tick=0x4, {0x8, 0xff}, {0x9, 0x7fffffff}, @queue={0x0, {0x100000000, 0x8001}}}, {0xfffffffffffffff8, 0x7, 0x9, 0x4728, @tick=0x3, {0x100000000}, {0x2, 0x5}, @ext={0xd4, &(0x7f0000000140)="55b018b9a93180f28785d21c9f2fb19575fb9d7a5c03b91aa5db6590ca73393696806a1b171d1f5ce2d08f62e7f882df40d0760ee7ad62ba15f7f56ecb1962b2ec62113c1f486f062c34ce79ad5940009ba489dec5b76d95553d94a7f998a041c7552fe25b6859535caaf9393abe1b10b4474dcf00d4a13b37acaf7e82b0fe8491cadd4e72bba4c891928718212e8f4584d3764aa4f755300853f763a06b06af70e676c7187a9b9bd7928c54e9e773fee3f35371ef4e693b7c4cbaa3876b951c6317516feca400f13b58627735168f7f8658468c"}}], 0xf0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 570.547975] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:29 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f00000000c0)=0x5, 0x4) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), &(0x7f00000001c0)=0xc) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000600)}, 0x0) 10:04:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x300000000000000) [ 570.608175] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 570.638491] FAULT_INJECTION: forcing a failure. [ 570.638491] name failslab, interval 1, probability 0, space 0, times 0 [ 570.650303] CPU: 1 PID: 23921 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 570.658724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.668100] Call Trace: [ 570.670707] dump_stack+0x1c9/0x2b4 [ 570.674362] ? dump_stack_print_info.cold.2+0x52/0x52 [ 570.679586] should_fail.cold.4+0xa/0x11 [ 570.683677] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 570.688807] ? save_stack+0xa9/0xd0 [ 570.692461] ? save_stack+0x43/0xd0 [ 570.696104] ? kmem_cache_alloc_trace+0x152/0x780 [ 570.700961] ? vfs_new_fs_context+0x5a/0x700 [ 570.705471] ? do_mount+0x5cf/0x1fb0 [ 570.709205] ? ksys_mount+0x12d/0x140 [ 570.713025] ? __x64_sys_mount+0xbe/0x150 [ 570.717193] ? do_syscall_64+0x1b9/0x820 [ 570.721274] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.726675] ? lock_acquire+0x1e4/0x540 [ 570.730667] ? fs_reclaim_acquire+0x20/0x20 [ 570.735011] ? lock_downgrade+0x8f0/0x8f0 [ 570.739193] ? check_same_owner+0x340/0x340 [ 570.743536] ? debug_mutex_init+0x2d/0x60 [ 570.747708] ? rcu_note_context_switch+0x730/0x730 [ 570.752665] __should_failslab+0x124/0x180 [ 570.756925] should_failslab+0x9/0x14 [ 570.760750] kmem_cache_alloc_trace+0x2cb/0x780 [ 570.765458] proc_init_fs_context+0x49/0x130 [ 570.769891] ? proc_fill_super+0x630/0x630 [ 570.774147] vfs_new_fs_context+0x2ba/0x700 [ 570.778497] do_mount+0x5cf/0x1fb0 [ 570.782059] ? check_same_owner+0x340/0x340 [ 570.786401] ? lock_release+0xa30/0xa30 [ 570.790418] ? copy_mount_string+0x40/0x40 [ 570.794679] ? kasan_kmalloc+0xc4/0xe0 [ 570.794931] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 570.798608] ? kmem_cache_alloc_trace+0x318/0x780 [ 570.798635] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 570.798650] ? _copy_from_user+0xdf/0x150 [ 570.798671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 570.829014] ? copy_mount_options+0x285/0x380 [ 570.833545] ksys_mount+0x12d/0x140 [ 570.837194] __x64_sys_mount+0xbe/0x150 [ 570.841190] do_syscall_64+0x1b9/0x820 [ 570.845087] ? finish_task_switch+0x1d3/0x870 [ 570.849603] ? syscall_return_slowpath+0x5e0/0x5e0 [ 570.854550] ? syscall_return_slowpath+0x31d/0x5e0 10:04:29 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b]}, 0x10) 10:04:29 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea000000b0cf1aa607632363e06e08480d99d62d7816f03615ec146afb18b9ce716606fac5837f118cb234ea34bbf424e10792add6b83ef5d1dd2de615f4013eb2ab131f52feecbde481978e5caa61b70f78f1d2383085d21600d3208f0ef7521e078810475e476803d056adc4f920b614ff28e65a4d4bbdc8745b6b02477788537f3175bf4d266d2fa031b05803762212cdeca72d3c2ede7ad97f629dd0b21affc9dd6c2d724c2e255865fea7b452edfa7da32aa537cf6e78e532a6706447dd58bbd9e5e6e8e4bfda6faa36344107f4c1c31aca8f4c9f89649a7c7f1e9edea82bdc898f528a6b210a1c4f721752"], &(0x7f0000000000)=0xf2) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r1, 0x401, 0xdeb4, 0x8, 0x2, 0x101}, &(0x7f0000000080)=0x14) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x68], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:29 executing program 3: r0 = userfaultfd(0x0) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x94, 0x4000) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000180)=0x2) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000184000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f00000000c0)=ANY=[@ANYBLOB="09000000000000000000000000000000000600000000000000000000000000000000000000000000"]) 10:04:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffca88], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:29 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000140)={0x9, &(0x7f0000000040)=[{0x4, 0x5, 0x200, 0x3ff}, {0x89, 0x6, 0x6, 0xfffffffffffffffb}, {0x7fc, 0x80000001, 0x6, 0x6}, {0x4391, 0x1c, 0x3, 0x2}, {0x8, 0x7, 0x1f, 0xffffffffffff8000}, {0x8, 0x6, 0x35054dfb, 0x4}, {0x776, 0x80000001, 0x6f77, 0x3}, {0x3, 0x9, 0x9e5, 0x3}, {0x1, 0x1d, 0x7}]}, 0x10) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:29 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x10) [ 570.859500] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 570.861742] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 570.864528] ? prepare_exit_to_usermode+0x291/0x3b0 [ 570.864549] ? perf_trace_sys_enter+0xb10/0xb10 [ 570.864569] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 570.864596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.894599] RIP: 0033:0x455ab9 10:04:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 570.897790] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 570.917327] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 570.925055] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 570.932347] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 570.939630] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 570.946906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 570.954182] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000006 10:04:29 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) ioctl(r0, 0xffffffff, &(0x7f0000000000)="4700b70a12b6fc7321a3aca8f25fc26f5d0487f0404d0e82c8f7693207d8a1a79873b7ccbbf0292a724c60fc6f447bea88db16d08e2e45ecf341ba15e46cccc37abc44b4aa224cb3179bb2f0ec5b836b94fa3934d76c242e528d7fc2adc91a41eb2f9da30dc68e68cbbcdf0f3dd3b6521734f5472554") bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:29 executing program 6 (fault-call:2 fault-nth:7): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:29 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x10) 10:04:29 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000200)={'team_slave_0\x00', 0x2f9}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x82000, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x2002, 0x80000) seccomp(0x0, 0x1, &(0x7f00000002c0)={0x4, &(0x7f0000000280)=[{0x6, 0x5a6, 0x20, 0x1}, {0x7, 0x6, 0x8000, 0xf985}, {0x9, 0x9, 0x3, 0x4}, {0x3, 0x5, 0x59d4, 0x9}]}) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000001c0)={0x1, r2}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000300)=[{0xf, 0xd80}], 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) 10:04:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x4000000) 10:04:29 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/192, 0xc0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f00001ed000/0x4000)=nil, 0x4000}, 0x2}) [ 571.041438] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:30 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x8002, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[{0x0, 0xb45d}, {0x4, 0x2}, {0x2, 0x3f}, {0x2, 0x6}, {0x3, 0xffffffff}, {0x4}, {0x4}, {0x2, 0x7}, {0x0, 0x2}], 0x9) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6c00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 571.098048] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf401000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:30 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000]}, 0x10) 10:04:30 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x3) [ 571.151394] FAULT_INJECTION: forcing a failure. [ 571.151394] name failslab, interval 1, probability 0, space 0, times 0 [ 571.162842] CPU: 0 PID: 23987 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 571.171314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.181322] Call Trace: [ 571.183959] dump_stack+0x1c9/0x2b4 [ 571.187647] ? dump_stack_print_info.cold.2+0x52/0x52 [ 571.192903] should_fail.cold.4+0xa/0x11 10:04:30 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) socketpair$inet(0x2, 0x0, 0x1, &(0x7f0000000000)) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 571.197006] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 571.202171] ? save_stack+0xa9/0xd0 [ 571.205893] ? save_stack+0x43/0xd0 [ 571.209550] ? kasan_kmalloc+0xc4/0xe0 [ 571.213468] ? kmem_cache_alloc_trace+0x152/0x780 [ 571.218362] ? proc_init_fs_context+0x49/0x130 [ 571.222992] ? vfs_new_fs_context+0x2ba/0x700 [ 571.227532] ? do_mount+0x5cf/0x1fb0 [ 571.231271] ? ksys_mount+0x12d/0x140 [ 571.235118] ? do_syscall_64+0x1b9/0x820 [ 571.239227] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 571.244635] ? __x64_sys_mount+0xbe/0x150 10:04:30 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4010000]}, 0x10) [ 571.248842] ? do_syscall_64+0x1b9/0x820 [ 571.252955] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 571.254223] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 571.258359] ? quarantine_put+0x10d/0x1b0 [ 571.258403] ? lock_acquire+0x1e4/0x540 [ 571.276877] ? fs_reclaim_acquire+0x20/0x20 [ 571.281243] ? lock_downgrade+0x8f0/0x8f0 [ 571.285438] ? check_same_owner+0x340/0x340 [ 571.289791] ? rcu_note_context_switch+0x730/0x730 [ 571.294760] __should_failslab+0x124/0x180 10:04:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xe], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 571.299024] should_failslab+0x9/0x14 [ 571.302845] __kmalloc_track_caller+0x2c4/0x760 [ 571.307564] ? vfs_set_fs_source+0x67/0x180 [ 571.311927] kmemdup_nul+0x31/0xa0 [ 571.315502] vfs_set_fs_source+0x67/0x180 [ 571.319679] do_mount+0x61b/0x1fb0 [ 571.323248] ? check_same_owner+0x340/0x340 [ 571.327599] ? lock_release+0xa30/0xa30 [ 571.331639] ? copy_mount_string+0x40/0x40 [ 571.335897] ? kasan_kmalloc+0xc4/0xe0 [ 571.339818] ? kmem_cache_alloc_trace+0x318/0x780 [ 571.344713] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 10:04:30 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) r1 = getgid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000840)) setgroups(0x1, &(0x7f0000000000)=[r1]) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/mixer\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000008c0), &(0x7f0000000900)=0x4) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000980)=0x2fb6, &(0x7f00000009c0)=0x2) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f00000001c0)) write$FUSE_GETXATTR(r2, &(0x7f0000000940)={0x18, 0x0, 0x3, {0x6}}, 0x18) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000007c0), &(0x7f0000000800)=0xb) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x4, 0x570, [0x20000240, 0x0, 0x0, 0x20000270, 0x20000380], 0x0, &(0x7f0000000080), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0xf, 0x1, 0x22eb, 'veth0_to_bridge\x00', 'bond_slave_1\x00', 'ip6_vti0\x00', 'bcsf0\x00', @empty, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@empty, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x1, 0x0, 'lo\x00', 'syzkaller1\x00', 'eql\x00', 'veth1_to_team\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x10}, [0xff, 0xff, 0xff, 0x0, 0x80be656a1c473158], @random="da48b22be9b8", [0xff, 0x0, 0xff], 0xb8, 0x100, 0x138, [@ip={'ip\x00', 0x20, {{@dev={0xac, 0x14, 0x14, 0x13}, @remote={0xac, 0x14, 0x14, 0xbb}, 0xffffff00, 0xff, 0xe000000000000000, 0x85, 0x4, 0x1, 0x4e22, 0x4e24, 0x4e24, 0x4e22}}}]}, [@common=@ERROR={'ERROR\x00', 0x20, {"39869fb23ce5a3e9336395d716919431fc024b853a1119047335e4a57c04"}}]}, @arpreply={'arpreply\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{{{0x3, 0x8, 0x1d, 'dummy0\x00', 'team_slave_0\x00', 'vcan0\x00', 'bond_slave_0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0x0, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xff, 0xff, 0x0, 0xff, 0xff], 0x108, 0x140, 0x178, [@physdev={'physdev\x00', 0x70, {{'bond_slave_0\x00', {0xff}, 'sit0\x00', {0xff}, 0x0, 0x1a}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x20}}}}}, {{{0x9, 0x20, 0xdafb, 'veth0_to_team\x00', 'veth1_to_bridge\x00', 'ip6_vti0\x00', 'rose0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xa}, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], @empty, [0xff, 0x0, 0xff], 0xb0, 0xe8, 0x120, [@time={'time\x00', 0x18, {{0x0, 0x0, 0x3c6d, 0xdbb9, 0x5, 0x1ff, 0x1}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0x10, {{@empty, 0xffffffffffffffff}}}}]}]}, 0x5e8) [ 571.350337] ? _copy_from_user+0xdf/0x150 [ 571.354554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 571.360119] ? copy_mount_options+0x285/0x380 [ 571.364670] ksys_mount+0x12d/0x140 [ 571.368334] __x64_sys_mount+0xbe/0x150 [ 571.372347] do_syscall_64+0x1b9/0x820 [ 571.376271] ? finish_task_switch+0x1d3/0x870 [ 571.380806] ? syscall_return_slowpath+0x5e0/0x5e0 [ 571.385783] ? syscall_return_slowpath+0x31d/0x5e0 [ 571.390749] ? prepare_exit_to_usermode+0x3b0/0x3b0 10:04:30 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) [ 571.392911] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 571.395783] ? prepare_exit_to_usermode+0x291/0x3b0 [ 571.395806] ? perf_trace_sys_enter+0xb10/0xb10 [ 571.395829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 571.420699] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 571.425950] RIP: 0033:0x455ab9 [ 571.429168] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 571.448900] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 571.456641] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 571.463939] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 571.471238] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 571.478537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 571.485881] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000007 [ 571.502602] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:30 executing program 6 (fault-call:2 fault-nth:8): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:30 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x10) 10:04:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8848000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:30 executing program 2: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0xffffffff) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = dup(r0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000000)=0x13, &(0x7f0000000040)=0x4) 10:04:30 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0xbc, 0x501000) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='\x00', 0xffffffffffffff9c}, 0x10) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000001c0)={@multicast1, @local, 0x0}, &(0x7f0000000200)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000002c0)=0x0) prlimit64(r4, 0x7, &(0x7f0000000300)={0x2, 0x7}, &(0x7f0000000340)) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000280)={r3, 0x1, 0x6, @random="7876f6e7998b"}, 0x10) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) 10:04:30 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) getpeername(0xffffffffffffffff, &(0x7f00000005c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, &(0x7f0000000640)=0x80) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r2 = dup2(r0, r0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000040)) 10:04:30 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x6) 10:04:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 571.658103] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 571.660414] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 571.712007] FAULT_INJECTION: forcing a failure. [ 571.712007] name failslab, interval 1, probability 0, space 0, times 0 [ 571.723369] CPU: 1 PID: 24059 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 571.731793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.741159] Call Trace: [ 571.743780] dump_stack+0x1c9/0x2b4 [ 571.747442] ? dump_stack_print_info.cold.2+0x52/0x52 [ 571.752671] should_fail.cold.4+0xa/0x11 [ 571.756763] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 571.761901] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 571.767024] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 571.772066] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 571.776847] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 571.781973] ? trace_hardirqs_on+0x10/0x10 [ 571.786320] ? perf_tp_event+0xc40/0xc40 [ 571.790404] ? lock_release+0xa30/0xa30 [ 571.794411] ? lock_acquire+0x1e4/0x540 [ 571.798418] ? fs_reclaim_acquire+0x20/0x20 [ 571.802788] ? lock_downgrade+0x8f0/0x8f0 [ 571.806974] ? check_same_owner+0x340/0x340 [ 571.811315] ? perf_trace_lock+0x920/0x920 [ 571.815572] ? rcu_note_context_switch+0x730/0x730 [ 571.820517] ? unwind_get_return_address+0x61/0xa0 [ 571.825475] __should_failslab+0x124/0x180 [ 571.829736] should_failslab+0x9/0x14 [ 571.833565] kmem_cache_alloc_trace+0x2cb/0x780 [ 571.838365] ? save_stack+0xa9/0xd0 [ 571.842030] alloc_super+0xd4/0xb10 [ 571.845673] ? ksys_mount+0x12d/0x140 [ 571.849501] ? destroy_unused_super.part.11+0x110/0x110 [ 571.854888] ? sget_fc+0x261/0x950 [ 571.858447] ? lock_downgrade+0x8f0/0x8f0 [ 571.862627] ? kasan_check_read+0x11/0x20 [ 571.866800] ? do_raw_spin_unlock+0xa7/0x2f0 [ 571.867191] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 571.871235] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 571.871258] ? kasan_check_write+0x14/0x20 [ 571.871273] ? do_raw_spin_lock+0xc1/0x200 [ 571.871296] ? ns_test_super+0x50/0x50 [ 571.871313] sget_fc+0x269/0x950 [ 571.871332] ? compare_single+0x10/0x10 [ 571.905890] ? alloc_super+0xb10/0xb10 10:04:30 executing program 3: r0 = userfaultfd(0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)="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", 0x2, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4305], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:30 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x10) 10:04:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x10, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)={{0x107, 0x9, 0x2, 0x22a, 0x168, 0xfffffffffffffffd, 0x352, 0x8}, "73de837475873032d127014fcee9236a4b0d0e3dfcb5cabf627a302cb6ce440d550151e71a93977227a43a5e79a6c17722333190e4666408010163d3f5ef6ec2e4ad0a0862dda3e5f9d4d535aee65e8ca015f96ff202f5b8038ed31e5f9ed65552a4ee830d10a56c4f7c6c74a5e5b76f447ae4f763b4ead1fcf81ecfe6ae254916c4addaaf69c7d619c17534ccf155a4ae36ed38495a75f547d0bd58959b51d07447e26e176d0797a8a77d6348464d39cb3dbdc3a72a98d3112abd1d7315c102f0fefb111b6ea52483a3b0533ab44533b1e5a44a8929a4cd4326921b5808bb4e09e92d", [[], []]}, 0x303) mknodat(r1, &(0x7f0000000040)="2e2f636f6e74726f6cff05", 0x0, 0x0) unlinkat(r1, &(0x7f0000000140)="2e2f636f6e74726f6cff0500", 0x0) 10:04:30 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) mount$9p_xen(&(0x7f00000004c0)='em1%:cgroupppp0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='9p\x00', 0x4020, &(0x7f0000000580)=ANY=[@ANYBLOB="7472616e733d5306635a4d1a6ee068f3fbda37cdb07c78656e2c616e616d653d21286b657972696e676c6f232c6166696c3d3078303030303030303030303030300400000063616368653d6673636163686500fc656275673d3078303030303030303095303030303030342c6d6d61"]) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)="9ec96f535c28b263f9ef05c454eae28d45da6e3b61a4d9b6ddaf3e428b461c37ee497fbbed2d0a6bbf612d6e8ba374d8d8fe65ab1378bb506eb8a430", 0x3c}, {&(0x7f00000000c0)="f201b6c32a00976092ab8d36f880568580b0c963efce0e57368086139b9ab5e2a6c1cedc220ee877eb0a8c1a4db289ace0df10b68d17b4d59923f8bb008db42a83c26c5ea80afe0c98ff00a2373b60fd51f4c5e729f2062d23740d4c5878dbcfe2010ffa93d027d5cd239098e03eb1f169", 0x71}, {&(0x7f00000001c0)="6bd6c40debf98842aa3f7d90633754e9ac9d09d255f4af60602d7830e565afb2af64ea75ec5ce95627ac4cb9d2189d9fee3dbcc26dd1d47f18646f739e4030924b9b6ac9e8f3", 0x46}, {&(0x7f0000000280)="7e272f9445931ac271ebc5d3ab0f2c0a2ae1c9f263b56c4e460528c395e4be9c051eb8e8ca76b6ef0ad0f0d05044f7785aa29e11d9c29a3c1ccda3087c3e67e6cdc97b24a6771358c74dc9e14894a0f741da4e3424c2e85e9df2a873d0f818b0c54ee6e31584c82ad981eafcff430302c26771f2a84f31f020e03dd383927e33ce269a12d706ddcdea249c066471a8b58713f6c67624f7c85de83de49d50f9c490ffa6d5b8329b8956b2b825eac862f5a3257560f68967ea2ca3443276c929", 0xbf}, {&(0x7f0000000340)="754898fd4edf9fcd80cdb1352c7a548705194cc79b", 0x15}], 0x5, &(0x7f0000000600)}, 0x4000040) 10:04:30 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x5) 10:04:30 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x9, 0x80440) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x8000, 0x8, 0x5, r2}, &(0x7f00000001c0)=0x10) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000100)={0x3c, @rand_addr=0x8, 0x4e23, 0x1, 'lblc\x00', 0x8, 0x7, 0x64}, 0x2c) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:30 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4003]}, 0x10) [ 571.909805] ? kasan_kmalloc+0xc4/0xe0 [ 571.913729] ? __kmalloc_track_caller+0x311/0x760 [ 571.918600] ? proc_root_lookup+0x60/0x60 [ 571.922786] vfs_get_super+0x6e/0x270 [ 571.926608] proc_get_tree+0x88/0xb0 [ 571.930340] vfs_get_tree+0x1cb/0x5c0 [ 571.934162] do_mount+0x6c1/0x1fb0 [ 571.937717] ? check_same_owner+0x340/0x340 [ 571.942055] ? lock_release+0xa30/0xa30 [ 571.947521] ? copy_mount_string+0x40/0x40 [ 571.951768] ? kasan_kmalloc+0xc4/0xe0 [ 571.955680] ? kmem_cache_alloc_trace+0x318/0x780 [ 571.960536] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 571.966087] ? _copy_from_user+0xdf/0x150 [ 571.970259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 571.975813] ? copy_mount_options+0x285/0x380 [ 571.980350] ksys_mount+0x12d/0x140 [ 571.983998] __x64_sys_mount+0xbe/0x150 [ 571.987990] do_syscall_64+0x1b9/0x820 [ 571.991890] ? finish_task_switch+0x1d3/0x870 [ 571.996404] ? syscall_return_slowpath+0x5e0/0x5e0 [ 572.001355] ? syscall_return_slowpath+0x31d/0x5e0 [ 572.006302] ? prepare_exit_to_usermode+0x3b0/0x3b0 10:04:31 executing program 6 (fault-call:2 fault-nth:9): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:31 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x10) 10:04:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:31 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f00000000c0)={0xf, 0x1f, 0x1}, 0xf) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:31 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fa]}, 0x10) 10:04:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x20000, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x9) r2 = socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x1ae) getsockopt$bt_hci(r2, 0x107, 0xb, &(0x7f0000000040)=""/25, &(0x7f0000000240)=0x262) 10:04:31 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f00000001c0)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x4000000) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffff80, 0x7}, &(0x7f00000000c0)=0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x20100, 0x0) faccessat(r2, &(0x7f0000000400)='./file0\x00', 0x2, 0x400) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=""/16, 0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r1, @in={{0x2, 0x4e23, @rand_addr=0xfff}}}, 0x84) [ 572.011332] ? prepare_exit_to_usermode+0x291/0x3b0 [ 572.016362] ? perf_trace_sys_enter+0xb10/0xb10 [ 572.021049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 572.025919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 572.031118] RIP: 0033:0x455ab9 [ 572.034314] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 572.053876] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 572.061607] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 572.068890] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 572.076175] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 572.083459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 572.090750] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000008 [ 572.188864] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 572.215532] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 572.232976] FAULT_INJECTION: forcing a failure. [ 572.232976] name failslab, interval 1, probability 0, space 0, times 0 [ 572.244412] CPU: 0 PID: 24113 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 572.252852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.262301] Call Trace: [ 572.264936] dump_stack+0x1c9/0x2b4 [ 572.268640] ? dump_stack_print_info.cold.2+0x52/0x52 [ 572.273929] should_fail.cold.4+0xa/0x11 [ 572.278071] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 572.283246] ? find_next_zero_bit+0x111/0x140 [ 572.288374] ? do_raw_spin_unlock+0xa7/0x2f0 [ 572.288645] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 572.292812] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 572.292840] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 572.292866] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 572.317855] ? find_next_bit+0x104/0x130 [ 572.322012] ? cpumask_next+0x24/0x30 [ 572.326058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 572.331641] ? pcpu_alloc+0x190/0x13a0 [ 572.335605] ? kmem_cache_alloc_trace+0x152/0x780 [ 572.340510] ? lock_acquire+0x1e4/0x540 [ 572.344531] ? fs_reclaim_acquire+0x20/0x20 [ 572.348891] ? lock_downgrade+0x8f0/0x8f0 [ 572.353089] ? check_same_owner+0x340/0x340 [ 572.357494] ? rcu_note_context_switch+0x730/0x730 [ 572.362470] ? lock_acquire+0x1e4/0x540 [ 572.366515] __should_failslab+0x124/0x180 [ 572.370575] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 572.370806] should_failslab+0x9/0x14 [ 572.384924] __kmalloc+0x2c8/0x760 [ 572.388518] ? kasan_check_write+0x14/0x20 [ 572.392820] ? __init_rwsem+0x1cc/0x2a0 [ 572.396838] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 572.401897] ? prealloc_shrinker+0x124/0x480 [ 572.406349] ? __lockdep_init_map+0x105/0x590 [ 572.410882] prealloc_shrinker+0x124/0x480 [ 572.415145] ? __init_waitqueue_head+0x9e/0x150 [ 572.419866] ? inactive_list_is_low+0x850/0x850 [ 572.424580] ? __lockdep_init_map+0x105/0x590 [ 572.429117] alloc_super+0x8dd/0xb10 [ 572.432882] ? destroy_unused_super.part.11+0x110/0x110 10:04:31 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}, 0x10) 10:04:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:31 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0]}, 0x10) 10:04:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfde1], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:31 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}, 0x10) 10:04:31 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xe) 10:04:31 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local}, &(0x7f0000000200)=0xc) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x6, 0x20000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000100)=0x1) 10:04:31 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec030000]}, 0x10) [ 572.438273] ? lock_downgrade+0x8f0/0x8f0 [ 572.442462] ? kasan_check_read+0x11/0x20 [ 572.446639] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 572.451291] ? kasan_check_write+0x14/0x20 [ 572.455559] ? do_raw_spin_lock+0xc1/0x200 [ 572.459824] ? ns_test_super+0x50/0x50 [ 572.463748] sget_fc+0x269/0x950 [ 572.467141] ? compare_single+0x10/0x10 [ 572.471169] ? alloc_super+0xb10/0xb10 [ 572.475098] ? kasan_kmalloc+0xc4/0xe0 [ 572.479048] ? __kmalloc_track_caller+0x311/0x760 [ 572.483948] ? proc_root_lookup+0x60/0x60 [ 572.488138] vfs_get_super+0x6e/0x270 [ 572.491984] proc_get_tree+0x88/0xb0 [ 572.495740] vfs_get_tree+0x1cb/0x5c0 [ 572.499572] do_mount+0x6c1/0x1fb0 [ 572.503140] ? check_same_owner+0x340/0x340 [ 572.507517] ? lock_release+0xa30/0xa30 [ 572.511527] ? copy_mount_string+0x40/0x40 [ 572.515780] ? kasan_kmalloc+0xc4/0xe0 [ 572.519701] ? kmem_cache_alloc_trace+0x318/0x780 [ 572.524565] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 572.530094] ? _copy_from_user+0xdf/0x150 [ 572.534266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 572.539798] ? copy_mount_options+0x285/0x380 [ 572.544306] ksys_mount+0x12d/0x140 [ 572.547931] __x64_sys_mount+0xbe/0x150 [ 572.551913] do_syscall_64+0x1b9/0x820 [ 572.555805] ? finish_task_switch+0x1d3/0x870 [ 572.560487] ? syscall_return_slowpath+0x5e0/0x5e0 [ 572.565431] ? syscall_return_slowpath+0x31d/0x5e0 [ 572.570370] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 572.575394] ? prepare_exit_to_usermode+0x291/0x3b0 [ 572.580424] ? perf_trace_sys_enter+0xb10/0xb10 [ 572.585097] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 572.589957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 572.595167] RIP: 0033:0x455ab9 [ 572.598359] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 572.617722] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 572.625442] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 572.632712] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 572.640004] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 572.647281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 572.654552] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000009 10:04:31 executing program 6 (fault-call:2 fault-nth:10): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:31 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) 10:04:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:31 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x10) 10:04:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:31 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff) 10:04:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f0000000100)=""/195}, 0x48) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003cc0)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000003dc0)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000003e00)={r1, 0x6, 0x9, 0xc1, 0x7fffffff, 0x4602, 0x7}) 10:04:31 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0xc075, 0x11bc01) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)=0xffffffffffffffff) r1 = socket$inet(0x2, 0x5, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vcs\x00', 0x141, 0x0) accept(r1, &(0x7f00000002c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x80) sendmsg$kcm(r2, &(0x7f0000000900)={&(0x7f00000003c0)=@ll={0x11, 0xf7, r3, 0x1, 0x10001, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000600)=[{&(0x7f00000004c0)="ff4425345de31df18db1e2afa6b7f7b4e4b5e4d0f8266d726d477b93d47489e634d3cc2f7b55df16cc79a91c5b4714e44aa946d51fa9dc6258b49b08a629fc7880aa62ac213aa8ec3e2aa1d678ae9bd251978ff9a47ea2f46bb11e93d5806320c0535f6d11dc013183a738a879244b0e0e4e9bb4246a81dbd6fb56aa49bbc9eb9a14f30ead494bdb3067c7526506790c5653cd60dddb52719fe422d4fc70197cff37886747462e25e09f21e532e3d4e3d32a5c7d88e4c6a2789d393042ec19cdb80dc6f6924aa7da93cf1d7e664cebe4d6aae0083cbfd539ebaf4c62dd79156165d70ca63d6d1e4c5e21e5f50b", 0xed}, {&(0x7f00000005c0)="93ed03a337b2511bcf2f20470a430eab2bc419", 0x13}], 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x2b0, 0x41}, 0x20000800) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) clock_nanosleep(0x0, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000200)) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x0) 10:04:31 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xffffffff, 0x10000) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f00000000c0)={{0x0, 0x7fff}, {0x81, 0x812}, 0x8001, 0x5, 0x4}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 572.754535] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 572.778112] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:31 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc]}, 0x10) [ 572.830832] FAULT_INJECTION: forcing a failure. [ 572.830832] name failslab, interval 1, probability 0, space 0, times 0 [ 572.842154] CPU: 1 PID: 24164 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 572.850583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 10:04:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe1fd000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:31 executing program 2: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='cgroup\x00') setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r2 = timerfd_create(0x0, 0x0) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000980)=""/230, 0xe6}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x4000000000000002) r6 = dup3(r5, r3, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x5) ioctl$TCXONC(r6, 0x540a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00}, 0x25) ioctl$TCXONC(r5, 0x540a, 0x1) 10:04:31 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xf0ffffff) [ 572.850591] Call Trace: [ 572.850616] dump_stack+0x1c9/0x2b4 [ 572.850640] ? dump_stack_print_info.cold.2+0x52/0x52 10:04:31 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = memfd_create(&(0x7f0000000040)='eth1\x00', 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="62fc660b7a1de644684ae2bfb645ddab075c96a7a8fdb16ac8bb83e1f224605deb5c6fd6481e3d9cb54ab66dc205c047056394ee37dec58cd1d48cd4a02c63538a09f81ccc665b40a29822c99a4669e068e384b6244aa131f54feba190866a2ac92e58b681a6473e25de7012af26545539c21c48b12646c301d74e3aac96186ce4028b60801002837f5e424378492a794d8e2a6b2c86e19964c4abc81aedc5da990e775b02e3fb1222d3806606dabc9786607e334a5a84a89ee2d46bf2846ec648f63d3d79145e858cb0591e52949dcf0dac4b6489bcc2788ea65f20c74fbda454dc99a4a6d4f19bd3271a9a3c887de18d70df0447e6c7e363", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000180)=0x14) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e24, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x5}}}, 0x84) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2800], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 572.850684] should_fail.cold.4+0xa/0x11 10:04:31 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x10) [ 572.850710] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 572.850728] ? find_next_zero_bit+0x111/0x140 [ 572.850750] ? do_raw_spin_unlock+0xa7/0x2f0 [ 572.850766] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 572.850801] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 572.850822] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 572.850839] ? find_next_bit+0x104/0x130 [ 572.850863] ? cpumask_next+0x24/0x30 [ 572.850878] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 572.850896] ? pcpu_alloc+0x190/0x13a0 10:04:31 executing program 6 (fault-call:2 fault-nth:11): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 572.850913] ? kmem_cache_alloc_trace+0x152/0x780 [ 572.850939] ? lock_acquire+0x1e4/0x540 [ 572.850955] ? fs_reclaim_acquire+0x20/0x20 [ 572.850973] ? lock_downgrade+0x8f0/0x8f0 [ 572.851002] ? check_same_owner+0x340/0x340 [ 572.851022] ? rcu_note_context_switch+0x730/0x730 [ 572.851036] ? lock_acquire+0x1e4/0x540 [ 572.851060] __should_failslab+0x124/0x180 [ 572.851080] should_failslab+0x9/0x14 [ 572.851097] __kmalloc+0x2c8/0x760 [ 572.851113] ? kasan_check_write+0x14/0x20 [ 572.851129] ? __init_rwsem+0x1cc/0x2a0 [ 572.851147] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 572.851163] ? prealloc_shrinker+0x124/0x480 [ 572.851179] ? __lockdep_init_map+0x105/0x590 [ 572.851200] prealloc_shrinker+0x124/0x480 [ 572.851215] ? __init_waitqueue_head+0x9e/0x150 [ 572.851232] ? inactive_list_is_low+0x850/0x850 [ 572.851253] ? __lockdep_init_map+0x105/0x590 [ 572.851277] alloc_super+0x8dd/0xb10 [ 572.851302] ? destroy_unused_super.part.11+0x110/0x110 [ 572.851321] ? lock_downgrade+0x8f0/0x8f0 [ 572.851348] ? kasan_check_read+0x11/0x20 10:04:32 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, 0x10) 10:04:32 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 572.851366] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 572.851387] ? kasan_check_write+0x14/0x20 [ 572.851401] ? do_raw_spin_lock+0xc1/0x200 [ 572.851423] ? ns_test_super+0x50/0x50 [ 572.851441] sget_fc+0x269/0x950 [ 572.851456] ? compare_single+0x10/0x10 [ 572.851475] ? alloc_super+0xb10/0xb10 [ 572.851492] ? kasan_kmalloc+0xc4/0xe0 [ 572.851516] ? __kmalloc_track_caller+0x311/0x760 [ 572.851538] ? proc_root_lookup+0x60/0x60 [ 572.851557] vfs_get_super+0x6e/0x270 [ 572.851579] proc_get_tree+0x88/0xb0 [ 572.851598] vfs_get_tree+0x1cb/0x5c0 10:04:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf401], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:32 executing program 3: r0 = userfaultfd(0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x6300, 0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f00000000c0)) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 572.851622] do_mount+0x6c1/0x1fb0 [ 572.851637] ? check_same_owner+0x340/0x340 [ 572.851653] ? lock_release+0xa30/0xa30 [ 572.851686] ? copy_mount_string+0x40/0x40 [ 572.851704] ? kasan_kmalloc+0xc4/0xe0 [ 572.851733] ? kmem_cache_alloc_trace+0x318/0x780 [ 572.851759] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 572.851776] ? _copy_from_user+0xdf/0x150 [ 572.851800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 572.851817] ? copy_mount_options+0x285/0x380 [ 572.851841] ksys_mount+0x12d/0x140 [ 572.851863] __x64_sys_mount+0xbe/0x150 [ 572.851886] do_syscall_64+0x1b9/0x820 [ 572.851900] ? finish_task_switch+0x1d3/0x870 [ 572.851919] ? syscall_return_slowpath+0x5e0/0x5e0 [ 572.851938] ? syscall_return_slowpath+0x31d/0x5e0 [ 572.851957] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 572.851976] ? prepare_exit_to_usermode+0x291/0x3b0 [ 572.851995] ? perf_trace_sys_enter+0xb10/0xb10 [ 572.852014] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 572.852043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 572.852057] RIP: 0033:0x455ab9 [ 572.852063] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 572.852447] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 572.852467] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 572.852477] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 572.852487] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 10:04:32 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x709c982c00000000]}, 0x10) [ 572.852497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 572.852507] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000a [ 572.962215] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 573.016657] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 573.128999] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 573.256724] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:32 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) r1 = dup2(r0, r0) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x400000, 0x22) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x101000) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000200)={0xce18fba0f4adfd1e, 0x10a000}) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000280)={0x3, 0x101}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x6, 0x1}], 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:32 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xb) 10:04:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf5ffffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:32 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x13}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 573.431584] FAULT_INJECTION: forcing a failure. [ 573.431584] name failslab, interval 1, probability 0, space 0, times 0 [ 573.442931] CPU: 1 PID: 24204 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 573.451344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.460712] Call Trace: [ 573.463322] dump_stack+0x1c9/0x2b4 [ 573.466976] ? dump_stack_print_info.cold.2+0x52/0x52 [ 573.472200] should_fail.cold.4+0xa/0x11 [ 573.476289] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 573.481404] ? is_bpf_text_address+0xd7/0x170 [ 573.485921] ? kernel_text_address+0x79/0xf0 [ 573.490353] ? __kernel_text_address+0xd/0x40 [ 573.494867] ? unwind_get_return_address+0x61/0xa0 [ 573.499813] ? __save_stack_trace+0x8d/0xf0 [ 573.504175] ? save_stack+0xa9/0xd0 [ 573.507828] ? lock_acquire+0x1e4/0x540 [ 573.511822] ? fs_reclaim_acquire+0x20/0x20 [ 573.516166] ? lock_downgrade+0x8f0/0x8f0 [ 573.520344] ? check_same_owner+0x340/0x340 [ 573.524690] ? rcu_note_context_switch+0x730/0x730 [ 573.529651] __should_failslab+0x124/0x180 [ 573.533908] should_failslab+0x9/0x14 [ 573.537725] kmem_cache_alloc_trace+0x2cb/0x780 [ 573.542408] ? kasan_kmalloc+0xc4/0xe0 [ 573.546331] __memcg_init_list_lru_node+0x185/0x2d0 [ 573.551364] ? kvfree_rcu+0x20/0x20 [ 573.555014] ? __kmalloc_node+0x47/0x70 [ 573.559016] __list_lru_init+0x4d6/0x840 [ 573.563103] ? list_lru_destroy+0x500/0x500 [ 573.567452] ? prealloc_shrinker+0x213/0x480 [ 573.571874] ? __init_waitqueue_head+0x9e/0x150 [ 573.576564] ? inactive_list_is_low+0x850/0x850 [ 573.581269] ? __lockdep_init_map+0x105/0x590 [ 573.585796] alloc_super+0x976/0xb10 [ 573.589539] ? destroy_unused_super.part.11+0x110/0x110 [ 573.592071] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 573.594912] ? lock_downgrade+0x8f0/0x8f0 [ 573.594947] ? kasan_check_read+0x11/0x20 [ 573.613547] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 573.618147] ? kasan_check_write+0x14/0x20 [ 573.622396] ? do_raw_spin_lock+0xc1/0x200 [ 573.626652] ? ns_test_super+0x50/0x50 [ 573.630553] sget_fc+0x269/0x950 [ 573.633934] ? compare_single+0x10/0x10 [ 573.637930] ? alloc_super+0xb10/0xb10 [ 573.641830] ? kasan_kmalloc+0xc4/0xe0 [ 573.645736] ? __kmalloc_track_caller+0x311/0x760 [ 573.650610] ? proc_root_lookup+0x60/0x60 [ 573.654765] vfs_get_super+0x6e/0x270 [ 573.658560] proc_get_tree+0x88/0xb0 [ 573.662268] vfs_get_tree+0x1cb/0x5c0 [ 573.666072] do_mount+0x6c1/0x1fb0 [ 573.669619] ? check_same_owner+0x340/0x340 [ 573.673947] ? lock_release+0xa30/0xa30 [ 573.677921] ? copy_mount_string+0x40/0x40 [ 573.682148] ? retint_kernel+0x10/0x10 [ 573.686054] ? copy_mount_options+0x213/0x380 [ 573.690555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 573.696079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 573.701608] ? copy_mount_options+0x285/0x380 [ 573.706094] ksys_mount+0x12d/0x140 [ 573.709710] __x64_sys_mount+0xbe/0x150 [ 573.713678] do_syscall_64+0x1b9/0x820 [ 573.717551] ? finish_task_switch+0x1d3/0x870 [ 573.722065] ? syscall_return_slowpath+0x5e0/0x5e0 [ 573.726993] ? syscall_return_slowpath+0x31d/0x5e0 [ 573.731916] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 573.736918] ? prepare_exit_to_usermode+0x291/0x3b0 [ 573.741922] ? perf_trace_sys_enter+0xb10/0xb10 [ 573.746581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 573.751426] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 573.756607] RIP: 0033:0x455ab9 [ 573.759779] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 573.779125] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 573.786836] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 573.794100] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 573.801366] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 573.808637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 573.815900] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000b 10:04:32 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000180)=0x1e) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:32 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b0000]}, 0x10) 10:04:32 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) chdir(&(0x7f00000000c0)='./file0\x00') ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x6}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 10:04:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x68], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:32 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x8, 0x20000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@local, @in6=@remote}}, {{@in=@dev}}}, &(0x7f00000003c0)=0xfffffe50) r1 = socket$inet(0x2, 0x5, 0x0) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000400)={'ipddp0\x00', 0x3}) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @dev, @multicast1}, &(0x7f0000000100)=0xc) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f00000001c0)={@local={0xac, 0x14, 0x14, 0xaa}, @empty, r2}, 0xc) 10:04:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88caffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:32 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x8cffffff00000000) 10:04:32 executing program 6 (fault-call:2 fault-nth:12): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) [ 574.136777] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 574.144813] FAULT_INJECTION: forcing a failure. [ 574.144813] name failslab, interval 1, probability 0, space 0, times 0 [ 574.149531] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 574.158440] CPU: 0 PID: 24255 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 574.177135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.186491] Call Trace: [ 574.189097] dump_stack+0x1c9/0x2b4 [ 574.192745] ? dump_stack_print_info.cold.2+0x52/0x52 [ 574.197966] should_fail.cold.4+0xa/0x11 [ 574.202057] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 574.207172] ? is_bpf_text_address+0xd7/0x170 [ 574.211685] ? kernel_text_address+0x79/0xf0 [ 574.216113] ? __kernel_text_address+0xd/0x40 [ 574.220798] ? unwind_get_return_address+0x61/0xa0 [ 574.225742] ? __save_stack_trace+0x8d/0xf0 [ 574.230127] ? save_stack+0xa9/0xd0 [ 574.233781] ? lock_acquire+0x1e4/0x540 [ 574.237772] ? fs_reclaim_acquire+0x20/0x20 [ 574.242115] ? lock_downgrade+0x8f0/0x8f0 [ 574.246287] ? check_same_owner+0x340/0x340 [ 574.250621] ? rcu_note_context_switch+0x730/0x730 [ 574.255567] __should_failslab+0x124/0x180 [ 574.259822] should_failslab+0x9/0x14 [ 574.260408] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 574.263639] kmem_cache_alloc_trace+0x2cb/0x780 [ 574.263654] ? kasan_kmalloc+0xc4/0xe0 [ 574.263687] __memcg_init_list_lru_node+0x185/0x2d0 10:04:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88caffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:33 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) socket(0x4, 0x6, 0x7) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:33 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x2000000000000000) 10:04:33 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x10) [ 574.263707] ? kvfree_rcu+0x20/0x20 [ 574.276393] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 574.278694] ? __kmalloc_node+0x47/0x70 [ 574.278723] __list_lru_init+0x4d6/0x840 [ 574.278747] ? list_lru_destroy+0x500/0x500 [ 574.278773] ? prealloc_shrinker+0x213/0x480 [ 574.318287] ? __init_waitqueue_head+0x9e/0x150 [ 574.322972] ? inactive_list_is_low+0x850/0x850 [ 574.327663] ? __lockdep_init_map+0x105/0x590 [ 574.332346] alloc_super+0x976/0xb10 [ 574.336088] ? destroy_unused_super.part.11+0x110/0x110 [ 574.341475] ? lock_downgrade+0x8f0/0x8f0 [ 574.345650] ? kasan_check_read+0x11/0x20 [ 574.349894] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 574.354500] ? kasan_check_write+0x14/0x20 [ 574.358750] ? do_raw_spin_lock+0xc1/0x200 [ 574.363006] ? ns_test_super+0x50/0x50 [ 574.366914] sget_fc+0x269/0x950 [ 574.370296] ? compare_single+0x10/0x10 [ 574.374295] ? alloc_super+0xb10/0xb10 [ 574.378194] ? kasan_kmalloc+0xc4/0xe0 [ 574.382164] ? __kmalloc_track_caller+0x311/0x760 10:04:33 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x10) 10:04:33 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x9000000) [ 574.387023] ? proc_root_lookup+0x60/0x60 [ 574.391195] vfs_get_super+0x6e/0x270 [ 574.395007] proc_get_tree+0x88/0xb0 [ 574.398734] vfs_get_tree+0x1cb/0x5c0 [ 574.402549] do_mount+0x6c1/0x1fb0 [ 574.406099] ? check_same_owner+0x340/0x340 [ 574.410424] ? lock_release+0xa30/0xa30 [ 574.414407] ? copy_mount_string+0x40/0x40 [ 574.418651] ? kasan_kmalloc+0xc4/0xe0 [ 574.422559] ? kmem_cache_alloc_trace+0x318/0x780 [ 574.427425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 574.432976] ? _copy_from_user+0xdf/0x150 10:04:33 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x10) [ 574.437143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 574.442695] ? copy_mount_options+0x285/0x380 [ 574.447212] ksys_mount+0x12d/0x140 [ 574.450855] __x64_sys_mount+0xbe/0x150 [ 574.454849] do_syscall_64+0x1b9/0x820 [ 574.458750] ? finish_task_switch+0x1d3/0x870 [ 574.463263] ? syscall_return_slowpath+0x5e0/0x5e0 [ 574.468205] ? syscall_return_slowpath+0x31d/0x5e0 [ 574.473147] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 574.478179] ? prepare_exit_to_usermode+0x291/0x3b0 [ 574.483231] ? perf_trace_sys_enter+0xb10/0xb10 [ 574.487907] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 574.492779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 574.497976] RIP: 0033:0x455ab9 [ 574.501171] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 574.520754] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 574.528487] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 574.535769] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 574.543057] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 574.550337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 574.557617] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000c 10:04:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000180)=0x1e) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:33 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xf000000) 10:04:33 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) acct(&(0x7f00000000c0)='./file0\x00') sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:33 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x10) 10:04:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4800000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:33 executing program 6 (fault-call:2 fault-nth:13): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:33 executing program 3: r0 = userfaultfd(0x0) r1 = socket(0xa, 0x1, 0x1) connect$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) r2 = add_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$read(0xb, r2, &(0x7f0000000140)=""/147, 0x93) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 575.102873] FAULT_INJECTION: forcing a failure. [ 575.102873] name failslab, interval 1, probability 0, space 0, times 0 [ 575.104599] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 575.114273] CPU: 0 PID: 24334 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 575.132887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.142250] Call Trace: [ 575.144857] dump_stack+0x1c9/0x2b4 10:04:34 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104]}, 0x10) 10:04:34 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xc) [ 575.148511] ? dump_stack_print_info.cold.2+0x52/0x52 [ 575.151564] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 575.153717] ? trace_hardirqs_on+0xd/0x10 [ 575.153745] should_fail.cold.4+0xa/0x11 [ 575.172239] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 575.177362] ? lock_repin_lock+0x430/0x430 [ 575.181624] ? __schedule+0x884/0x1ea0 [ 575.185524] ? do_mount+0x6c1/0x1fb0 [ 575.189248] ? ksys_mount+0x12d/0x140 [ 575.193065] ? __sched_text_start+0x8/0x8 [ 575.197238] ? lock_acquire+0x1e4/0x540 [ 575.201222] ? fs_reclaim_acquire+0x20/0x20 [ 575.205559] ? lock_downgrade+0x8f0/0x8f0 [ 575.209730] ? check_same_owner+0x340/0x340 [ 575.214084] __should_failslab+0x124/0x180 [ 575.218338] should_failslab+0x9/0x14 [ 575.222185] kmem_cache_alloc_trace+0x2cb/0x780 [ 575.226863] ? kasan_kmalloc+0xc4/0xe0 [ 575.230781] __memcg_init_list_lru_node+0x185/0x2d0 [ 575.235815] ? kvfree_rcu+0x20/0x20 [ 575.239457] ? __kmalloc_node+0x47/0x70 [ 575.243457] __list_lru_init+0x4d6/0x840 [ 575.247537] ? list_lru_destroy+0x500/0x500 10:04:34 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x1000000000000000) 10:04:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4c000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 575.251879] ? prealloc_shrinker+0x213/0x480 [ 575.256296] ? __init_waitqueue_head+0x9e/0x150 [ 575.260987] ? inactive_list_is_low+0x850/0x850 [ 575.265679] ? __lockdep_init_map+0x105/0x590 [ 575.270200] alloc_super+0x976/0xb10 [ 575.273937] ? destroy_unused_super.part.11+0x110/0x110 [ 575.279326] ? lock_downgrade+0x8f0/0x8f0 [ 575.283493] ? kasan_check_read+0x11/0x20 [ 575.287655] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 575.292261] ? kasan_check_write+0x14/0x20 [ 575.296510] ? do_raw_spin_lock+0xc1/0x200 10:04:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8100000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:34 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x10) [ 575.300765] ? ns_test_super+0x50/0x50 [ 575.304668] sget_fc+0x269/0x950 [ 575.308048] ? compare_single+0x10/0x10 [ 575.312039] ? alloc_super+0xb10/0xb10 [ 575.315936] ? kasan_kmalloc+0xc4/0xe0 [ 575.319854] ? __kmalloc_track_caller+0x311/0x760 [ 575.324726] ? proc_root_lookup+0x60/0x60 [ 575.328889] vfs_get_super+0x6e/0x270 [ 575.332709] proc_get_tree+0x88/0xb0 [ 575.336441] vfs_get_tree+0x1cb/0x5c0 [ 575.338440] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 575.340258] do_mount+0x6c1/0x1fb0 [ 575.340277] ? check_same_owner+0x340/0x340 [ 575.340298] ? lock_release+0xa30/0xa30 [ 575.361523] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 575.362431] ? copy_mount_string+0x40/0x40 [ 575.362449] ? kasan_kmalloc+0xc4/0xe0 [ 575.362473] ? kmem_cache_alloc_trace+0x318/0x780 [ 575.362497] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 575.391259] ? _copy_from_user+0xdf/0x150 [ 575.395428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 10:04:34 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb8]}, 0x10) 10:04:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6c000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 575.400984] ? copy_mount_options+0x285/0x380 [ 575.405501] ksys_mount+0x12d/0x140 [ 575.409147] __x64_sys_mount+0xbe/0x150 [ 575.413141] do_syscall_64+0x1b9/0x820 [ 575.417041] ? finish_task_switch+0x1d3/0x870 [ 575.421553] ? syscall_return_slowpath+0x5e0/0x5e0 [ 575.426496] ? syscall_return_slowpath+0x31d/0x5e0 [ 575.431440] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 575.436468] ? prepare_exit_to_usermode+0x291/0x3b0 [ 575.441503] ? perf_trace_sys_enter+0xb10/0xb10 [ 575.446186] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 575.451060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 575.454052] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 575.456253] RIP: 0033:0x455ab9 [ 575.456259] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 575.489292] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 575.497018] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 575.504302] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 575.511584] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 575.518863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 575.526137] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000d 10:04:34 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000180)=0x1e) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6c00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:34 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401000000000000]}, 0x10) 10:04:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000008, 0x7f94) open_by_handle_at(r0, &(0x7f00000000c0)={0x9b, 0x182, "4afeafa565b4faed03a809b49d84c0cfd7e931013b41ba103c186e41f5c83d83c6cf9b7c93eeea994abe76157cfa527bae7e40e04be82fe0db00003739bc2e5f6ba027b802049f85f2759e8e6c7b797d63b9ecd64a0ee8004ca99d8a4575af7cbefdaf512c73d9732ac4dee34c4e456df34b28b7998d56fa6dccc281f1efec55e5fdf75c9efae418bee7f6d4338993867b16dd"}, 0x4000) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc0ffffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:34 executing program 6 (fault-call:2 fault-nth:14): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:34 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x200000000000000) 10:04:34 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$eventfd(r1, &(0x7f00000000c0)=0x2, 0x8) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x4e21, @rand_addr=0x800}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x84) [ 576.084831] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 576.087110] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 576.109281] FAULT_INJECTION: forcing a failure. [ 576.109281] name failslab, interval 1, probability 0, space 0, times 0 [ 576.120633] CPU: 0 PID: 24396 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 10:04:35 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x10) 10:04:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffa888], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 576.129069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.138470] Call Trace: [ 576.141106] dump_stack+0x1c9/0x2b4 [ 576.144788] ? dump_stack_print_info.cold.2+0x52/0x52 [ 576.150071] should_fail.cold.4+0xa/0x11 [ 576.154195] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 576.159348] ? is_bpf_text_address+0xd7/0x170 [ 576.163881] ? kernel_text_address+0x79/0xf0 [ 576.168358] ? __kernel_text_address+0xd/0x40 [ 576.172907] ? unwind_get_return_address+0x61/0xa0 [ 576.177882] ? __save_stack_trace+0x8d/0xf0 10:04:35 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}, 0x10) [ 576.182303] ? save_stack+0xa9/0xd0 [ 576.186335] ? lock_acquire+0x1e4/0x540 [ 576.190352] ? fs_reclaim_acquire+0x20/0x20 [ 576.190949] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 576.194726] ? lock_downgrade+0x8f0/0x8f0 [ 576.194774] ? check_same_owner+0x340/0x340 [ 576.213613] ? rcu_note_context_switch+0x730/0x730 [ 576.218583] __should_failslab+0x124/0x180 [ 576.222879] should_failslab+0x9/0x14 [ 576.226732] kmem_cache_alloc_trace+0x2cb/0x780 [ 576.231436] ? kasan_kmalloc+0xc4/0xe0 [ 576.235345] __memcg_init_list_lru_node+0x185/0x2d0 [ 576.240374] ? kvfree_rcu+0x20/0x20 [ 576.244023] ? __kmalloc_node+0x47/0x70 [ 576.247997] __list_lru_init+0x4d6/0x840 [ 576.252080] ? list_lru_destroy+0x500/0x500 [ 576.256420] ? prealloc_shrinker+0x213/0x480 [ 576.260830] ? __init_waitqueue_head+0x9e/0x150 [ 576.265507] ? inactive_list_is_low+0x850/0x850 [ 576.270174] ? __lockdep_init_map+0x105/0x590 [ 576.274675] alloc_super+0x976/0xb10 [ 576.278395] ? destroy_unused_super.part.11+0x110/0x110 [ 576.283763] ? lock_downgrade+0x8f0/0x8f0 [ 576.287924] ? kasan_check_read+0x11/0x20 [ 576.292083] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 576.296682] ? kasan_check_write+0x14/0x20 [ 576.301059] ? do_raw_spin_lock+0xc1/0x200 [ 576.305310] ? ns_test_super+0x50/0x50 [ 576.309196] sget_fc+0x269/0x950 [ 576.312684] ? compare_single+0x10/0x10 [ 576.316659] ? alloc_super+0xb10/0xb10 [ 576.320548] ? kasan_kmalloc+0xc4/0xe0 [ 576.324437] ? __kmalloc_track_caller+0x311/0x760 [ 576.329299] ? proc_root_lookup+0x60/0x60 [ 576.333444] vfs_get_super+0x6e/0x270 [ 576.337243] proc_get_tree+0x88/0xb0 [ 576.340966] vfs_get_tree+0x1cb/0x5c0 [ 576.344766] do_mount+0x6c1/0x1fb0 [ 576.348326] ? kasan_check_write+0x14/0x20 [ 576.352573] ? copy_mount_string+0x40/0x40 [ 576.356818] ? kasan_kmalloc+0xc4/0xe0 [ 576.360715] ? kmem_cache_alloc_trace+0x318/0x780 [ 576.365561] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 576.371111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 576.376645] ? copy_mount_options+0x285/0x380 [ 576.381157] ksys_mount+0x12d/0x140 [ 576.384790] __x64_sys_mount+0xbe/0x150 [ 576.388780] do_syscall_64+0x1b9/0x820 [ 576.392663] ? finish_task_switch+0x1d3/0x870 [ 576.397171] ? syscall_return_slowpath+0x5e0/0x5e0 [ 576.402103] ? syscall_return_slowpath+0x31d/0x5e0 [ 576.407040] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 576.412071] ? prepare_exit_to_usermode+0x291/0x3b0 [ 576.417100] ? perf_trace_sys_enter+0xb10/0xb10 [ 576.421770] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 576.426654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 576.431850] RIP: 0033:0x455ab9 [ 576.435043] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 576.454574] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 576.462306] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 576.469576] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 576.476852] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 10:04:35 executing program 3: r0 = userfaultfd(0x10000003) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x131000, 0x182) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f00000000c0)=0x8000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x1, 0x8, [0x31, 0x2, 0xb5, 0x7f, 0x100000001, 0x2, 0x8cc6, 0x401]}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000180)={r2, 0xf4, "21f184d67cd714ad874788224396d627af36c92a77be0a0896c7b47d145e54a73c43147750a01e39f26e27f36ff89bba396ba268f8af42ca4b4193f514e713cb3324f72bfe74cc6984a15661bd5b24f28ff9f28fc618b886b47f43b21b7bef75baece97792f36504754710ac9e2c3a279ced2cc2c054cb2a218c0cf1a58cb78a3090fabff32c12e1148bbca4d999613b90b2b34a412133f0e6d6873d684adbc572ff77cb4e09ffaaa5280ce2be740e3d25e28e9ceaeda7e9aa2b46de476fd8bbe8067983845b834722e88b623dc1099032a7c2595afa7b3ec3f5e689f55f0dcaa29ccc34ffae1b9ae03e867d440e8368df55a79b"}, &(0x7f0000000280)=0xfc) 10:04:35 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x102) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x602002, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000001c0)=""/120) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f00000002c0)={r2, r3+30000000}, &(0x7f0000000300)) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0xfffffffffffffec5, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88640000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xf00000000000000) [ 576.484130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 576.491393] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000e 10:04:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 576.643531] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 576.666548] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:35 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000180)=0x1e) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:35 executing program 6 (fault-call:2 fault-nth:15): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:35 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0ffffff]}, 0x10) 10:04:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xe00) 10:04:35 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) r1 = memfd_create(&(0x7f00000000c0)='/dev/amidi#\x00', 0x3) mkdirat$cgroup(r1, &(0x7f0000000100)='syz1\x00', 0x1ff) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x8000) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) openat$cgroup(r2, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4305], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7a], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 577.064803] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 577.089120] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xfffffffe) 10:04:36 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa, 0x3}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:36 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9030000]}, 0x10) [ 577.112260] FAULT_INJECTION: forcing a failure. [ 577.112260] name failslab, interval 1, probability 0, space 0, times 0 [ 577.123610] CPU: 0 PID: 24453 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 577.132033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 577.141484] Call Trace: [ 577.144106] dump_stack+0x1c9/0x2b4 [ 577.147791] ? dump_stack_print_info.cold.2+0x52/0x52 [ 577.153657] should_fail.cold.4+0xa/0x11 [ 577.157767] ? fault_create_debugfs_attr+0x1f0/0x1f0 10:04:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x543], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8848000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 577.162936] ? save_stack+0xa9/0xd0 [ 577.166614] ? save_stack+0x43/0xd0 [ 577.170287] ? kasan_kmalloc+0xc4/0xe0 [ 577.174230] ? kmem_cache_alloc_trace+0x152/0x780 [ 577.179098] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 577.184332] ? __list_lru_init+0x4d6/0x840 [ 577.188643] ? alloc_super+0x976/0xb10 [ 577.192588] ? vfs_get_super+0x6e/0x270 [ 577.196597] ? proc_get_tree+0x88/0xb0 [ 577.200550] ? vfs_get_tree+0x1cb/0x5c0 [ 577.204551] ? do_mount+0x6c1/0x1fb0 [ 577.208316] ? ksys_mount+0x12d/0x140 [ 577.208984] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 577.212180] ? __x64_sys_mount+0xbe/0x150 [ 577.212206] ? do_syscall_64+0x1b9/0x820 [ 577.212240] ? save_stack+0xa9/0xd0 [ 577.228402] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 577.230974] ? lock_acquire+0x1e4/0x540 [ 577.231000] ? fs_reclaim_acquire+0x20/0x20 [ 577.231022] ? lock_downgrade+0x8f0/0x8f0 [ 577.257487] ? check_same_owner+0x340/0x340 [ 577.261844] ? rcu_note_context_switch+0x730/0x730 [ 577.266827] __should_failslab+0x124/0x180 [ 577.271128] should_failslab+0x9/0x14 [ 577.274952] kmem_cache_alloc_trace+0x2cb/0x780 [ 577.279648] ? kasan_kmalloc+0xc4/0xe0 [ 577.283601] __memcg_init_list_lru_node+0x185/0x2d0 [ 577.288660] ? kvfree_rcu+0x20/0x20 [ 577.292320] ? __kmalloc_node+0x47/0x70 [ 577.296358] __list_lru_init+0x4d6/0x840 [ 577.300465] ? list_lru_destroy+0x500/0x500 [ 577.304831] ? prealloc_shrinker+0x213/0x480 [ 577.309288] ? __init_waitqueue_head+0x9e/0x150 [ 577.314021] ? inactive_list_is_low+0x850/0x850 [ 577.318751] ? __lockdep_init_map+0x105/0x590 [ 577.323308] alloc_super+0x976/0xb10 [ 577.327099] ? destroy_unused_super.part.11+0x110/0x110 [ 577.332507] ? lock_downgrade+0x8f0/0x8f0 [ 577.336706] ? kasan_check_read+0x11/0x20 [ 577.340886] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 577.345509] ? kasan_check_write+0x14/0x20 [ 577.349781] ? do_raw_spin_lock+0xc1/0x200 [ 577.354054] ? ns_test_super+0x50/0x50 [ 577.357988] sget_fc+0x269/0x950 [ 577.361411] ? compare_single+0x10/0x10 [ 577.365422] ? alloc_super+0xb10/0xb10 [ 577.369349] ? kasan_kmalloc+0xc4/0xe0 [ 577.373262] ? __kmalloc_track_caller+0x311/0x760 [ 577.378147] ? proc_root_lookup+0x60/0x60 [ 577.382343] vfs_get_super+0x6e/0x270 [ 577.386191] proc_get_tree+0x88/0xb0 [ 577.389946] vfs_get_tree+0x1cb/0x5c0 [ 577.393808] do_mount+0x6c1/0x1fb0 [ 577.397430] ? kasan_check_read+0x11/0x20 [ 577.401611] ? do_raw_spin_unlock+0xa7/0x2f0 [ 577.406043] ? copy_mount_string+0x40/0x40 [ 577.410282] ? kasan_kmalloc+0xc4/0xe0 [ 577.414188] ? kmem_cache_alloc_trace+0x318/0x780 [ 577.419059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 577.424598] ? copy_mount_options+0x285/0x380 [ 577.429112] ksys_mount+0x12d/0x140 [ 577.432752] __x64_sys_mount+0xbe/0x150 [ 577.436738] do_syscall_64+0x1b9/0x820 [ 577.440616] ? finish_task_switch+0x1d3/0x870 [ 577.445140] ? syscall_return_slowpath+0x5e0/0x5e0 [ 577.450081] ? syscall_return_slowpath+0x31d/0x5e0 [ 577.455011] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 577.460038] ? prepare_exit_to_usermode+0x291/0x3b0 [ 577.465073] ? perf_trace_sys_enter+0xb10/0xb10 [ 577.469772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 577.474654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 577.479847] RIP: 0033:0x455ab9 [ 577.483035] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 577.502535] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 10:04:36 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x1, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000100)=0x8, 0x2) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000600)}, 0x0) 10:04:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x806000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:36 executing program 3: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 577.510248] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 577.517528] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 577.524826] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 577.532103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 577.539385] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000f [ 577.598362] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 577.601317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:36 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000180)=0x1e) 10:04:36 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xf5ffffff00000000) 10:04:36 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x10) 10:04:36 executing program 6 (fault-call:2 fault-nth:16): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x68000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:36 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000641000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f000046e000/0x4000)=nil, 0x4000}}) r1 = add_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$search(0xa, r1, &(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x1}, r2) 10:04:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7a00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:36 executing program 5: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x20000000000000) fstatfs(r0, &(0x7f0000000140)=""/253) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000240)=0x200000, 0x4) openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) [ 578.018851] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 578.020109] FAULT_INJECTION: forcing a failure. [ 578.020109] name failslab, interval 1, probability 0, space 0, times 0 [ 578.040533] CPU: 1 PID: 24504 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 578.048947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.058658] Call Trace: [ 578.061280] dump_stack+0x1c9/0x2b4 10:04:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000070000000001000020"], 0x14}, 0x1}, 0x0) 10:04:36 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000488000/0x4000)=nil, 0x4000}, 0x2}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 578.064932] ? dump_stack_print_info.cold.2+0x52/0x52 [ 578.070154] should_fail.cold.4+0xa/0x11 [ 578.074247] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 578.079379] ? save_stack+0xa9/0xd0 [ 578.083022] ? save_stack+0x43/0xd0 [ 578.086665] ? kasan_kmalloc+0xc4/0xe0 [ 578.090569] ? kmem_cache_alloc_trace+0x152/0x780 [ 578.095430] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 578.100635] ? __list_lru_init+0x4d6/0x840 [ 578.104891] ? alloc_super+0x976/0xb10 [ 578.108821] ? vfs_get_super+0x6e/0x270 [ 578.112805] ? proc_get_tree+0x88/0xb0 10:04:37 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec03000000000000]}, 0x10) 10:04:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x80350000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 578.116703] ? vfs_get_tree+0x1cb/0x5c0 [ 578.120691] ? do_mount+0x6c1/0x1fb0 [ 578.124425] ? ksys_mount+0x12d/0x140 [ 578.128240] ? __x64_sys_mount+0xbe/0x150 [ 578.132406] ? do_syscall_64+0x1b9/0x820 [ 578.136490] ? save_stack+0xa9/0xd0 [ 578.140145] ? lock_acquire+0x1e4/0x540 [ 578.144132] ? fs_reclaim_acquire+0x20/0x20 [ 578.148473] ? lock_downgrade+0x8f0/0x8f0 [ 578.152640] ? check_same_owner+0x340/0x340 [ 578.156980] ? rcu_note_context_switch+0x730/0x730 [ 578.161931] __should_failslab+0x124/0x180 10:04:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x800000000000000) 10:04:37 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x4000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000957000)={&(0x7f0000000040)=@in6={0xa, 0x4e23}, 0x1c}, 0x8000) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) [ 578.163602] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 578.166178] should_failslab+0x9/0x14 [ 578.166198] kmem_cache_alloc_trace+0x2cb/0x780 [ 578.166212] ? kasan_kmalloc+0xc4/0xe0 [ 578.166245] __memcg_init_list_lru_node+0x185/0x2d0 [ 578.193902] ? kvfree_rcu+0x20/0x20 [ 578.197547] ? __kmalloc_node+0x47/0x70 [ 578.201553] __list_lru_init+0x4d6/0x840 [ 578.205636] ? list_lru_destroy+0x500/0x500 [ 578.209981] ? prealloc_shrinker+0x213/0x480 [ 578.214404] ? __init_waitqueue_head+0x9e/0x150 [ 578.219093] ? inactive_list_is_low+0x850/0x850 [ 578.223789] ? __lockdep_init_map+0x105/0x590 [ 578.228313] alloc_super+0x976/0xb10 [ 578.232054] ? destroy_unused_super.part.11+0x110/0x110 [ 578.237447] ? lock_downgrade+0x8f0/0x8f0 [ 578.241613] ? kasan_check_read+0x11/0x20 [ 578.245780] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 578.250376] ? kasan_check_write+0x14/0x20 [ 578.254800] ? do_raw_spin_lock+0xc1/0x200 [ 578.259058] ? ns_test_super+0x50/0x50 [ 578.262961] sget_fc+0x269/0x950 10:04:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:37 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000000)) ioctl$TCSETAF(r0, 0x5404, &(0x7f000005dfec)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x28) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r1, 0xe7a}, &(0x7f0000000180)=0xfffffffffffffdb8) ioctl$KDGKBLED(r0, 0xc0045405, &(0x7f00006d2fff)) [ 578.266340] ? compare_single+0x10/0x10 [ 578.270335] ? alloc_super+0xb10/0xb10 [ 578.274238] ? kasan_kmalloc+0xc4/0xe0 [ 578.278147] ? __kmalloc_track_caller+0x311/0x760 [ 578.283041] ? proc_root_lookup+0x60/0x60 [ 578.287204] vfs_get_super+0x6e/0x270 [ 578.291028] proc_get_tree+0x88/0xb0 [ 578.294758] vfs_get_tree+0x1cb/0x5c0 [ 578.298578] do_mount+0x6c1/0x1fb0 [ 578.302127] ? check_same_owner+0x340/0x340 [ 578.306460] ? lock_release+0xa30/0xa30 [ 578.310456] ? copy_mount_string+0x40/0x40 [ 578.314705] ? kasan_kmalloc+0xc4/0xe0 [ 578.318618] ? kmem_cache_alloc_trace+0x318/0x780 [ 578.323483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 578.329035] ? _copy_from_user+0xdf/0x150 [ 578.333204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 578.338767] ? copy_mount_options+0x285/0x380 [ 578.341998] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 578.343278] ksys_mount+0x12d/0x140 [ 578.343301] __x64_sys_mount+0xbe/0x150 [ 578.343325] do_syscall_64+0x1b9/0x820 [ 578.343346] ? finish_task_switch+0x1d3/0x870 [ 578.369618] ? syscall_return_slowpath+0x5e0/0x5e0 [ 578.374567] ? syscall_return_slowpath+0x31d/0x5e0 [ 578.379514] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 578.384550] ? prepare_exit_to_usermode+0x291/0x3b0 [ 578.389585] ? perf_trace_sys_enter+0xb10/0xb10 [ 578.394272] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 578.400187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 578.405389] RIP: 0033:0x455ab9 [ 578.408587] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 578.428315] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 578.436049] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 578.443333] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 578.450613] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 578.457897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 578.465271] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000010 [ 578.484685] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:38 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000180)=0x1e) 10:04:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x100000000000000) 10:04:38 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x3, 0x80002) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, &(0x7f0000000180)={0x6, 0x3, 0x80000001, 0x0, 0xb1, 0x7}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000b605000000000000005863"], &(0x7f0000000340)=0x1) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000100)={r1, @multicast2=0xe0000002, @broadcast=0xffffffff}, 0xc) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x0, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000000)={0x0, 0x10d000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 10:04:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x81000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:38 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) writev(r0, &(0x7f0000000380)=[{&(0x7f00000000c0)="a77d6dcfe0a456b2f2a077715f80adf8d8fd10ae54a9df1972b4347f05fea75fc50199cb209946da8222cd63e366b9f2f6a91d0dc9d598977a1a75d01a67d02c826c8b190cb38672caa4eaf35d2115ca0a5e", 0x52}, {&(0x7f0000000140)="80e087e67d1b4e7676722ac135ef634d438ffb37aca9c433f9e93ccff2cf3b163c122ba32543144086a4e225c8c1e16aead65e81df26cbf53281f623f82ae7d570e854fa643d14fba677769cd92e0b2f080deb9ebb57882b212dc1391f55b6126baee0384dfd776ee152ca282623d94741bcf3ddf3b8898ff6738a997197c3e825065cce786203dd6d74c72e6e90c4286547e18ca2e932fb41c57a4f1f1c6b90e5df9bb16ad7466224e0704689230dda13005b1f611c7146c984de8413fc4898f16cb147577e5701a2f07a6dec0410f2c2e06683f30c167010b8b1f2a1e63489b2f6218442cdfd93d5e3de844100a8c8b3f2", 0xf2}, {&(0x7f0000000240)="56ee29b2f5fdf66c17701474c338fa65b9397ca5db639b994f66e24715686bea233f24dfa81e34831c2f6aa2113875852d0bb78fd695b571cfa0ebd5f77b98a9e833c77c20dc4b7dfe1bfa1c9801410e71e43a7389d0d65adb328d16d2f27b1ebdd2e308be07a6e31689cca99225acf26ca686edb6eb71c628b03d", 0x7b}, {&(0x7f0000000040)="dc499b2e5451e1c3d9cfde415abeb6b2ecbec1aa03", 0x15}, {&(0x7f00000002c0)="7c7e881a75ccf1e6f682a885ca7fe889cf34d21e24f0128b8be2bfa13da65b29f3506d11fc29f152bca0183bd4317c5619d5b6f40198715ba6fd841a0d36d9782ffafec60530d60d60cad02c3869b8a7d2a4609664ace5b67dedc4f490fcbee2f8d011b5a5ab1793e1b1447ddb2f36f11ba5da0d2c169e621226b5d1b2751cc064b74f9dea8540f4191aeaec0630abdc26895c73975f15", 0x97}], 0x5) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:38 executing program 6 (fault-call:2 fault-nth:17): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:38 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x10) [ 579.399302] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 579.402705] FAULT_INJECTION: forcing a failure. [ 579.402705] name failslab, interval 1, probability 0, space 0, times 0 [ 579.413092] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 579.421057] CPU: 0 PID: 24571 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 579.439728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.449087] Call Trace: [ 579.451687] dump_stack+0x1c9/0x2b4 [ 579.455329] ? dump_stack_print_info.cold.2+0x52/0x52 [ 579.460544] should_fail.cold.4+0xa/0x11 [ 579.464628] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 579.469763] ? save_stack+0xa9/0xd0 [ 579.473426] ? save_stack+0x43/0xd0 [ 579.477079] ? kasan_kmalloc+0xc4/0xe0 [ 579.480991] ? kmem_cache_alloc_trace+0x152/0x780 [ 579.485860] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 579.491077] ? __list_lru_init+0x4d6/0x840 [ 579.495343] ? alloc_super+0x976/0xb10 [ 579.499263] ? vfs_get_super+0x6e/0x270 [ 579.503264] ? proc_get_tree+0x88/0xb0 [ 579.507183] ? vfs_get_tree+0x1cb/0x5c0 [ 579.511213] ? do_mount+0x6c1/0x1fb0 [ 579.514960] ? ksys_mount+0x12d/0x140 [ 579.518802] ? __x64_sys_mount+0xbe/0x150 [ 579.522968] ? do_syscall_64+0x1b9/0x820 [ 579.527078] ? save_stack+0xa9/0xd0 [ 579.530749] ? lock_acquire+0x1e4/0x540 [ 579.534734] ? fs_reclaim_acquire+0x20/0x20 [ 579.539064] ? lock_downgrade+0x8f0/0x8f0 [ 579.543239] ? check_same_owner+0x340/0x340 [ 579.548619] ? rcu_note_context_switch+0x730/0x730 [ 579.553549] __should_failslab+0x124/0x180 [ 579.557793] should_failslab+0x9/0x14 [ 579.561633] kmem_cache_alloc_trace+0x2cb/0x780 [ 579.566294] ? kasan_kmalloc+0xc4/0xe0 [ 579.570208] __memcg_init_list_lru_node+0x185/0x2d0 [ 579.575242] ? kvfree_rcu+0x20/0x20 [ 579.579219] ? __kmalloc_node+0x47/0x70 [ 579.583232] __list_lru_init+0x4d6/0x840 [ 579.587293] ? list_lru_destroy+0x500/0x500 [ 579.591642] ? prealloc_shrinker+0x213/0x480 [ 579.596079] ? __init_waitqueue_head+0x9e/0x150 [ 579.600777] ? inactive_list_is_low+0x850/0x850 [ 579.605463] ? __lockdep_init_map+0x105/0x590 [ 579.609977] alloc_super+0x976/0xb10 [ 579.613720] ? destroy_unused_super.part.11+0x110/0x110 [ 579.619084] ? lock_downgrade+0x8f0/0x8f0 [ 579.623261] ? kasan_check_read+0x11/0x20 [ 579.627408] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 579.632005] ? kasan_check_write+0x14/0x20 [ 579.636240] ? do_raw_spin_lock+0xc1/0x200 [ 579.640492] ? ns_test_super+0x50/0x50 [ 579.644397] sget_fc+0x269/0x950 [ 579.647758] ? compare_single+0x10/0x10 [ 579.651746] ? alloc_super+0xb10/0xb10 [ 579.655635] ? kasan_kmalloc+0xc4/0xe0 [ 579.659525] ? __kmalloc_track_caller+0x311/0x760 [ 579.664394] ? proc_root_lookup+0x60/0x60 [ 579.668547] vfs_get_super+0x6e/0x270 [ 579.672371] proc_get_tree+0x88/0xb0 [ 579.676107] vfs_get_tree+0x1cb/0x5c0 [ 579.679912] do_mount+0x6c1/0x1fb0 [ 579.683469] ? check_same_owner+0x340/0x340 [ 579.687789] ? lock_release+0xa30/0xa30 [ 579.691771] ? copy_mount_string+0x40/0x40 [ 579.696034] ? retint_kernel+0x10/0x10 [ 579.699942] ? copy_mount_options+0x1f0/0x380 [ 579.704440] ? copy_mount_options+0x202/0x380 [ 579.708938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 579.714468] ? copy_mount_options+0x285/0x380 [ 579.718963] ksys_mount+0x12d/0x140 [ 579.722594] __x64_sys_mount+0xbe/0x150 [ 579.726587] do_syscall_64+0x1b9/0x820 [ 579.730476] ? finish_task_switch+0x1d3/0x870 [ 579.734971] ? syscall_return_slowpath+0x5e0/0x5e0 [ 579.739910] ? syscall_return_slowpath+0x31d/0x5e0 [ 579.744838] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 579.749855] ? prepare_exit_to_usermode+0x291/0x3b0 [ 579.754892] ? perf_trace_sys_enter+0xb10/0xb10 [ 579.759560] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 579.764408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 579.769603] RIP: 0033:0x455ab9 [ 579.772799] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 579.792600] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 10:04:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xd00) 10:04:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8848], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:38 executing program 3: r0 = userfaultfd(0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3, 0x400) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000000c0)={0x7, 0x100}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x8}) 10:04:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffffffffff000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 579.800834] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 579.808108] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 579.815373] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 579.822642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 579.829905] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000011 10:04:38 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x10) [ 579.862548] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 579.877315] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8035000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xf0) 10:04:38 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) ioperm(0x3, 0xfffffffffffffffe, 0x689c) [ 579.979435] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:39 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000180)=0x1e) 10:04:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:39 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x10) 10:04:39 executing program 6 (fault-call:2 fault-nth:18): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:39 executing program 3: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'bond_slave_1\x00'}, 0x18) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200000) 10:04:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x3f000000) [ 580.423877] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 580.436919] FAULT_INJECTION: forcing a failure. [ 580.436919] name failslab, interval 1, probability 0, space 0, times 0 [ 580.448237] CPU: 1 PID: 24622 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 580.456725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.466095] Call Trace: [ 580.468714] dump_stack+0x1c9/0x2b4 [ 580.472367] ? dump_stack_print_info.cold.2+0x52/0x52 [ 580.477607] should_fail.cold.4+0xa/0x11 [ 580.481695] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 580.486824] ? save_stack+0xa9/0xd0 [ 580.490568] ? save_stack+0x43/0xd0 [ 580.494213] ? kasan_kmalloc+0xc4/0xe0 [ 580.498120] ? kmem_cache_alloc_trace+0x152/0x780 [ 580.502985] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 580.503943] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 580.508196] ? __list_lru_init+0x4d6/0x840 10:04:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x7000000) 10:04:39 executing program 5: r0 = socket(0x10000010, 0x5, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x5}}, 0x14}, 0x1}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000700)={&(0x7f0000002400)=@bridge_getneigh={0x28, 0x1e, 0x601, 0x0, 0x0, {0x7}, [@IFLA_MASTER={0x8, 0xa, 0xd}]}, 0x28}, 0x1}, 0x0) 10:04:39 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x10) 10:04:39 executing program 3: ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000506000/0x1000)=nil, 0x1000}}) userfaultfd(0x80000) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/69, 0x45) [ 580.508215] ? alloc_super+0x976/0xb10 [ 580.508233] ? vfs_get_super+0x6e/0x270 [ 580.508249] ? proc_get_tree+0x88/0xb0 [ 580.508261] ? vfs_get_tree+0x1cb/0x5c0 [ 580.508280] ? do_mount+0x6c1/0x1fb0 [ 580.542555] ? ksys_mount+0x12d/0x140 [ 580.546395] ? __x64_sys_mount+0xbe/0x150 [ 580.550563] ? do_syscall_64+0x1b9/0x820 [ 580.554652] ? save_stack+0xa9/0xd0 [ 580.558309] ? lock_acquire+0x1e4/0x540 [ 580.562306] ? fs_reclaim_acquire+0x20/0x20 [ 580.566649] ? lock_downgrade+0x8f0/0x8f0 [ 580.570830] ? check_same_owner+0x340/0x340 [ 580.575173] ? rcu_note_context_switch+0x730/0x730 [ 580.580129] __should_failslab+0x124/0x180 [ 580.584385] should_failslab+0x9/0x14 [ 580.588208] kmem_cache_alloc_trace+0x2cb/0x780 [ 580.592893] ? kasan_kmalloc+0xc4/0xe0 [ 580.596821] __memcg_init_list_lru_node+0x185/0x2d0 [ 580.601858] ? kvfree_rcu+0x20/0x20 [ 580.605508] ? __kmalloc_node+0x47/0x70 [ 580.609513] __list_lru_init+0x4d6/0x840 [ 580.613601] ? list_lru_destroy+0x500/0x500 [ 580.617974] ? prealloc_shrinker+0x213/0x480 10:04:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 580.622402] ? __init_waitqueue_head+0x9e/0x150 [ 580.627094] ? inactive_list_is_low+0x850/0x850 [ 580.631789] ? __lockdep_init_map+0x105/0x590 [ 580.636315] alloc_super+0x976/0xb10 [ 580.640168] ? destroy_unused_super.part.11+0x110/0x110 [ 580.645552] ? lock_downgrade+0x8f0/0x8f0 [ 580.649987] ? kasan_check_read+0x11/0x20 [ 580.654170] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 580.658951] ? kasan_check_write+0x14/0x20 [ 580.663289] ? do_raw_spin_lock+0xc1/0x200 [ 580.667550] ? ns_test_super+0x50/0x50 [ 580.671474] sget_fc+0x269/0x950 10:04:39 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x10) [ 580.674859] ? compare_single+0x10/0x10 [ 580.678853] ? alloc_super+0xb10/0xb10 [ 580.682755] ? kasan_kmalloc+0xc4/0xe0 [ 580.686676] ? __kmalloc_track_caller+0x311/0x760 [ 580.691542] ? proc_root_lookup+0x60/0x60 [ 580.695714] vfs_get_super+0x6e/0x270 [ 580.699633] proc_get_tree+0x88/0xb0 [ 580.703372] vfs_get_tree+0x1cb/0x5c0 [ 580.707217] do_mount+0x6c1/0x1fb0 [ 580.710779] ? check_same_owner+0x340/0x340 [ 580.715120] ? lock_release+0xa30/0xa30 [ 580.719129] ? copy_mount_string+0x40/0x40 [ 580.723380] ? kasan_kmalloc+0xc4/0xe0 [ 580.727295] ? kmem_cache_alloc_trace+0x318/0x780 [ 580.732165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 580.737727] ? _copy_from_user+0xdf/0x150 [ 580.741907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 580.747470] ? copy_mount_options+0x285/0x380 [ 580.752004] ksys_mount+0x12d/0x140 [ 580.755669] __x64_sys_mount+0xbe/0x150 [ 580.757985] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 580.759659] do_syscall_64+0x1b9/0x820 10:04:39 executing program 3: r0 = userfaultfd(0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x8) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x100000000000001}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='ip_vti0\x00', 0x10) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000340)='ifb0\x00') fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="31032bbd7000fbdbdf250b0000000800060007000000640003000800010000000000080007004e2100000800040001f000000800040022070000080001000100000008000800f900000014000600fe800000000000000000000000000020140002006966623000000000000000000000000008000800470000001c000100080001000a000000080002007f000000080009004f000000080004000700000008000400070000000800050002000000"], 0xb4}, 0x1, 0x0, 0x0, 0x10}, 0x4000) [ 580.759677] ? finish_task_switch+0x1d3/0x870 [ 580.759696] ? syscall_return_slowpath+0x5e0/0x5e0 [ 580.759717] ? syscall_return_slowpath+0x31d/0x5e0 [ 580.759735] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 580.759759] ? prepare_exit_to_usermode+0x291/0x3b0 [ 580.799441] ? perf_trace_sys_enter+0xb10/0xb10 [ 580.804142] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 580.809041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.814249] RIP: 0033:0x455ab9 [ 580.817452] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 580.837148] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 580.837185] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 580.837208] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 580.862551] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 580.869838] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 580.877129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 580.884420] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000012 10:04:40 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000035d000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:40 executing program 5: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) syncfs(r0) truncate(&(0x7f0000000000)='./bus\x00', 0x800) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 10:04:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xffffff8c) 10:04:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8906], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x400000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:40 executing program 6 (fault-call:2 fault-nth:19): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:40 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000]}, 0x10) 10:04:40 executing program 3: r0 = userfaultfd(0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80001) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000200)={0x3, 'ip_vti0\x00', 0x1}, 0x18) r2 = dup3(r0, r0, 0x80000) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000100)) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000c34000)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0xffffffffffffffff}) r3 = dup(r0) bind$vsock_stream(r3, &(0x7f00000000c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x1}) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x6, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 581.443060] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 581.455672] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 581.463824] FAULT_INJECTION: forcing a failure. [ 581.463824] name failslab, interval 1, probability 0, space 0, times 0 [ 581.477417] CPU: 0 PID: 24684 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 10:04:40 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}, 0x10) 10:04:40 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) userfaultfd(0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', '\\[nodev\x00'}, &(0x7f0000000100)=""/63, 0x3f) 10:04:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 581.485862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.495236] Call Trace: [ 581.497897] dump_stack+0x1c9/0x2b4 [ 581.501575] ? dump_stack_print_info.cold.2+0x52/0x52 [ 581.506840] should_fail.cold.4+0xa/0x11 [ 581.510958] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 581.516125] ? save_stack+0xa9/0xd0 [ 581.519789] ? save_stack+0x43/0xd0 [ 581.523442] ? kasan_kmalloc+0xc4/0xe0 [ 581.527375] ? kmem_cache_alloc_trace+0x152/0x780 [ 581.532257] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 581.537500] ? __list_lru_init+0x4d6/0x840 10:04:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x2) [ 581.542051] ? alloc_super+0x976/0xb10 [ 581.545991] ? vfs_get_super+0x6e/0x270 [ 581.549998] ? proc_get_tree+0x88/0xb0 [ 581.553976] ? vfs_get_tree+0x1cb/0x5c0 [ 581.557984] ? do_mount+0x6c1/0x1fb0 [ 581.561752] ? ksys_mount+0x12d/0x140 [ 581.565602] ? __x64_sys_mount+0xbe/0x150 [ 581.569793] ? do_syscall_64+0x1b9/0x820 [ 581.573913] ? save_stack+0xa9/0xd0 [ 581.577600] ? lock_acquire+0x1e4/0x540 [ 581.581627] ? fs_reclaim_acquire+0x20/0x20 [ 581.585985] ? lock_downgrade+0x8f0/0x8f0 10:04:40 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 581.590196] ? check_same_owner+0x340/0x340 [ 581.594567] ? rcu_note_context_switch+0x730/0x730 [ 581.595349] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 581.599555] __should_failslab+0x124/0x180 [ 581.599587] should_failslab+0x9/0x14 [ 581.599604] kmem_cache_alloc_trace+0x2cb/0x780 [ 581.599629] ? kasan_kmalloc+0xc4/0xe0 [ 581.627088] __memcg_init_list_lru_node+0x185/0x2d0 [ 581.632172] ? kvfree_rcu+0x20/0x20 [ 581.635874] ? __kmalloc_node+0x47/0x70 [ 581.639920] __list_lru_init+0x4d6/0x840 10:04:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 581.644019] ? list_lru_destroy+0x500/0x500 [ 581.648383] ? prealloc_shrinker+0x213/0x480 [ 581.652825] ? __init_waitqueue_head+0x9e/0x150 [ 581.657529] ? inactive_list_is_low+0x850/0x850 [ 581.662239] ? __lockdep_init_map+0x105/0x590 [ 581.666783] alloc_super+0x976/0xb10 [ 581.670550] ? destroy_unused_super.part.11+0x110/0x110 [ 581.675946] ? lock_downgrade+0x8f0/0x8f0 [ 581.680132] ? kasan_check_read+0x11/0x20 [ 581.684319] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 581.688929] ? kasan_check_write+0x14/0x20 [ 581.693195] ? do_raw_spin_lock+0xc1/0x200 [ 581.697483] ? ns_test_super+0x50/0x50 [ 581.701408] sget_fc+0x269/0x950 [ 581.704807] ? compare_single+0x10/0x10 [ 581.708813] ? alloc_super+0xb10/0xb10 [ 581.710997] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 581.712724] ? kasan_kmalloc+0xc4/0xe0 [ 581.712755] ? __kmalloc_track_caller+0x311/0x760 [ 581.712786] ? proc_root_lookup+0x60/0x60 [ 581.712806] vfs_get_super+0x6e/0x270 [ 581.739819] proc_get_tree+0x88/0xb0 [ 581.743574] vfs_get_tree+0x1cb/0x5c0 [ 581.747453] do_mount+0x6c1/0x1fb0 [ 581.751013] ? check_same_owner+0x340/0x340 [ 581.755369] ? lock_release+0xa30/0xa30 [ 581.759380] ? copy_mount_string+0x40/0x40 [ 581.763666] ? kasan_kmalloc+0xc4/0xe0 [ 581.767597] ? kmem_cache_alloc_trace+0x318/0x780 [ 581.767638] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 581.772489] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 581.772507] ? _copy_from_user+0xdf/0x150 [ 581.772534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 581.772555] ? copy_mount_options+0x285/0x380 [ 581.802687] ksys_mount+0x12d/0x140 [ 581.806372] __x64_sys_mount+0xbe/0x150 [ 581.810385] do_syscall_64+0x1b9/0x820 [ 581.814296] ? finish_task_switch+0x1d3/0x870 [ 581.818833] ? syscall_return_slowpath+0x5e0/0x5e0 [ 581.823810] ? syscall_return_slowpath+0x31d/0x5e0 [ 581.828791] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 581.833845] ? prepare_exit_to_usermode+0x291/0x3b0 [ 581.838916] ? perf_trace_sys_enter+0xb10/0xb10 [ 581.843637] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 581.848548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.853769] RIP: 0033:0x455ab9 [ 581.856980] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 581.876824] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 581.884608] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 10:04:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:40 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = getpgrp(0x0) sched_rr_get_interval(r1, &(0x7f0000000040)) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 581.891906] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 581.899199] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 581.906495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 581.913773] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000013 10:04:41 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:41 executing program 3: r0 = userfaultfd(0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x9, 0x2601) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000400)={0x3, 0x2}, 0x2) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000380), 0x4) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000180)="b17e59fcc904424407c55c2b9a0528df544dd8ad38fa7de0b543a1d8a1e9cf9720649677f0f1837f30238f2f6797c7dc55ad308b615beb139989a474b36809ac6c543a947c88d6f44b229fc5fc5e84c9a95b303e432acc6aa83f32bf2617f806f6be9dc17430da18576835d5bd137bd0fe8936cf734de39a04f3b8ec92127cc3b154e3746d22ea903fd7c8329f1c779c35e96ca76e2c981dc66b5783148ba9dab347b51cb26c6014186d8b5466e6422c15dc715a72219cd69e687d05dedf0c86e0e2d8014b23003d0eb5af597319227b1256cd122a7c00301878128d44", 0xdd}, {&(0x7f0000000080)="7ef371c05428025adeac1417e0ad319150c214937c205abe0a0416832c35c5fba25a29eec1ecf765e4f7ca38816fa8ebda5105c9c236a8", 0x37}, {&(0x7f00000000c0)="7c9d6c8413cf1e01919592429a5a7a31681d0b1c8bde8de3e859aece7faa7cb0e2699c516f9f6d586e", 0x29}, {&(0x7f0000000280)="8c10dd191a54e8fd787defb9b8bbea107cf745009b0aa51158bdbb97382ad71831f65063b857f854b6db82db5cff944955f8540353c388f2b6c2bab61167ae71bf23c0158085e536c22d2682bc42ad86db0f1a47f0953204ff8d947ad56dfac5b8b1e0d530de665f9c6ade84f6fa120d91d43768f6be02c76e95463267f59e38d01951", 0x83}], 0x4, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0xffffffffffffffff}) syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x8, 0x20800) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000140)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}}) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) 10:04:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x400000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:41 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340]}, 0x10) 10:04:41 executing program 6 (fault-call:2 fault-nth:20): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:41 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x600000000000000) 10:04:41 executing program 5: r0 = userfaultfd(0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x8) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x100000000000001}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='ip_vti0\x00', 0x10) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000340)='ifb0\x00') fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="31032bbd7000fbdbdf250b0000000800060007000000640003000800010000000000080007004e2100000800040001f000000800040022070000080001000100000008000800f900000014000600fe800000000000000000000000000020140002006966623000000000000000000000000008000800470000001c000100080001000a000000080002007f000000080009004f000000080004000700000008000400070000000800050002000000"], 0xb4}, 0x1, 0x0, 0x0, 0x10}, 0x4000) [ 582.565857] FAULT_INJECTION: forcing a failure. [ 582.565857] name failslab, interval 1, probability 0, space 0, times 0 [ 582.577181] CPU: 1 PID: 24744 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 582.585597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.594964] Call Trace: [ 582.597571] dump_stack+0x1c9/0x2b4 [ 582.601222] ? dump_stack_print_info.cold.2+0x52/0x52 [ 582.606457] should_fail.cold.4+0xa/0x11 [ 582.610550] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 582.615686] ? save_stack+0xa9/0xd0 [ 582.619335] ? save_stack+0x43/0xd0 [ 582.622975] ? kasan_kmalloc+0xc4/0xe0 [ 582.626892] ? kmem_cache_alloc_trace+0x152/0x780 [ 582.631751] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 582.636958] ? __list_lru_init+0x4d6/0x840 [ 582.641209] ? alloc_super+0x976/0xb10 [ 582.642072] ucma_write: process 5263 (syz-executor5) changed security contexts after opening file descriptor, this is not allowed. [ 582.645128] ? vfs_get_super+0x6e/0x270 [ 582.645147] ? proc_get_tree+0x88/0xb0 10:04:41 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)={{{@in=@rand_addr, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@ipv4}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000240)=0xe8) setresuid(r0, r1, r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000004c0)=[{}, {}], r4, 0x1, 0x1, 0x90}}, 0x20) 10:04:41 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcff000000000000]}, 0x10) [ 582.645165] ? vfs_get_tree+0x1cb/0x5c0 [ 582.645181] ? do_mount+0x6c1/0x1fb0 [ 582.645199] ? ksys_mount+0x12d/0x140 [ 582.672638] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 582.676395] ? __x64_sys_mount+0xbe/0x150 [ 582.676410] ? do_syscall_64+0x1b9/0x820 [ 582.676437] ? save_stack+0xa9/0xd0 [ 582.698566] ? lock_acquire+0x1e4/0x540 [ 582.702556] ? fs_reclaim_acquire+0x20/0x20 [ 582.706903] ? lock_downgrade+0x8f0/0x8f0 [ 582.711077] ? check_same_owner+0x340/0x340 10:04:41 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x3f00000000000000) 10:04:41 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x10) 10:04:41 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x3f}, &(0x7f0000000100)=0x8) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x9, 0x3, 0x430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, &(0x7f0000000180), {[{{@uncond, 0x0, 0xc8, 0x110}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x5, 'syz0\x00'}}}, {{@uncond, 0x0, 0x228, 0x250, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x8001, 0x436, 0x6, 0x200, 0x0, 0x3, [@mcast2={0xff, 0x2, [], 0x1}, @local={0xfe, 0x80, [], 0xaa}, @remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, @dev={0xfe, 0x80, [], 0x1a}, @mcast1={0xff, 0x1, [], 0x1}, @local={0xfe, 0x80, [], 0xaa}, @remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, @dev={0xfe, 0x80, [], 0x1f}, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, @mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}], 0x6}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x8}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x490) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x4, 0xfffffffffffffff8, 0xfff, r2}, 0x10) dup2(r0, r0) [ 582.715415] ? rcu_note_context_switch+0x730/0x730 [ 582.720362] __should_failslab+0x124/0x180 [ 582.724613] should_failslab+0x9/0x14 [ 582.728426] kmem_cache_alloc_trace+0x2cb/0x780 [ 582.733103] ? kasan_kmalloc+0xc4/0xe0 [ 582.737019] __memcg_init_list_lru_node+0x185/0x2d0 [ 582.742056] ? kvfree_rcu+0x20/0x20 [ 582.745697] ? __kmalloc_node+0x47/0x70 [ 582.749696] __list_lru_init+0x4d6/0x840 [ 582.753781] ? list_lru_destroy+0x500/0x500 [ 582.758130] ? prealloc_shrinker+0x213/0x480 [ 582.762551] ? __init_waitqueue_head+0x9e/0x150 [ 582.767236] ? inactive_list_is_low+0x850/0x850 [ 582.771927] ? __lockdep_init_map+0x105/0x590 [ 582.776452] alloc_super+0x976/0xb10 [ 582.780191] ? destroy_unused_super.part.11+0x110/0x110 [ 582.785574] ? lock_downgrade+0x8f0/0x8f0 [ 582.789753] ? kasan_check_read+0x11/0x20 [ 582.793931] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 582.798533] ? kasan_check_write+0x14/0x20 [ 582.802783] ? do_raw_spin_lock+0xc1/0x200 [ 582.807053] ? ns_test_super+0x50/0x50 [ 582.810954] sget_fc+0x269/0x950 [ 582.814333] ? compare_single+0x10/0x10 [ 582.818325] ? alloc_super+0xb10/0xb10 [ 582.822225] ? kasan_kmalloc+0xc4/0xe0 [ 582.826134] ? __kmalloc_track_caller+0x311/0x760 [ 582.830995] ? proc_root_lookup+0x60/0x60 [ 582.835157] vfs_get_super+0x6e/0x270 [ 582.836264] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 582.838969] proc_get_tree+0x88/0xb0 [ 582.838990] vfs_get_tree+0x1cb/0x5c0 [ 582.839012] do_mount+0x6c1/0x1fb0 [ 582.860374] ? check_same_owner+0x340/0x340 [ 582.864712] ? lock_release+0xa30/0xa30 [ 582.868709] ? copy_mount_string+0x40/0x40 [ 582.872956] ? kasan_kmalloc+0xc4/0xe0 [ 582.876876] ? kmem_cache_alloc_trace+0x318/0x780 [ 582.881740] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 582.887291] ? _copy_from_user+0xdf/0x150 [ 582.891461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 582.897012] ? copy_mount_options+0x285/0x380 [ 582.901527] ksys_mount+0x12d/0x140 [ 582.905173] __x64_sys_mount+0xbe/0x150 [ 582.909163] do_syscall_64+0x1b9/0x820 [ 582.913060] ? finish_task_switch+0x1d3/0x870 10:04:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e0000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 582.917570] ? syscall_return_slowpath+0x5e0/0x5e0 [ 582.922519] ? syscall_return_slowpath+0x31d/0x5e0 [ 582.927465] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 582.932500] ? prepare_exit_to_usermode+0x291/0x3b0 [ 582.938492] ? perf_trace_sys_enter+0xb10/0xb10 [ 582.943181] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 582.948050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 582.953251] RIP: 0033:0x455ab9 10:04:41 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80009, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socket$inet6(0xa, 0xa, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x3, 0x5, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2, 0x80) ftruncate(r2, 0x3) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f0000000100), &(0x7f0000000080)=0x60) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000000), &(0x7f0000001540)=""/144}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r1, &(0x7f00000002c0)="390a0d080e0b41287ad5cdd24c99fe464258c4cd2e8ab4805fb7a738d58624fe27d11c8e12741fd9d1f4afcef1b2077b93e257dfbef706208ac866f67decdfe4a973677e9fae1e6d4d296a1d5510c900c75d5ae664fa373f01ef93aa8bead6014218043f9f149c667b68a2c94be217dfbe68f7f8fb9606c39fe1891704caaad098b896192403008996bfe42b3a0c953f5541d73207b4188ac32f28bd26e12ad523c982e4de149717280b2c20ff4ad70de55c7ef3751c4297ed3fa53be0d32c8f00908d078d5a779c89502f7c630dfac92469c7"}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x9, 0x13, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0x7, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x18}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x45}, @jmp={0x5, 0x8, 0xc, 0x2, 0x5, 0xfffffffffffffffe}, @map={0x18, 0x6, 0x1, 0x0, r1}, @generic={0x6, 0x94, 0x100000001, 0x4}, @generic={0x7, 0x5, 0x7ff, 0x1}], {0x95}}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xb}, 0x48) [ 582.956443] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 582.975606] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 582.975932] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 582.975953] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 582.975968] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 583.008514] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 583.015801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 583.023103] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000014 10:04:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x74000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 583.111391] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:42 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:42 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x19, &(0x7f0000311ffc)=0x1, 0x3) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000800)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000002340)=0xefd6, 0x4) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10000, 0x5, 0x7, 0x7, 0x0, 0x100000001, 0xc00, 0x1, 0x8042, 0x3, 0x9dce, 0x100, 0x0, 0x3, 0x2136, 0x9, 0x0, 0x100000000, 0x14d, 0x7f, 0xffff, 0x401, 0x2, 0x6, 0x639, 0x7, 0x5, 0x946d, 0x1, 0x1, 0x0, 0x7fffffff, 0x6, 0x7, 0x100, 0x3013, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x3}, 0x800, 0x8000, 0x40, 0x3, 0x7, 0x48c0, 0x8000}, 0x0, 0xd, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x8) recvfrom$inet6(r1, &(0x7f0000000000)=""/110, 0x6e, 0x2004, &(0x7f0000000140)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x709000) 10:04:42 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x6000000) 10:04:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8906], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:42 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x10) 10:04:42 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x89, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000001c0)=0xe8) sendmsg$can_raw(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x1d, r2}, 0x10, &(0x7f0000000280)={&(0x7f0000000240)=@can={{0x0, 0x800000000000000, 0x7, 0x1}, 0x0, 0x1, 0x0, 0x0, "801938248eb4bdf4"}, 0x10}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000000) open(&(0x7f0000000300)='./file0\x00', 0x200000, 0x42) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f00005f2000/0x1000)=nil, 0x1000}}) 10:04:42 executing program 6 (fault-call:2 fault-nth:21): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6000000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 583.472784] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 583.497194] FAULT_INJECTION: forcing a failure. [ 583.497194] name failslab, interval 1, probability 0, space 0, times 0 [ 583.498697] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 583.508490] CPU: 0 PID: 24818 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 583.527220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.536587] Call Trace: [ 583.539189] dump_stack+0x1c9/0x2b4 [ 583.542840] ? dump_stack_print_info.cold.2+0x52/0x52 [ 583.548072] should_fail.cold.4+0xa/0x11 [ 583.552164] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 583.557306] ? save_stack+0xa9/0xd0 [ 583.560953] ? save_stack+0x43/0xd0 [ 583.564595] ? kasan_kmalloc+0xc4/0xe0 [ 583.568502] ? kmem_cache_alloc_trace+0x152/0x780 [ 583.573359] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 583.578565] ? __list_lru_init+0x4d6/0x840 [ 583.582819] ? alloc_super+0x976/0xb10 [ 583.586724] ? vfs_get_super+0x6e/0x270 [ 583.590779] ? proc_get_tree+0x88/0xb0 [ 583.594683] ? vfs_get_tree+0x1cb/0x5c0 [ 583.598674] ? do_mount+0x6c1/0x1fb0 [ 583.602407] ? ksys_mount+0x12d/0x140 [ 583.606223] ? __x64_sys_mount+0xbe/0x150 [ 583.610386] ? do_syscall_64+0x1b9/0x820 [ 583.614480] ? save_stack+0xa9/0xd0 [ 583.618129] ? lock_acquire+0x1e4/0x540 [ 583.622116] ? fs_reclaim_acquire+0x20/0x20 [ 583.626459] ? lock_downgrade+0x8f0/0x8f0 [ 583.630632] ? check_same_owner+0x340/0x340 [ 583.634975] ? rcu_note_context_switch+0x730/0x730 [ 583.639932] __should_failslab+0x124/0x180 [ 583.644188] should_failslab+0x9/0x14 [ 583.648006] kmem_cache_alloc_trace+0x2cb/0x780 [ 583.652686] ? kasan_kmalloc+0xc4/0xe0 [ 583.656608] __memcg_init_list_lru_node+0x185/0x2d0 [ 583.661645] ? kvfree_rcu+0x20/0x20 [ 583.665293] ? __kmalloc_node+0x47/0x70 [ 583.669295] __list_lru_init+0x4d6/0x840 [ 583.673377] ? list_lru_destroy+0x500/0x500 [ 583.677322] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 583.677715] ? prealloc_shrinker+0x213/0x480 [ 583.677732] ? __init_waitqueue_head+0x9e/0x150 [ 583.677751] ? inactive_list_is_low+0x850/0x850 [ 583.701823] ? __lockdep_init_map+0x105/0x590 [ 583.706344] alloc_super+0x976/0xb10 [ 583.710083] ? destroy_unused_super.part.11+0x110/0x110 [ 583.715484] ? lock_downgrade+0x8f0/0x8f0 [ 583.719658] ? kasan_check_read+0x11/0x20 [ 583.723820] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 583.728425] ? kasan_check_write+0x14/0x20 [ 583.732672] ? do_raw_spin_lock+0xc1/0x200 [ 583.736929] ? ns_test_super+0x50/0x50 [ 583.740827] sget_fc+0x269/0x950 [ 583.744212] ? compare_single+0x10/0x10 [ 583.748202] ? alloc_super+0xb10/0xb10 [ 583.752105] ? kasan_kmalloc+0xc4/0xe0 [ 583.756012] ? __kmalloc_track_caller+0x311/0x760 [ 583.760872] ? proc_root_lookup+0x60/0x60 [ 583.765035] vfs_get_super+0x6e/0x270 [ 583.766133] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 583.768848] proc_get_tree+0x88/0xb0 [ 583.768869] vfs_get_tree+0x1cb/0x5c0 [ 583.768892] do_mount+0x6c1/0x1fb0 [ 583.768913] ? check_same_owner+0x340/0x340 [ 583.794556] ? lock_release+0xa30/0xa30 [ 583.798559] ? copy_mount_string+0x40/0x40 [ 583.802810] ? kasan_kmalloc+0xc4/0xe0 [ 583.806893] ? kmem_cache_alloc_trace+0x318/0x780 [ 583.811785] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 583.817337] ? _copy_from_user+0xdf/0x150 10:04:42 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0x10) 10:04:42 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x103) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x800448d2, &(0x7f00000000c0)) 10:04:42 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) munlock(&(0x7f0000850000/0x4000)=nil, 0x4000) 10:04:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:42 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x20000110) 10:04:42 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x14) 10:04:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:42 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x11) [ 583.821503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 583.827057] ? copy_mount_options+0x285/0x380 [ 583.831579] ksys_mount+0x12d/0x140 [ 583.835229] __x64_sys_mount+0xbe/0x150 [ 583.839211] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 583.849725] do_syscall_64+0x1b9/0x820 [ 583.853630] ? finish_task_switch+0x1d3/0x870 [ 583.858144] ? syscall_return_slowpath+0x5e0/0x5e0 [ 583.863181] ? syscall_return_slowpath+0x31d/0x5e0 [ 583.868121] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 583.873148] ? prepare_exit_to_usermode+0x291/0x3b0 [ 583.878177] ? perf_trace_sys_enter+0xb10/0xb10 [ 583.882862] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 583.887719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.892911] RIP: 0033:0x455ab9 [ 583.896103] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 583.915675] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 583.923430] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 583.930714] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 583.938001] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 583.945282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 583.952540] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000015 10:04:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x5000000) 10:04:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x74], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:43 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:43 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x90) 10:04:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffff8d], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:43 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x80) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000100)=0x3) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000040)={0x97, ""/151}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x100, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000240)={'bcsh0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x7f) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0x7715, 0x5, 0xffffffff, 0x0, 0x3}, 0x14) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000080)=0x68) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001940)={'ip_vti0\x00'}) r4 = socket$netlink(0x2, 0x5, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r4, 0x84, 0x7d, &(0x7f0000001000), 0x4) r5 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:04:43 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f000078a000/0x2000)=nil, 0x2000}, 0x3}) close(r1) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:43 executing program 6 (fault-call:2 fault-nth:22): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) [ 584.384783] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 584.393354] FAULT_INJECTION: forcing a failure. [ 584.393354] name failslab, interval 1, probability 0, space 0, times 0 [ 584.398667] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 584.406490] CPU: 0 PID: 24868 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 584.425156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.434526] Call Trace: [ 584.437131] dump_stack+0x1c9/0x2b4 [ 584.440781] ? dump_stack_print_info.cold.2+0x52/0x52 [ 584.445993] ? trace_hardirqs_on+0xd/0x10 [ 584.450168] should_fail.cold.4+0xa/0x11 [ 584.454253] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 584.459366] ? lock_repin_lock+0x430/0x430 [ 584.463781] ? __schedule+0x884/0x1ea0 [ 584.467684] ? __sched_text_start+0x8/0x8 [ 584.471832] ? lock_acquire+0x25f/0x540 [ 584.475798] ? fs_reclaim_acquire+0x20/0x20 [ 584.480110] ? lock_downgrade+0x8f0/0x8f0 [ 584.484254] ? check_same_owner+0x340/0x340 [ 584.488577] __should_failslab+0x124/0x180 [ 584.492806] should_failslab+0x9/0x14 [ 584.496594] __kmalloc+0x2c8/0x760 [ 584.500122] ? kvfree_rcu+0x20/0x20 [ 584.503750] ? __list_lru_init+0x151/0x840 [ 584.507979] __list_lru_init+0x151/0x840 [ 584.512037] ? list_lru_destroy+0x500/0x500 [ 584.516358] ? prealloc_shrinker+0x213/0x480 [ 584.520753] ? __init_waitqueue_head+0x9e/0x150 [ 584.525420] ? inactive_list_is_low+0x850/0x850 [ 584.530096] ? __lockdep_init_map+0x105/0x590 [ 584.534590] alloc_super+0x9a6/0xb10 [ 584.538308] ? destroy_unused_super.part.11+0x110/0x110 [ 584.543667] ? lock_downgrade+0x8f0/0x8f0 [ 584.547810] ? kasan_check_read+0x11/0x20 [ 584.551958] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 584.556531] ? kasan_check_write+0x14/0x20 [ 584.560764] ? do_raw_spin_lock+0xc1/0x200 [ 584.565001] ? ns_test_super+0x50/0x50 [ 584.568883] sget_fc+0x269/0x950 [ 584.572239] ? compare_single+0x10/0x10 [ 584.576225] ? alloc_super+0xb10/0xb10 [ 584.580111] ? kasan_kmalloc+0xc4/0xe0 [ 584.583998] ? __kmalloc_track_caller+0x311/0x760 [ 584.588848] ? proc_root_lookup+0x60/0x60 [ 584.592991] vfs_get_super+0x6e/0x270 [ 584.596788] proc_get_tree+0x88/0xb0 [ 584.600504] vfs_get_tree+0x1cb/0x5c0 [ 584.604301] do_mount+0x6c1/0x1fb0 [ 584.607832] ? check_same_owner+0x340/0x340 [ 584.612146] ? lock_release+0xa30/0xa30 [ 584.616131] ? copy_mount_string+0x40/0x40 [ 584.620364] ? kasan_kmalloc+0xc4/0xe0 [ 584.624273] ? kmem_cache_alloc_trace+0x318/0x780 [ 584.629116] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 584.634648] ? _copy_from_user+0xdf/0x150 [ 584.638791] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 584.644322] ? copy_mount_options+0x285/0x380 [ 584.648812] ksys_mount+0x12d/0x140 [ 584.652433] __x64_sys_mount+0xbe/0x150 [ 584.656403] do_syscall_64+0x1b9/0x820 [ 584.660281] ? finish_task_switch+0x1d3/0x870 [ 584.664770] ? syscall_return_slowpath+0x5e0/0x5e0 [ 584.669701] ? syscall_return_slowpath+0x31d/0x5e0 [ 584.674621] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 584.679629] ? prepare_exit_to_usermode+0x291/0x3b0 [ 584.684646] ? perf_trace_sys_enter+0xb10/0xb10 [ 584.689307] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 584.694150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 584.699331] RIP: 0033:0x455ab9 [ 584.702518] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 584.721904] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 10:04:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88640000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:43 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = getpgid(0xffffffffffffffff) getpgrp(r1) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 584.729604] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 584.736859] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 584.744115] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 584.751372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 584.758630] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000016 10:04:43 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc0) 10:04:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x30) 10:04:43 executing program 6 (fault-call:2 fault-nth:23): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf401], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 584.795343] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 584.879534] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 584.888383] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 584.892292] FAULT_INJECTION: forcing a failure. [ 584.892292] name failslab, interval 1, probability 0, space 0, times 0 [ 584.911628] CPU: 1 PID: 24903 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 584.920041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.929409] Call Trace: [ 584.932012] dump_stack+0x1c9/0x2b4 [ 584.935663] ? dump_stack_print_info.cold.2+0x52/0x52 [ 584.940889] should_fail.cold.4+0xa/0x11 [ 584.944979] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 584.950112] ? save_stack+0xa9/0xd0 [ 584.953766] ? save_stack+0x43/0xd0 [ 584.957411] ? kasan_kmalloc+0xc4/0xe0 [ 584.961322] ? kmem_cache_alloc_trace+0x152/0x780 [ 584.966185] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 584.971394] ? __list_lru_init+0x4d6/0x840 [ 584.975649] ? alloc_super+0x976/0xb10 [ 584.979566] ? vfs_get_super+0x6e/0x270 [ 584.983562] ? proc_get_tree+0x88/0xb0 [ 584.987468] ? vfs_get_tree+0x1cb/0x5c0 [ 584.991456] ? do_mount+0x6c1/0x1fb0 [ 584.995179] ? ksys_mount+0x12d/0x140 [ 584.998994] ? __x64_sys_mount+0xbe/0x150 [ 585.003153] ? do_syscall_64+0x1b9/0x820 [ 585.007244] ? save_stack+0xa9/0xd0 [ 585.010893] ? lock_acquire+0x1e4/0x540 [ 585.014879] ? fs_reclaim_acquire+0x20/0x20 [ 585.019207] ? lock_downgrade+0x8f0/0x8f0 [ 585.023377] ? check_same_owner+0x340/0x340 [ 585.027732] ? rcu_note_context_switch+0x730/0x730 [ 585.033736] __should_failslab+0x124/0x180 [ 585.037986] should_failslab+0x9/0x14 [ 585.041797] kmem_cache_alloc_trace+0x2cb/0x780 [ 585.046480] ? kasan_kmalloc+0xc4/0xe0 [ 585.050395] __memcg_init_list_lru_node+0x185/0x2d0 [ 585.055428] ? kvfree_rcu+0x20/0x20 [ 585.059069] ? __kmalloc_node+0x47/0x70 [ 585.063069] __list_lru_init+0x4d6/0x840 [ 585.067150] ? list_lru_destroy+0x500/0x500 [ 585.071496] ? prealloc_shrinker+0x213/0x480 [ 585.075916] ? __init_waitqueue_head+0x9e/0x150 [ 585.080600] ? inactive_list_is_low+0x850/0x850 [ 585.085285] ? __lockdep_init_map+0x105/0x590 [ 585.089801] alloc_super+0x976/0xb10 [ 585.093541] ? destroy_unused_super.part.11+0x110/0x110 [ 585.098922] ? lock_downgrade+0x8f0/0x8f0 [ 585.103099] ? kasan_check_read+0x11/0x20 [ 585.107263] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 585.111866] ? kasan_check_write+0x14/0x20 [ 585.116112] ? do_raw_spin_lock+0xc1/0x200 [ 585.120364] ? ns_test_super+0x50/0x50 [ 585.124266] sget_fc+0x269/0x950 10:04:43 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xe0) 10:04:43 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa, 0xfffffffffffffffc}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0xcc000) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x9, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@remote, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:43 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x1c) [ 585.127650] ? compare_single+0x10/0x10 [ 585.131662] ? alloc_super+0xb10/0xb10 [ 585.135559] ? kasan_kmalloc+0xc4/0xe0 [ 585.139468] ? __kmalloc_track_caller+0x311/0x760 [ 585.144330] ? proc_root_lookup+0x60/0x60 [ 585.148511] vfs_get_super+0x6e/0x270 [ 585.152331] proc_get_tree+0x88/0xb0 [ 585.156061] vfs_get_tree+0x1cb/0x5c0 [ 585.159879] do_mount+0x6c1/0x1fb0 [ 585.163436] ? kasan_check_write+0x14/0x20 [ 585.167780] ? copy_mount_string+0x40/0x40 [ 585.172014] ? retint_kernel+0x10/0x10 [ 585.175903] ? copy_mount_options+0x1f0/0x380 [ 585.180395] ? copy_mount_options+0x1fa/0x380 [ 585.184889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 585.190413] ? copy_mount_options+0x285/0x380 [ 585.194898] ksys_mount+0x12d/0x140 [ 585.198513] __x64_sys_mount+0xbe/0x150 [ 585.202492] do_syscall_64+0x1b9/0x820 [ 585.206364] ? finish_task_switch+0x1d3/0x870 [ 585.210857] ? syscall_return_slowpath+0x5e0/0x5e0 [ 585.215785] ? syscall_return_slowpath+0x31d/0x5e0 [ 585.220702] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 585.225704] ? prepare_exit_to_usermode+0x291/0x3b0 [ 585.230706] ? perf_trace_sys_enter+0xb10/0xb10 [ 585.235373] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 585.240216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 585.245393] RIP: 0033:0x455ab9 [ 585.248565] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 585.267895] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 585.275600] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 585.282868] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 585.290127] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 585.297384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 585.304656] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000017 10:04:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffa888], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:44 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x10000, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000000c0)=@srh={0x0, 0x2, 0x4, 0x1, 0x7, 0x20, 0x3f, [@remote={0xfe, 0x80, [], 0xbb}]}, 0x18) 10:04:44 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xf) 10:04:44 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xffffff7f00000000) 10:04:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe803], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:44 executing program 6 (fault-call:2 fault-nth:24): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:44 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8c0, 0x0) write$P9_RLOCK(r0, &(0x7f00000000c0)={0x8, 0x35, 0x2, 0x3}, 0x8) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000040)={0x18, 0xf, 0x2, {{0x24, 0x1, 0x2}, 0x4}}, 0x18) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x80000, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000100), 0xfffffebc) [ 585.704863] FAULT_INJECTION: forcing a failure. [ 585.704863] name failslab, interval 1, probability 0, space 0, times 0 [ 585.716280] CPU: 0 PID: 24934 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 585.724696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.734060] Call Trace: [ 585.736670] dump_stack+0x1c9/0x2b4 [ 585.740325] ? dump_stack_print_info.cold.2+0x52/0x52 [ 585.745723] should_fail.cold.4+0xa/0x11 [ 585.749806] ? fault_create_debugfs_attr+0x1f0/0x1f0 10:04:44 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) memfd_create(&(0x7f0000000000)='%keyringeth1nodevvboxnet0mime_type^lo\x00', 0x2) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r1, &(0x7f000000c300)=[{{&(0x7f00000000c0)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000000840), 0x0, &(0x7f0000000900)}}, {{&(0x7f0000002400)=@ipx={0x4, 0x0, 0x0, "527fc4f4b987"}, 0x13, &(0x7f00000057c0), 0x0, &(0x7f0000005880)}}], 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x1) fdatasync(r1) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:44 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xf0ffffffffffffff) [ 585.754922] ? is_bpf_text_address+0xd7/0x170 [ 585.759435] ? kernel_text_address+0x79/0xf0 [ 585.763862] ? __kernel_text_address+0xd/0x40 [ 585.768378] ? unwind_get_return_address+0x61/0xa0 [ 585.773328] ? __save_stack_trace+0x8d/0xf0 [ 585.777686] ? save_stack+0xa9/0xd0 [ 585.781338] ? lock_acquire+0x1e4/0x540 [ 585.785326] ? fs_reclaim_acquire+0x20/0x20 [ 585.789665] ? lock_downgrade+0x8f0/0x8f0 [ 585.793850] ? check_same_owner+0x340/0x340 [ 585.798190] ? rcu_note_context_switch+0x730/0x730 [ 585.798199] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 585.809137] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 585.813457] __should_failslab+0x124/0x180 [ 585.813481] should_failslab+0x9/0x14 [ 585.831836] kmem_cache_alloc_trace+0x2cb/0x780 [ 585.836517] ? kasan_kmalloc+0xc4/0xe0 [ 585.840431] __memcg_init_list_lru_node+0x185/0x2d0 [ 585.845457] ? kvfree_rcu+0x20/0x20 [ 585.849101] ? __kmalloc_node+0x47/0x70 10:04:44 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=ANY=[@ANYRESOCT=r0]}) 10:04:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7a000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:44 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x100000000001}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 585.853097] __list_lru_init+0x4d6/0x840 [ 585.857172] ? list_lru_destroy+0x500/0x500 [ 585.861514] ? prealloc_shrinker+0x213/0x480 [ 585.865929] ? __init_waitqueue_head+0x9e/0x150 [ 585.870617] ? inactive_list_is_low+0x850/0x850 [ 585.875307] ? __lockdep_init_map+0x105/0x590 [ 585.879821] alloc_super+0x9a6/0xb10 [ 585.883556] ? destroy_unused_super.part.11+0x110/0x110 [ 585.888936] ? lock_downgrade+0x8f0/0x8f0 [ 585.893108] ? kasan_check_read+0x11/0x20 [ 585.897275] ? do_raw_spin_trylock+0x1c0/0x1c0 10:04:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 585.901873] ? kasan_check_write+0x14/0x20 [ 585.906124] ? do_raw_spin_lock+0xc1/0x200 [ 585.910382] ? ns_test_super+0x50/0x50 [ 585.914292] sget_fc+0x269/0x950 [ 585.914669] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 585.917679] ? compare_single+0x10/0x10 [ 585.917702] ? alloc_super+0xb10/0xb10 [ 585.917718] ? kasan_kmalloc+0xc4/0xe0 [ 585.917742] ? __kmalloc_track_caller+0x311/0x760 [ 585.944841] ? proc_root_lookup+0x60/0x60 [ 585.949005] vfs_get_super+0x6e/0x270 [ 585.952825] proc_get_tree+0x88/0xb0 [ 585.956554] vfs_get_tree+0x1cb/0x5c0 [ 585.960372] do_mount+0x6c1/0x1fb0 [ 585.963922] ? check_same_owner+0x340/0x340 [ 585.968256] ? lock_release+0xa30/0xa30 [ 585.972250] ? copy_mount_string+0x40/0x40 [ 585.976498] ? kasan_kmalloc+0xc4/0xe0 [ 585.980410] ? kmem_cache_alloc_trace+0x318/0x780 [ 585.985269] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 585.990816] ? _copy_from_user+0xdf/0x150 [ 585.992861] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 585.994978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 585.994999] ? copy_mount_options+0x285/0x380 [ 585.995026] ksys_mount+0x12d/0x140 [ 585.995051] __x64_sys_mount+0xbe/0x150 [ 586.022949] do_syscall_64+0x1b9/0x820 [ 586.026851] ? finish_task_switch+0x1d3/0x870 [ 586.031361] ? syscall_return_slowpath+0x5e0/0x5e0 [ 586.036305] ? syscall_return_slowpath+0x31d/0x5e0 [ 586.041251] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 586.046285] ? prepare_exit_to_usermode+0x291/0x3b0 [ 586.051314] ? perf_trace_sys_enter+0xb10/0xb10 [ 586.055995] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 586.060860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 586.066060] RIP: 0033:0x455ab9 [ 586.069257] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 586.088860] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 586.096587] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 10:04:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x16) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="3000000010872330797442c8948ec6ca8bf8a5d3", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800270000000000"], 0x30}, 0x1}, 0x0) 10:04:44 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000000c0)=""/127) shmget(0x3, 0x7000, 0x100, &(0x7f0000ff7000/0x7000)=nil) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x4}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x10000000000001}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 586.103870] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 586.111154] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 586.118440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 586.125723] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000018 10:04:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:45 executing program 3: r0 = userfaultfd(0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x440, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', 0x2000}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:45 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x80047213, &(0x7f0000000040)={0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'veth1_to_bridge\x00'}) write$P9_RSTAT(r0, &(0x7f0000000240)={0x6c, 0x7d, 0x1, {0x0, 0x65, 0x8, 0xfffffffffffffff8, {0x80, 0x3, 0x4}, 0x8210000, 0x6072, 0x9, 0x6, 0x6, 'msdos\x00', 0x6, 'msdos\x00', 0x10, 'veth1_to_bridge\x00', 0x16, 'em1[mime_typemime_type'}}, 0x6c) 10:04:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2000000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:45 executing program 6 (fault-call:2 fault-nth:25): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xf4ffffff) 10:04:45 executing program 0: r0 = socket$inet(0x2, 0x801, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000040)=0x8) listen(r0, 0x3) fcntl$setlease(r0, 0x400, 0x0) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140)=0xe2) [ 586.591989] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 586.603286] QAT: Invalid ioctl [ 586.605134] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x63fe0000) 10:04:45 executing program 3: r0 = userfaultfd(0x400000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/71, 0x47) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x200000, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000001c0)={0x4, r2, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x80000}) connect$rds(r2, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) 10:04:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8060000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 586.678872] FAULT_INJECTION: forcing a failure. [ 586.678872] name failslab, interval 1, probability 0, space 0, times 0 [ 586.690351] CPU: 1 PID: 25011 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 586.698768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.708135] Call Trace: [ 586.710741] dump_stack+0x1c9/0x2b4 [ 586.714396] ? dump_stack_print_info.cold.2+0x52/0x52 [ 586.719622] should_fail.cold.4+0xa/0x11 [ 586.723709] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 586.728839] ? save_stack+0xa9/0xd0 [ 586.732512] ? save_stack+0x43/0xd0 [ 586.734202] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 586.736163] ? kasan_kmalloc+0xc4/0xe0 [ 586.736182] ? kmem_cache_alloc_trace+0x152/0x780 [ 586.736201] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 586.736218] ? __list_lru_init+0x4d6/0x840 [ 586.764663] ? alloc_super+0x9a6/0xb10 [ 586.768570] ? vfs_get_super+0x6e/0x270 [ 586.772560] ? proc_get_tree+0x88/0xb0 [ 586.776460] ? vfs_get_tree+0x1cb/0x5c0 [ 586.780443] ? do_mount+0x6c1/0x1fb0 [ 586.784183] ? ksys_mount+0x12d/0x140 [ 586.788006] ? __x64_sys_mount+0xbe/0x150 [ 586.792165] ? do_syscall_64+0x1b9/0x820 [ 586.796255] ? save_stack+0xa9/0xd0 [ 586.799905] ? lock_acquire+0x1e4/0x540 [ 586.803891] ? fs_reclaim_acquire+0x20/0x20 [ 586.808229] ? lock_downgrade+0x8f0/0x8f0 [ 586.812403] ? check_same_owner+0x340/0x340 [ 586.816739] ? rcu_note_context_switch+0x730/0x730 [ 586.821693] __should_failslab+0x124/0x180 [ 586.825945] should_failslab+0x9/0x14 10:04:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000540)={0x2, 0x28, 0xfa00, {0x0, {0xa}}}, 0x20000570) 10:04:45 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000240)="06c1e6d319e68abdadfc6e5addb823d6c780f4e85031177dc684e584f35c1cc5a741a44ee94d79afece535f882dd79a97eac76f655f68590b1e3bb51c60cd9b57302925ff7e4616673a7ae468057cf9c5fec5f0f5fee33bc48efbc917d154012c265e43b9e54953cbfc4cec27ca04f0892b6ba14f3df04e882732df1defa3cdcdf81b8fc8d6984adc05cc5a1f425b66adda1c764c0fa23c85891363df4c703cad9fa58b10bf62fd0bfdd0f8e0ebdcb6de5e0be7073825493861d5b6e36cd18548f25eeb79ecc52f6de16647b4a6fe6a7d469979d206434cdfa5848ec1b4d227e641a6027", 0xe4, 0x40010, &(0x7f0000000000)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8100000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffff7f], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:45 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) socket(0x0, 0x80000, 0x3c6) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 586.829758] kmem_cache_alloc_trace+0x2cb/0x780 [ 586.834438] ? kasan_kmalloc+0xc4/0xe0 [ 586.838355] __memcg_init_list_lru_node+0x185/0x2d0 [ 586.843387] ? kvfree_rcu+0x20/0x20 [ 586.847035] ? __kmalloc_node+0x47/0x70 [ 586.851030] __list_lru_init+0x4d6/0x840 [ 586.855115] ? list_lru_destroy+0x500/0x500 [ 586.855252] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 586.859450] ? prealloc_shrinker+0x213/0x480 [ 586.859466] ? __init_waitqueue_head+0x9e/0x150 [ 586.859483] ? inactive_list_is_low+0x850/0x850 [ 586.859504] ? __lockdep_init_map+0x105/0x590 [ 586.888030] alloc_super+0x9a6/0xb10 [ 586.891775] ? destroy_unused_super.part.11+0x110/0x110 [ 586.897164] ? lock_downgrade+0x8f0/0x8f0 [ 586.901336] ? kasan_check_read+0x11/0x20 [ 586.905512] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 586.910122] ? kasan_check_write+0x14/0x20 [ 586.914376] ? do_raw_spin_lock+0xc1/0x200 [ 586.918636] ? ns_test_super+0x50/0x50 [ 586.922541] sget_fc+0x269/0x950 [ 586.925922] ? compare_single+0x10/0x10 [ 586.929911] ? alloc_super+0xb10/0xb10 [ 586.933813] ? kasan_kmalloc+0xc4/0xe0 [ 586.937723] ? __kmalloc_track_caller+0x311/0x760 [ 586.942590] ? proc_root_lookup+0x60/0x60 [ 586.946758] vfs_get_super+0x6e/0x270 [ 586.950582] proc_get_tree+0x88/0xb0 [ 586.954316] vfs_get_tree+0x1cb/0x5c0 [ 586.958141] do_mount+0x6c1/0x1fb0 [ 586.961696] ? kasan_check_read+0x11/0x20 [ 586.965856] ? do_raw_spin_unlock+0xa7/0x2f0 [ 586.970285] ? copy_mount_string+0x40/0x40 [ 586.974543] ? kasan_kmalloc+0xc4/0xe0 [ 586.978454] ? kmem_cache_alloc_trace+0x318/0x780 [ 586.983477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 586.987423] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 586.989028] ? copy_mount_options+0x285/0x380 [ 586.989056] ksys_mount+0x12d/0x140 [ 586.989076] __x64_sys_mount+0xbe/0x150 [ 587.011458] do_syscall_64+0x1b9/0x820 [ 587.015354] ? finish_task_switch+0x1d3/0x870 [ 587.019873] ? syscall_return_slowpath+0x5e0/0x5e0 [ 587.024826] ? syscall_return_slowpath+0x31d/0x5e0 [ 587.029780] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 587.034820] ? prepare_exit_to_usermode+0x291/0x3b0 [ 587.039940] ? perf_trace_sys_enter+0xb10/0xb10 [ 587.044626] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 587.049499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 587.054699] RIP: 0033:0x455ab9 [ 587.057886] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 587.077382] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 587.085118] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 587.092396] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 587.099657] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 587.106931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 587.114187] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000019 10:04:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:46 executing program 3: r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) r1 = gettid() ioprio_set$pid(0x1, r1, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x110, 0x101002) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) eventfd(0x6) getsockopt$packet_buf(r2, 0x107, 0x17, &(0x7f0000000180)=""/210, &(0x7f0000000280)=0xd2) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x101, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000080)=0x3) 10:04:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xb000000) 10:04:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4305], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:46 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0x44, @local={0xfe, 0x80, [], 0xaa}, 0xfffffffffffffff7}}, 0x7, 0x2f46c33e, 0xf97, 0x20, 0xd0}, &(0x7f00000000c0)=0x98) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000280)={0x800, 0x20, 0x1}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={r1, 0x41, "9f0a9f279d94597b0039717698877c986590942469cd330e2b0c26ee823999e3102c9c3db9c8c0e9cd29c8fe730c16e9dec35e9fe644db12d29f2eb85f4646f84c"}, &(0x7f00000001c0)=0x49) 10:04:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffff7f], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:46 executing program 6 (fault-call:2 fault-nth:26): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:46 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000340)={0x7, 0x2, 0x3, 'queue1\x00', 0x96}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000694ffe)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x4e22, 0x8}}}}}}, &(0x7f0000775000)) [ 587.575473] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 587.588644] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 587.609521] FAULT_INJECTION: forcing a failure. [ 587.609521] name failslab, interval 1, probability 0, space 0, times 0 10:04:46 executing program 3: r0 = userfaultfd(0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x1c) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x3000) 10:04:46 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = accept4(r0, &(0x7f0000000140)=@l2, &(0x7f00000001c0)=0x80, 0x80000) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x501, 0x70bd28, 0x25dfdbfc, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x4841) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f4", 0x0, 0x80, &(0x7f0000000000)={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) [ 587.620866] CPU: 1 PID: 25075 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 587.629286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.638657] Call Trace: [ 587.641271] dump_stack+0x1c9/0x2b4 [ 587.644951] ? dump_stack_print_info.cold.2+0x52/0x52 [ 587.650199] should_fail.cold.4+0xa/0x11 [ 587.654299] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 587.659436] ? save_stack+0xa9/0xd0 [ 587.663100] ? save_stack+0x43/0xd0 [ 587.666747] ? kasan_kmalloc+0xc4/0xe0 [ 587.670658] ? kmem_cache_alloc_trace+0x152/0x780 [ 587.675532] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 587.680755] ? __list_lru_init+0x4d6/0x840 [ 587.685034] ? alloc_super+0x9a6/0xb10 [ 587.688955] ? vfs_get_super+0x6e/0x270 [ 587.692960] ? proc_get_tree+0x88/0xb0 [ 587.696868] ? vfs_get_tree+0x1cb/0x5c0 [ 587.700863] ? do_mount+0x6c1/0x1fb0 [ 587.704601] ? ksys_mount+0x12d/0x140 [ 587.708418] ? __x64_sys_mount+0xbe/0x150 [ 587.712592] ? do_syscall_64+0x1b9/0x820 [ 587.716678] ? save_stack+0xa9/0xd0 [ 587.720329] ? lock_acquire+0x1e4/0x540 10:04:46 executing program 3: r0 = userfaultfd(0x2) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x80000}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x1, r1}) 10:04:46 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000040)=0xf) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000340)) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="04022bbd7000fbdbdf250a00000008000500040000000c000200080006008571ffff1800010014000300fe8000000000000000000000000000bb1800030014000600ff0100000000000000000000000000010800040001000000"], 0x60}, 0x1, 0x0, 0x0, 0x48880}, 0x4044000) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) dup2(r0, r0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000002c0)={0x0, @loopback}, &(0x7f0000000300)=0xc) 10:04:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffff0) [ 587.724320] ? fs_reclaim_acquire+0x20/0x20 [ 587.728658] ? lock_downgrade+0x8f0/0x8f0 [ 587.732835] ? check_same_owner+0x340/0x340 [ 587.737181] ? rcu_note_context_switch+0x730/0x730 [ 587.742135] __should_failslab+0x124/0x180 [ 587.746391] should_failslab+0x9/0x14 [ 587.750213] kmem_cache_alloc_trace+0x2cb/0x780 [ 587.754894] ? kasan_kmalloc+0xc4/0xe0 [ 587.758814] __memcg_init_list_lru_node+0x185/0x2d0 [ 587.763850] ? kvfree_rcu+0x20/0x20 [ 587.767495] ? __kmalloc_node+0x47/0x70 [ 587.771494] __list_lru_init+0x4d6/0x840 10:04:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x40000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 587.775575] ? list_lru_destroy+0x500/0x500 [ 587.779918] ? prealloc_shrinker+0x213/0x480 [ 587.784334] ? __init_waitqueue_head+0x9e/0x150 [ 587.789018] ? inactive_list_is_low+0x850/0x850 [ 587.793704] ? __lockdep_init_map+0x105/0x590 [ 587.798215] alloc_super+0x9a6/0xb10 [ 587.801945] ? destroy_unused_super.part.11+0x110/0x110 [ 587.807323] ? lock_downgrade+0x8f0/0x8f0 [ 587.811492] ? kasan_check_read+0x11/0x20 [ 587.815656] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 587.820251] ? kasan_check_write+0x14/0x20 [ 587.824499] ? do_raw_spin_lock+0xc1/0x200 [ 587.828755] ? ns_test_super+0x50/0x50 [ 587.832658] sget_fc+0x269/0x950 [ 587.836039] ? compare_single+0x10/0x10 [ 587.840029] ? alloc_super+0xb10/0xb10 [ 587.843933] ? kasan_kmalloc+0xc4/0xe0 [ 587.847845] ? __kmalloc_track_caller+0x311/0x760 [ 587.852704] ? proc_root_lookup+0x60/0x60 [ 587.856869] vfs_get_super+0x6e/0x270 [ 587.860686] proc_get_tree+0x88/0xb0 [ 587.864414] vfs_get_tree+0x1cb/0x5c0 [ 587.868236] do_mount+0x6c1/0x1fb0 [ 587.871781] ? check_same_owner+0x340/0x340 [ 587.876112] ? lock_release+0xa30/0xa30 [ 587.880106] ? copy_mount_string+0x40/0x40 [ 587.884366] ? retint_kernel+0x10/0x10 [ 587.888287] ? copy_mount_options+0x1a1/0x380 [ 587.891338] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 587.892791] ? copy_mount_options+0x1b2/0x380 [ 587.892814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 587.892829] ? copy_mount_options+0x285/0x380 [ 587.892851] ksys_mount+0x12d/0x140 [ 587.906534] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 587.907636] __x64_sys_mount+0xbe/0x150 [ 587.907662] do_syscall_64+0x1b9/0x820 [ 587.907694] ? syscall_slow_exit_work+0x500/0x500 [ 587.944288] ? syscall_return_slowpath+0x5e0/0x5e0 [ 587.949246] ? syscall_return_slowpath+0x31d/0x5e0 [ 587.954198] ? prepare_exit_to_usermode+0x291/0x3b0 [ 587.959249] ? perf_trace_sys_enter+0xb10/0xb10 [ 587.963938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 587.968804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 587.974002] RIP: 0033:0x455ab9 [ 587.977195] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 587.996771] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 588.004508] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 588.011796] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 588.019079] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 588.026361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 588.033652] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001a 10:04:47 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x800) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6}, 0x10) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1a080, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) close(r0) 10:04:47 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000140)={{&(0x7f0000097000/0x7000)=nil, 0x7000}, 0x41}) 10:04:47 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0xe148, 0x101) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6488], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x7) 10:04:47 executing program 6 (fault-call:2 fault-nth:27): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) [ 588.607404] device bond_slave_0 entered promiscuous mode [ 588.612958] device bond_slave_1 entered promiscuous mode [ 588.621430] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 588.635084] device bond0 entered promiscuous mode [ 588.637197] FAULT_INJECTION: forcing a failure. [ 588.637197] name failslab, interval 1, probability 0, space 0, times 0 [ 588.644324] device bond0 left promiscuous mode [ 588.651382] CPU: 1 PID: 25136 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 588.656153] device bond_slave_0 left promiscuous mode [ 588.664214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.664222] Call Trace: [ 588.664246] dump_stack+0x1c9/0x2b4 [ 588.664269] ? dump_stack_print_info.cold.2+0x52/0x52 [ 588.669471] device bond_slave_1 left promiscuous mode [ 588.678809] should_fail.cold.4+0xa/0x11 [ 588.699412] ? fault_create_debugfs_attr+0x1f0/0x1f0 10:04:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8864000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xe00000000000000) 10:04:47 executing program 3: r0 = userfaultfd(0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000300)={0x1, 0x1}, 0x8) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0xff, "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"}, &(0x7f0000000280)=0x107) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r2}, 0x8) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 588.704544] ? save_stack+0xa9/0xd0 [ 588.708186] ? save_stack+0x43/0xd0 [ 588.709995] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 588.711814] ? kasan_kmalloc+0xc4/0xe0 [ 588.711831] ? kmem_cache_alloc_trace+0x152/0x780 [ 588.711850] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 588.711864] ? __list_lru_init+0x4d6/0x840 [ 588.711879] ? alloc_super+0x9a6/0xb10 [ 588.711897] ? vfs_get_super+0x6e/0x270 [ 588.748149] ? proc_get_tree+0x88/0xb0 [ 588.752051] ? vfs_get_tree+0x1cb/0x5c0 10:04:47 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x403) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 588.756047] ? do_mount+0x6c1/0x1fb0 [ 588.759773] ? ksys_mount+0x12d/0x140 [ 588.763584] ? __x64_sys_mount+0xbe/0x150 [ 588.767746] ? do_syscall_64+0x1b9/0x820 [ 588.771834] ? save_stack+0xa9/0xd0 [ 588.775486] ? lock_acquire+0x1e4/0x540 [ 588.779473] ? fs_reclaim_acquire+0x20/0x20 [ 588.783812] ? lock_downgrade+0x8f0/0x8f0 [ 588.787983] ? check_same_owner+0x340/0x340 [ 588.792190] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 588.792315] ? rcu_note_context_switch+0x730/0x730 10:04:47 executing program 0: r0 = socket$inet(0x2, 0x805, 0x3f) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x30, r0, 0x36) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 588.807569] __should_failslab+0x124/0x180 [ 588.811823] should_failslab+0x9/0x14 [ 588.821074] kmem_cache_alloc_trace+0x2cb/0x780 [ 588.825752] ? kasan_kmalloc+0xc4/0xe0 [ 588.829072] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 588.829666] __memcg_init_list_lru_node+0x185/0x2d0 [ 588.829687] ? kvfree_rcu+0x20/0x20 [ 588.829708] ? __kmalloc_node+0x47/0x70 [ 588.852643] __list_lru_init+0x4d6/0x840 10:04:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4305000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3580], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 588.856724] ? list_lru_destroy+0x500/0x500 [ 588.861075] ? prealloc_shrinker+0x213/0x480 [ 588.865495] ? __init_waitqueue_head+0x9e/0x150 [ 588.870181] ? inactive_list_is_low+0x850/0x850 [ 588.874865] ? __lockdep_init_map+0x105/0x590 [ 588.879386] alloc_super+0x9a6/0xb10 [ 588.883121] ? destroy_unused_super.part.11+0x110/0x110 [ 588.888504] ? lock_downgrade+0x8f0/0x8f0 [ 588.892678] ? kasan_check_read+0x11/0x20 [ 588.897452] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 588.902055] ? kasan_check_write+0x14/0x20 [ 588.906303] ? do_raw_spin_lock+0xc1/0x200 [ 588.910560] ? ns_test_super+0x50/0x50 [ 588.914460] sget_fc+0x269/0x950 [ 588.917834] ? compare_single+0x10/0x10 [ 588.921822] ? alloc_super+0xb10/0xb10 [ 588.925725] ? kasan_kmalloc+0xc4/0xe0 [ 588.926944] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 588.929735] ? __kmalloc_track_caller+0x311/0x760 [ 588.929761] ? proc_root_lookup+0x60/0x60 [ 588.929781] vfs_get_super+0x6e/0x270 [ 588.929801] proc_get_tree+0x88/0xb0 [ 588.953473] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 588.956560] vfs_get_tree+0x1cb/0x5c0 [ 588.956586] do_mount+0x6c1/0x1fb0 [ 588.956604] ? check_same_owner+0x340/0x340 [ 588.956625] ? lock_release+0xa30/0xa30 [ 588.983159] ? copy_mount_string+0x40/0x40 [ 588.987420] ? retint_kernel+0x10/0x10 [ 588.991346] ? copy_mount_options+0x1f0/0x380 [ 588.995855] ? copy_mount_options+0x202/0x380 [ 589.000375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 589.005924] ? copy_mount_options+0x285/0x380 [ 589.010434] ksys_mount+0x12d/0x140 [ 589.014077] __x64_sys_mount+0xbe/0x150 [ 589.018067] do_syscall_64+0x1b9/0x820 [ 589.021966] ? finish_task_switch+0x1d3/0x870 [ 589.026475] ? syscall_return_slowpath+0x5e0/0x5e0 [ 589.031420] ? syscall_return_slowpath+0x31d/0x5e0 [ 589.036366] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 589.041400] ? prepare_exit_to_usermode+0x291/0x3b0 [ 589.046437] ? perf_trace_sys_enter+0xb10/0xb10 [ 589.051130] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 589.056006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 589.061206] RIP: 0033:0x455ab9 [ 589.064395] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 589.083968] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 589.091698] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 589.099071] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 589.106356] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 589.113637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 589.120920] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001b [ 589.139440] device bond_slave_0 entered promiscuous mode [ 589.144986] device bond_slave_1 entered promiscuous mode [ 589.154368] device bond0 entered promiscuous mode [ 589.168939] device bond0 left promiscuous mode [ 589.173897] device bond_slave_0 left promiscuous mode [ 589.179128] device bond_slave_1 left promiscuous mode 10:04:48 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4, 0x2000000214840) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:48 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TCXONC(r1, 0x540a, 0x5) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x1b, 0xb, 0xd, "9a241e32f875ff79fab7af4403b3aa5e723056e1df66e1beeed890b963724bbe1e208977866750d9005fe86595406ca1f1cd619210f1bd2935b2226432f7d510", "2aacf0388c5d22ec30d5ade7947e2faebe4af08f4227bd3e7cc34349cc046109f2fe81b68c497d68b261a797623ba084cea5cd928029359352959499050195ab", "e9612c809cb8842bc50f6977a5b1ceb99da5e772034cd2d88d2eee04d6be203a", [0x8, 0x6]}) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8035000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffff8d], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x700000000000000) 10:04:48 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) close(r0) 10:04:48 executing program 6 (fault-call:2 fault-nth:28): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:48 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=""/193, &(0x7f0000000280)=""/97, &(0x7f0000000300)=""/127}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, &(0x7f0000000380)=""/115, &(0x7f0000000580)=""/156, &(0x7f0000000940)=""/185}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000400)) r1 = dup2(r0, r0) sendto$inet(r1, &(0x7f0000000040)="b5d48089bf9fee69a47232c2588eb98782330f2157b0c23c90591171f66970d4c3095672fab7e8426b45320a8ed6dcedceb62c6b9834145e23f53d9b60329868", 0x40, 0x1, &(0x7f00000000c0)={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af13, &(0x7f0000000080)) [ 589.594993] FAULT_INJECTION: forcing a failure. [ 589.594993] name failslab, interval 1, probability 0, space 0, times 0 [ 589.596341] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 589.606800] CPU: 1 PID: 25194 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 589.620582] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 589.625521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.625529] Call Trace: [ 589.625555] dump_stack+0x1c9/0x2b4 [ 589.625580] ? dump_stack_print_info.cold.2+0x52/0x52 [ 589.656630] should_fail.cold.4+0xa/0x11 [ 589.660715] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 589.665840] ? save_stack+0xa9/0xd0 [ 589.669660] ? save_stack+0x43/0xd0 [ 589.673294] ? kasan_kmalloc+0xc4/0xe0 [ 589.677190] ? kmem_cache_alloc_trace+0x152/0x780 [ 589.682046] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 589.687251] ? __list_lru_init+0x4d6/0x840 [ 589.691507] ? alloc_super+0x9a6/0xb10 10:04:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x600000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x100000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:48 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x200080, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001340)=""/230, &(0x7f0000001440)=""/199, &(0x7f0000001540)=""/82, 0x100005}) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r2 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x2, 0x901) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000001600)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}, [0x8, 0x1, 0x3f, 0xb48, 0x5e, 0x90, 0x81, 0x7, 0x40, 0x5, 0x3, 0x4, 0x1f, 0x100, 0x1f]}, &(0x7f0000001700)=0x100) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000001740)={0x6, 0x8, 0xd, 0x400, 0x3f, 0x5, 0x3, 0x0, r3}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000001300)=0x1008) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000280)={r4, 0x3}, &(0x7f0000000180)=0xfffffffffffffe50) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r5, 0x3ff, 0x7b8, 0x80}, 0x10) sendto$inet(r0, &(0x7f0000000000)="47a871ead599bd58963d3d083a7819720f8eb543a97649250711ac7e5c56172dd4986b410bb9d00e070808acfffe607c7a185d3319fcd0e56f00009dbe7729f0ed3d88cabbb70fb5fdc90657e31ce3e8f6616151b3dfcdcecee75f5932414c4b3516c4eaaf8b9472", 0x68, 0x20000800, &(0x7f0000000080)={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 10:04:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x1000000) [ 589.695407] ? vfs_get_super+0x6e/0x270 [ 589.699393] ? proc_get_tree+0x88/0xb0 [ 589.703296] ? vfs_get_tree+0x1cb/0x5c0 [ 589.707285] ? do_mount+0x6c1/0x1fb0 [ 589.711011] ? ksys_mount+0x12d/0x140 [ 589.714827] ? __x64_sys_mount+0xbe/0x150 [ 589.718984] ? do_syscall_64+0x1b9/0x820 [ 589.723068] ? save_stack+0xa9/0xd0 [ 589.726712] ? lock_acquire+0x1e4/0x540 [ 589.730698] ? fs_reclaim_acquire+0x20/0x20 [ 589.735034] ? lock_downgrade+0x8f0/0x8f0 [ 589.739213] ? check_same_owner+0x340/0x340 [ 589.743557] ? rcu_note_context_switch+0x730/0x730 [ 589.746073] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 589.748504] __should_failslab+0x124/0x180 [ 589.748525] should_failslab+0x9/0x14 [ 589.748545] kmem_cache_alloc_trace+0x2cb/0x780 [ 589.771531] ? kasan_kmalloc+0xc4/0xe0 [ 589.775453] __memcg_init_list_lru_node+0x185/0x2d0 [ 589.780484] ? kvfree_rcu+0x20/0x20 [ 589.784122] ? __kmalloc_node+0x47/0x70 10:04:48 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x111800) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10801000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="90000000", @ANYRES16=r1, @ANYBLOB="02002dbd7000fcdbdf2510000000080006000000000007ea05000200000008000500010000005c000100080004004e2100001a0007000200000001000000080006006468000008000800ff00000008000900180000000800050004000000080004004e230000080009003d0000000c0007002000000005000000080006006c6300000800050003000000"], 0x90}, 0x1}, 0x4000000) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400, 0x0) write$P9_RLOCK(r3, &(0x7f00000000c0)={0x8, 0x35, 0x1}, 0x8) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000100)=0x8, &(0x7f0000000140)=0x2) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 589.787323] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 589.788110] __list_lru_init+0x4d6/0x840 [ 589.788134] ? list_lru_destroy+0x500/0x500 [ 589.788159] ? prealloc_shrinker+0x213/0x480 [ 589.811219] ? __init_waitqueue_head+0x9e/0x150 [ 589.815906] ? inactive_list_is_low+0x850/0x850 [ 589.820597] ? __lockdep_init_map+0x105/0x590 [ 589.825115] alloc_super+0x9a6/0xb10 [ 589.828849] ? destroy_unused_super.part.11+0x110/0x110 [ 589.834232] ? lock_downgrade+0x8f0/0x8f0 [ 589.838406] ? kasan_check_read+0x11/0x20 [ 589.842570] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 589.847170] ? kasan_check_write+0x14/0x20 [ 589.851420] ? do_raw_spin_lock+0xc1/0x200 [ 589.855675] ? ns_test_super+0x50/0x50 [ 589.859581] sget_fc+0x269/0x950 [ 589.863020] ? compare_single+0x10/0x10 [ 589.867010] ? alloc_super+0xb10/0xb10 [ 589.870909] ? kasan_kmalloc+0xc4/0xe0 [ 589.874819] ? __kmalloc_track_caller+0x311/0x760 [ 589.879677] ? proc_root_lookup+0x60/0x60 [ 589.883839] vfs_get_super+0x6e/0x270 [ 589.887661] proc_get_tree+0x88/0xb0 [ 589.891393] vfs_get_tree+0x1cb/0x5c0 10:04:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xf00) 10:04:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 589.895214] do_mount+0x6c1/0x1fb0 [ 589.898765] ? check_same_owner+0x340/0x340 [ 589.903099] ? lock_release+0xa30/0xa30 [ 589.907095] ? copy_mount_string+0x40/0x40 [ 589.911353] ? retint_kernel+0x10/0x10 [ 589.915280] ? __sanitizer_cov_trace_const_cmp4+0x5/0x20 [ 589.920751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 589.926307] ? copy_mount_options+0x285/0x380 [ 589.930824] ksys_mount+0x12d/0x140 [ 589.934473] __x64_sys_mount+0xbe/0x150 [ 589.938466] do_syscall_64+0x1b9/0x820 [ 589.942715] ? finish_task_switch+0x1d3/0x870 [ 589.947228] ? syscall_return_slowpath+0x5e0/0x5e0 [ 589.952175] ? syscall_return_slowpath+0x31d/0x5e0 [ 589.957119] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 589.962155] ? prepare_exit_to_usermode+0x291/0x3b0 [ 589.967193] ? perf_trace_sys_enter+0xb10/0xb10 [ 589.971883] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 589.976755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 589.981964] RIP: 0033:0x455ab9 [ 589.985167] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 589.985809] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 590.004688] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 590.004705] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 590.004715] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 590.004725] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 590.004733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 590.004742] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001c [ 590.048172] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:49 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e27}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000019c0)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001a00)={0x0, @multicast2, @dev}, &(0x7f0000001a40)=0xc) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000001a80)={r2, 0x2db6, 0xfffffffffffffff4, 0x3ff, 0x8000, 0x6, 0x100000000}) listen(r0, 0x3) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2001, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000040)={0x7f, 0xa9, 0x2, 0xe5cb, 0xffffffff, 0x6}) ioctl$KVM_SET_SIGNAL_MASK(r3, 0x4004ae8b, &(0x7f0000000140)={0xa2, "0d5cb0811a2e698535fe96693ce5cc6d64d4dd0b2e9d65b098da42661cb06b788e81d9be090a9df8eaa00af47883eea6ecf6cbc103f635638d4c051df10c25ffa0e8ff5a804aacdf46372f19dc7dbc5b504b5e70f38b47948198183b8ddcd3058938d9368a7dcd179c250fb1297710cf66384621417a8c59d67533e897f8d0bb48e8eb6182ba6e80148ba821d662e6d4a0d217f1efc8913a0bd76d769d0d339473e1"}) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:49 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDDISABIO(r1, 0x4b37) 10:04:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000002c0)=0x3) ioctl$TCSETAF(r1, 0x80047456, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000066000), &(0x7f00009b1ffc)) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='mountinfo\x00') getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0xfffffffffffffffd, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x9}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000240)={r4, 0x29d5, 0x80000000, 0x0, 0x1ff}, &(0x7f0000000280)=0x14) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x406000, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) tkill(0x0, 0x0) 10:04:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:49 executing program 6 (fault-call:2 fault-nth:29): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x300], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x3000000000000000) 10:04:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 590.604475] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 590.608838] FAULT_INJECTION: forcing a failure. [ 590.608838] name failslab, interval 1, probability 0, space 0, times 0 [ 590.618316] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 590.626119] CPU: 0 PID: 25261 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 590.644824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.654190] Call Trace: [ 590.656794] dump_stack+0x1c9/0x2b4 [ 590.660437] ? dump_stack_print_info.cold.2+0x52/0x52 [ 590.665670] should_fail.cold.4+0xa/0x11 [ 590.669761] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 590.674880] ? save_stack+0xa9/0xd0 [ 590.678522] ? save_stack+0x43/0xd0 [ 590.682156] ? kasan_kmalloc+0xc4/0xe0 [ 590.686053] ? kmem_cache_alloc_trace+0x152/0x780 [ 590.690908] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 590.696106] ? __list_lru_init+0x4d6/0x840 [ 590.700349] ? alloc_super+0x9a6/0xb10 10:04:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xf5ffffff) 10:04:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:49 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x5) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000140)=""/180) [ 590.704246] ? vfs_get_super+0x6e/0x270 [ 590.708232] ? proc_get_tree+0x88/0xb0 [ 590.712130] ? vfs_get_tree+0x1cb/0x5c0 [ 590.716114] ? do_mount+0x6c1/0x1fb0 [ 590.719836] ? ksys_mount+0x12d/0x140 [ 590.723650] ? __x64_sys_mount+0xbe/0x150 [ 590.727807] ? do_syscall_64+0x1b9/0x820 [ 590.731892] ? save_stack+0xa9/0xd0 [ 590.735537] ? lock_acquire+0x1e4/0x540 [ 590.739521] ? fs_reclaim_acquire+0x20/0x20 [ 590.743856] ? lock_downgrade+0x8f0/0x8f0 [ 590.748028] ? check_same_owner+0x340/0x340 10:04:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x1f) r1 = semget$private(0x0, 0x0, 0x128) semop(r1, &(0x7f0000000000)=[{0x0, 0x5fd, 0x800}], 0x1) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="20362968236d8a33c6d6f272aa001cd6c58abbc62cde84644706b900002700ff0a0000000000000000"], 0x233}, 0x1}, 0x0) [ 590.752357] ? rcu_note_context_switch+0x730/0x730 [ 590.757304] __should_failslab+0x124/0x180 [ 590.761558] should_failslab+0x9/0x14 [ 590.765370] kmem_cache_alloc_trace+0x2cb/0x780 [ 590.770616] ? kasan_kmalloc+0xc4/0xe0 [ 590.774537] __memcg_init_list_lru_node+0x185/0x2d0 [ 590.779570] ? kvfree_rcu+0x20/0x20 [ 590.783209] ? __kmalloc_node+0x47/0x70 [ 590.787204] __list_lru_init+0x4d6/0x840 [ 590.791282] ? list_lru_destroy+0x500/0x500 [ 590.795626] ? prealloc_shrinker+0x213/0x480 [ 590.800040] ? __init_waitqueue_head+0x9e/0x150 [ 590.801517] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 590.804719] ? inactive_list_is_low+0x850/0x850 [ 590.804747] ? __lockdep_init_map+0x105/0x590 [ 590.804772] alloc_super+0x9a6/0xb10 [ 590.827933] ? destroy_unused_super.part.11+0x110/0x110 [ 590.833319] ? lock_downgrade+0x8f0/0x8f0 [ 590.837494] ? kasan_check_read+0x11/0x20 [ 590.841660] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 590.846264] ? kasan_check_write+0x14/0x20 [ 590.850514] ? do_raw_spin_lock+0xc1/0x200 10:04:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xe000000) 10:04:49 executing program 3: r0 = userfaultfd(0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000001800)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000000c0)=""/228, 0xe4}, {&(0x7f00000001c0)=""/202, 0xca}, {&(0x7f00000002c0)=""/130, 0x82}, {&(0x7f0000000380)=""/231, 0xe7}, {&(0x7f0000000480)=""/236, 0xec}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000040)=""/29, 0x1d}, {&(0x7f0000001580)=""/178, 0xb2}, {&(0x7f0000001640)=""/12, 0xc}], 0x9, &(0x7f0000001740)=""/137, 0x89, 0x400}, 0xfffffffffffffffa}], 0x1, 0x40000040, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 590.854771] ? ns_test_super+0x50/0x50 [ 590.858672] sget_fc+0x269/0x950 [ 590.862055] ? compare_single+0x10/0x10 [ 590.866044] ? alloc_super+0xb10/0xb10 [ 590.869947] ? kasan_kmalloc+0xc4/0xe0 [ 590.873853] ? __kmalloc_track_caller+0x311/0x760 [ 590.878720] ? proc_root_lookup+0x60/0x60 [ 590.882888] vfs_get_super+0x6e/0x270 [ 590.886710] proc_get_tree+0x88/0xb0 [ 590.890437] vfs_get_tree+0x1cb/0x5c0 [ 590.894259] do_mount+0x6c1/0x1fb0 [ 590.897814] ? check_same_owner+0x340/0x340 [ 590.902149] ? lock_release+0xa30/0xa30 [ 590.906143] ? copy_mount_string+0x40/0x40 [ 590.910406] ? kasan_kmalloc+0xc4/0xe0 [ 590.914310] ? kmem_cache_alloc_trace+0x318/0x780 [ 590.919167] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 590.924726] ? _copy_from_user+0xdf/0x150 [ 590.928904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 590.934452] ? copy_mount_options+0x285/0x380 [ 590.938972] ksys_mount+0x12d/0x140 [ 590.942620] __x64_sys_mount+0xbe/0x150 [ 590.946611] do_syscall_64+0x1b9/0x820 [ 590.950510] ? finish_task_switch+0x1d3/0x870 [ 590.955021] ? syscall_return_slowpath+0x5e0/0x5e0 [ 590.959967] ? syscall_return_slowpath+0x31d/0x5e0 [ 590.964915] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 590.969952] ? prepare_exit_to_usermode+0x291/0x3b0 [ 590.974981] ? perf_trace_sys_enter+0xb10/0xb10 [ 590.979670] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 590.984539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 590.989736] RIP: 0033:0x455ab9 10:04:49 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6f1ad9f7, 0x40) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000040)=0x91) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffff000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xf6ffffff) [ 590.992927] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 591.012510] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 591.020239] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 591.027523] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 591.029364] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 591.034796] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 10:04:49 executing program 5: prctl$void(0x22) r0 = shmget(0x0, 0x4000, 0x800, &(0x7f0000ffa000/0x4000)=nil) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000200)=""/253) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000440)=""/97) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={0x0, 0xe}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000380)={r2, 0x0, 0x6, [0xffffffffffffffff, 0x4, 0x8, 0x3, 0x5, 0x8]}, 0x14) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000044c0), 0x800000, &(0x7f00000000c0)=ANY=[@ANYBLOB="626c6f636b3d3078303030303030303030303030303830302c626c6f636b3d3078303030303030303030303030303630132c6e6f6a6f6c6965742c73657373696f6e3d3078303030303030303030303030303032322c6d61703d6f66662c6e6f636f6d70726573732c7362736563746f723d3078303030303030303030303030303030312c636865636b3d7374726963742c6d6f64653d3078303030303030303030303030363030302c6e6f6a6f6c6965742c00"]) [ 591.034806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 591.034817] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001d [ 591.067399] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:50 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:50 executing program 0: r0 = socket$inet(0x2, 0x807, 0xa000000000000) r1 = syz_open_dev$mouse(&(0x7f00000006c0)='/dev/input/mouse#\x00', 0xfffffffffffffffc, 0x0) listen(r1, 0x4) kexec_load(0x200, 0x7, &(0x7f0000000400)=[{&(0x7f0000000000)="b109d47f581786fb453fe589a0f45978eee817f4a703d63b57cbe8ffe142c0d89e619e0173cf96140e1b4e471a8793c683a4a3da016bc22ccc64d9dad9463ce865d545a41c64c591b9a9a39e52bfb90271e8ca6d91ba2f40ead56584907b232efb5e79036d43073598a9241004bb0e7a68", 0x71, 0x8001}, {&(0x7f0000000080)="0dfbea3f152c5c723cb4b0dba8793bfa80e7d2a010c04b358eb169c1a4b933", 0x1f, 0xc740, 0x1}, {&(0x7f0000000140)="2badf0a5e9ef2e8b0bbff3586c5b2bff1ce04a546db03175c4b7b730931483fce4b422fdf6781dddc8e2794044ce45902858f8d8c750ce412568f118c1cf1e750e545864f4977adc612fb21a3b10589d2389e626b4a7282bd66dfe6d6c8bacb5839f07c6cf21fd60c6ec981f1480cdc25da57e9251247394c2bf9ffc4b09f4600fb0a9f91ebfa3188ecda60b47f7b24618d5cf7cb1e4265d4981804ed5ee3a3bc1ade60e0056c40e3557709cfe3046", 0xaf, 0x6, 0x8}, {&(0x7f00000000c0)="88a63f5690b62d33179cdb3b07", 0xd, 0x7, 0x1f}, {&(0x7f0000000240)="d6cfd26dc846ad407199cc54566e7ad5baeef04b042e7f0eb07733fb3aaec331954f614d4d78e1496518fbe6a46f28fc2ba6f59037c990edb8ce716b2ab6ea25ef8e559be0197c9622783c8cd6135c2216a0baad29000abd09eb2e28535ffdbbecffab73cef9b29dbe5f5182581dd7dcddf4847785d1c813699d7dbd932bd30a292f1bbd620e36d9824847ee5496da1b46143dfc025aad076ba9b483a3f273adb774b50f842f412bee0049f43ead2bb494105688ade39b3a767aa13c28a2cc7dd9807005ea6e3d5b039972d8f53d8c568a1c23920db5157fbef21e0db67ef23c1f9718d4d51c26bc53b5dce3b9e7a52b5f21", 0xf2, 0xfffffffffffff001, 0x4}, {&(0x7f0000000340)="f4f03a3dd9099bde90a6ef486f017da3bbb959747648cab2706d3efea52f2fb4b6be20c436ef2192459f6921d69a8c6e7c3307372cbbde32108a50ed616b34ea4b2b27056e94a50d97235177957b2e72f89f58d0540424a176bb68d13efff620580c55b6e7099c3dbe6ee494a7644edf", 0x70, 0x9, 0x101}, {&(0x7f00000003c0)="0ab561", 0x3, 0x5, 0x6}], 0x2a0000) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x1e2) openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x40, 0x0) 10:04:50 executing program 6 (fault-call:2 fault-nth:30): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:50 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x81) write$P9_RCREATE(r1, &(0x7f00000000c0)={0x18, 0x73, 0x2, {{0x14, 0x2, 0x6}, 0x9}}, 0x18) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e22, @broadcast=0xffffffff}, @in6={0xa, 0x4e22, 0x7fff, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, @in={0x2, 0x4e21, @loopback=0x7f000001}], 0x3c) iopl(0x10000) write$P9_RCREATE(r1, &(0x7f0000000180)={0x18, 0x73, 0xffffffffffffffff, {{0x82, 0x1, 0x4000000000000007}, 0x6}}, 0xfffffffffffffd16) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x20000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xfff0) 10:04:50 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt(r0, 0x84, 0x1f, &(0x7f0000000000)="8088a8d5220d78730844660d67b0b95cbb8e95e3a6c9076d0fadfd657ae95c4c1beadc6ab2dbd5b8487725b947de7d0fb7e0f28900000000000000000000000000884195166ed480e5f08f3b76c2d5f74d6e6483d4f76b293947f56c5f5c07c371fc01ab7bf3d64c606acfdfe2632b3a2fc2d405938bd6fd844ca8ee4624c530f1923350d1241e1bd51b730556792331", 0x90) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={0x0, 0xffff, 0x20}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r2, 0x2, 0x8}, &(0x7f00000001c0)=0xc) [ 591.676232] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 591.695761] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 591.707134] FAULT_INJECTION: forcing a failure. [ 591.707134] name failslab, interval 1, probability 0, space 0, times 0 [ 591.718502] CPU: 0 PID: 25341 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 591.726925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.736348] Call Trace: [ 591.738958] dump_stack+0x1c9/0x2b4 [ 591.742620] ? dump_stack_print_info.cold.2+0x52/0x52 [ 591.747852] should_fail.cold.4+0xa/0x11 [ 591.751944] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 591.757077] ? save_stack+0xa9/0xd0 [ 591.760728] ? save_stack+0x43/0xd0 [ 591.764369] ? kasan_kmalloc+0xc4/0xe0 [ 591.768273] ? kmem_cache_alloc_trace+0x152/0x780 10:04:50 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xb00) 10:04:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0xa, 0xffffff80}}}, 0xb8}, 0x1}, 0x0) r1 = dup3(r0, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000000)={{0x8, 0x2}, 0x1, 0x2, 0x0, {0x2, 0x10001}, 0x0, 0x20}) 10:04:50 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x400, 0x200200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x10001, 0x0, 0x0, 0x1000, &(0x7f000035f000/0x1000)=nil}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 591.773133] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 591.778338] ? __list_lru_init+0x4d6/0x840 [ 591.782586] ? alloc_super+0x9a6/0xb10 [ 591.786491] ? vfs_get_super+0x6e/0x270 [ 591.790477] ? proc_get_tree+0x88/0xb0 [ 591.794380] ? vfs_get_tree+0x1cb/0x5c0 [ 591.798371] ? do_mount+0x6c1/0x1fb0 [ 591.802107] ? ksys_mount+0x12d/0x140 [ 591.805925] ? __x64_sys_mount+0xbe/0x150 [ 591.810085] ? do_syscall_64+0x1b9/0x820 [ 591.814172] ? save_stack+0xa9/0xd0 [ 591.817827] ? lock_acquire+0x1e4/0x540 [ 591.821816] ? fs_reclaim_acquire+0x20/0x20 [ 591.826155] ? lock_downgrade+0x8f0/0x8f0 [ 591.830331] ? check_same_owner+0x340/0x340 [ 591.834671] ? rcu_note_context_switch+0x730/0x730 [ 591.839628] __should_failslab+0x124/0x180 [ 591.843881] should_failslab+0x9/0x14 [ 591.847702] kmem_cache_alloc_trace+0x2cb/0x780 [ 591.852379] ? kasan_kmalloc+0xc4/0xe0 [ 591.856297] __memcg_init_list_lru_node+0x185/0x2d0 [ 591.861331] ? kvfree_rcu+0x20/0x20 [ 591.864969] ? __kmalloc_node+0x47/0x70 [ 591.868961] __list_lru_init+0x4d6/0x840 10:04:50 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000040)=""/29, &(0x7f00000000c0)=0x1d) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080), 0x3) 10:04:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xf) [ 591.873037] ? list_lru_destroy+0x500/0x500 [ 591.877385] ? prealloc_shrinker+0x213/0x480 [ 591.881802] ? __init_waitqueue_head+0x9e/0x150 [ 591.886488] ? inactive_list_is_low+0x850/0x850 [ 591.891175] ? __lockdep_init_map+0x105/0x590 [ 591.895695] alloc_super+0x9a6/0xb10 [ 591.899426] ? destroy_unused_super.part.11+0x110/0x110 [ 591.904806] ? lock_downgrade+0x8f0/0x8f0 [ 591.908970] ? kasan_check_read+0x11/0x20 [ 591.913133] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 591.917736] ? kasan_check_write+0x14/0x20 [ 591.921979] ? do_raw_spin_lock+0xc1/0x200 10:04:50 executing program 3: r0 = userfaultfd(0x4000000000804) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x1) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000000c0)=0x2, 0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000100)={0x2, {{0xa, 0x4e20, 0x3f, @mcast1={0xff, 0x1, [], 0x1}, 0x81}}}, 0x88) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}}) [ 591.926231] ? ns_test_super+0x50/0x50 [ 591.930133] sget_fc+0x269/0x950 [ 591.933510] ? compare_single+0x10/0x10 [ 591.937500] ? alloc_super+0xb10/0xb10 [ 591.941396] ? kasan_kmalloc+0xc4/0xe0 [ 591.945305] ? __kmalloc_track_caller+0x311/0x760 [ 591.950166] ? proc_root_lookup+0x60/0x60 [ 591.954340] vfs_get_super+0x6e/0x270 [ 591.958153] proc_get_tree+0x88/0xb0 [ 591.961879] vfs_get_tree+0x1cb/0x5c0 [ 591.965702] do_mount+0x6c1/0x1fb0 [ 591.969254] ? check_same_owner+0x340/0x340 [ 591.973589] ? lock_release+0xa30/0xa30 10:04:50 executing program 2: read(0xffffffffffffffff, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) [ 591.977586] ? copy_mount_string+0x40/0x40 [ 591.981842] ? retint_kernel+0x10/0x10 [ 591.985752] ? copy_mount_options+0x1f0/0x380 [ 591.990261] ? copy_mount_options+0x206/0x380 [ 591.994773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 592.000322] ? copy_mount_options+0x285/0x380 [ 592.004839] ksys_mount+0x12d/0x140 [ 592.008482] __x64_sys_mount+0xbe/0x150 [ 592.012477] do_syscall_64+0x1b9/0x820 [ 592.016374] ? finish_task_switch+0x1d3/0x870 [ 592.020884] ? syscall_return_slowpath+0x5e0/0x5e0 [ 592.025828] ? syscall_return_slowpath+0x31d/0x5e0 [ 592.030776] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 592.035807] ? prepare_exit_to_usermode+0x291/0x3b0 [ 592.040841] ? perf_trace_sys_enter+0xb10/0xb10 [ 592.045524] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 592.050388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 592.055583] RIP: 0033:0x455ab9 10:04:50 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000580)={0x0, @rand_addr, @rand_addr}, &(0x7f00000005c0)=0xc) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000600)={@multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}, r1}, 0xc) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 592.058790] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 592.078340] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 592.086071] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 592.093357] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 592.100663] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 592.107945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 592.115221] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001e 10:04:51 executing program 6 (fault-call:2 fault-nth:31): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:51 executing program 3: r0 = userfaultfd(0x0) userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000100)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x4000000000}) 10:04:51 executing program 2: read(0xffffffffffffffff, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:51 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'wp256\x00'}, 0x77) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)='2', 0x1}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/stat\x00') ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000080)={{0x10001, 0x20, 0x2, 0x5, 0x955, 0x8}, 0x534}) writev(r0, &(0x7f00000000c0), 0x20000000000003fa) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f0000000200)="99d8e4351acc32d2fe96fcfede9e81fdba4ccbae12dcc164c726b4245776a56dfc593dbafb07babe10929a9212616b501b057142248692e755abfbcf4b626ebd59f84960b6a13bb6fd0317265d96304df61ece2c7a47954c481fd1bd6b884b5e543186de4d1edabeb77599befe9a241a004d56897fa834afaded7686fa5332e21bbb8cfa937617f25f65189763a72009cbead02c2183a955bbdc297f6c2ea49a5099edef8ae7e839350904c833d06e2c23b7847624e248b6") 10:04:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4c00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x86ddffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:51 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0xffffffffffffffff) sendto$inet(r0, &(0x7f0000000080)="f1", 0x1, 0x0, &(0x7f0000000140)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000100)={'yam0\x00', {0x2, 0x4e24}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x31) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0, r0}) 10:04:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xfffffff6) 10:04:51 executing program 2: read(0xffffffffffffffff, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) [ 592.220380] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 592.241649] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 592.265485] FAULT_INJECTION: forcing a failure. 10:04:51 executing program 5: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca, 0x4d}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a0000002901000000000000000000000000000000000000070000000000076c869f002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RCREATE(r1, &(0x7f00000002c0)={0x18, 0x73, 0x1}, 0x18) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000540)) umount2(&(0x7f0000000500)='./file0\x00', 0x0) 10:04:51 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) getresuid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) [ 592.265485] name failslab, interval 1, probability 0, space 0, times 0 [ 592.276882] CPU: 0 PID: 25415 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 592.285304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.294670] Call Trace: [ 592.297277] dump_stack+0x1c9/0x2b4 [ 592.301015] ? dump_stack_print_info.cold.2+0x52/0x52 [ 592.306243] should_fail.cold.4+0xa/0x11 [ 592.310333] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 592.315465] ? save_stack+0xa9/0xd0 10:04:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xffffffff00000000) 10:04:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4800], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 592.319112] ? save_stack+0x43/0xd0 [ 592.322752] ? kasan_kmalloc+0xc4/0xe0 [ 592.326657] ? kmem_cache_alloc_trace+0x152/0x780 [ 592.331551] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 592.336773] ? __list_lru_init+0x4d6/0x840 [ 592.341038] ? alloc_super+0x9a6/0xb10 [ 592.344946] ? vfs_get_super+0x6e/0x270 [ 592.348938] ? proc_get_tree+0x88/0xb0 [ 592.352838] ? vfs_get_tree+0x1cb/0x5c0 [ 592.356821] ? do_mount+0x6c1/0x1fb0 [ 592.360547] ? ksys_mount+0x12d/0x140 [ 592.364370] ? __x64_sys_mount+0xbe/0x150 10:04:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffca88], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:51 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) r1 = socket$inet6(0xa, 0x80000, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={r2, @in={{0x2, 0x4e22, @multicast1=0xe0000001}}, 0x3}, &(0x7f0000000180)=0x90) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 592.368616] ? do_syscall_64+0x1b9/0x820 [ 592.372702] ? save_stack+0xa9/0xd0 [ 592.376357] ? lock_acquire+0x1e4/0x540 [ 592.380349] ? fs_reclaim_acquire+0x20/0x20 [ 592.384689] ? lock_downgrade+0x8f0/0x8f0 [ 592.388864] ? check_same_owner+0x340/0x340 [ 592.393209] ? rcu_note_context_switch+0x730/0x730 [ 592.398167] __should_failslab+0x124/0x180 [ 592.402421] should_failslab+0x9/0x14 [ 592.406239] kmem_cache_alloc_trace+0x2cb/0x780 [ 592.410921] ? kasan_kmalloc+0xc4/0xe0 [ 592.414861] __memcg_init_list_lru_node+0x185/0x2d0 [ 592.419901] ? kvfree_rcu+0x20/0x20 [ 592.423546] ? __kmalloc_node+0x47/0x70 [ 592.427553] __list_lru_init+0x4d6/0x840 [ 592.431636] ? list_lru_destroy+0x500/0x500 [ 592.435981] ? prealloc_shrinker+0x213/0x480 [ 592.440397] ? __init_waitqueue_head+0x9e/0x150 [ 592.445081] ? inactive_list_is_low+0x850/0x850 [ 592.449768] ? __lockdep_init_map+0x105/0x590 [ 592.454289] alloc_super+0x9a6/0xb10 [ 592.458026] ? destroy_unused_super.part.11+0x110/0x110 [ 592.463409] ? lock_downgrade+0x8f0/0x8f0 [ 592.467588] ? kasan_check_read+0x11/0x20 [ 592.471755] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 592.471955] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 592.476346] ? kasan_check_write+0x14/0x20 [ 592.476363] ? do_raw_spin_lock+0xc1/0x200 [ 592.476387] ? ns_test_super+0x50/0x50 [ 592.476405] sget_fc+0x269/0x950 [ 592.489112] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 592.490929] ? compare_single+0x10/0x10 [ 592.490952] ? alloc_super+0xb10/0xb10 10:04:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x28], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 592.490973] ? kasan_kmalloc+0xc4/0xe0 [ 592.524461] ? __kmalloc_track_caller+0x311/0x760 [ 592.529327] ? proc_root_lookup+0x60/0x60 [ 592.533493] vfs_get_super+0x6e/0x270 [ 592.537313] proc_get_tree+0x88/0xb0 [ 592.541043] vfs_get_tree+0x1cb/0x5c0 [ 592.544865] do_mount+0x6c1/0x1fb0 [ 592.548411] ? kasan_check_read+0x11/0x20 [ 592.552576] ? do_raw_spin_unlock+0xa7/0x2f0 [ 592.557003] ? copy_mount_string+0x40/0x40 [ 592.561257] ? retint_kernel+0x10/0x10 [ 592.565171] ? copy_mount_options+0x1f0/0x380 [ 592.569675] ? copy_mount_options+0x1f6/0x380 [ 592.574277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 592.578994] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 592.579822] ? copy_mount_options+0x285/0x380 [ 592.579850] ksys_mount+0x12d/0x140 [ 592.579876] __x64_sys_mount+0xbe/0x150 [ 592.602257] do_syscall_64+0x1b9/0x820 [ 592.606160] ? finish_task_switch+0x1d3/0x870 [ 592.610688] ? syscall_return_slowpath+0x5e0/0x5e0 [ 592.615634] ? syscall_return_slowpath+0x31d/0x5e0 [ 592.620583] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 592.625621] ? prepare_exit_to_usermode+0x291/0x3b0 [ 592.630653] ? perf_trace_sys_enter+0xb10/0xb10 [ 592.635341] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 592.640209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 592.645406] RIP: 0033:0x455ab9 [ 592.648599] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 592.668162] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 592.675892] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 592.683175] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 592.690459] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 592.697744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 592.705027] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001f 10:04:51 executing program 6 (fault-call:2 fault-nth:32): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:51 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_names\x00') ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000100)={{0x7, 0x400, 0x3d9, 0x2, 0x20, 0x3}, 0x6}) 10:04:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xc00) 10:04:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3580], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:51 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getpeername(r0, &(0x7f0000000380)=@can={0x0, 0x0}, &(0x7f0000000400)=0x80) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@dev={0xfe, 0x80, [], 0x12}, @empty, @remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x9, 0x176d, 0x400, 0x4, 0x220000, r2}) getsockopt$inet_buf(r1, 0x0, 0x24, &(0x7f0000000040)=""/84, &(0x7f0000000140)=0x54) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) userfaultfd(0x80000) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={@mcast1={0xff, 0x1, [], 0x1}, @local={0xfe, 0x80, [], 0xaa}, @mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x1, 0x2, 0x500, 0x8, 0xc00000, r2}) 10:04:51 executing program 5: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) recvmmsg(r0, &(0x7f00000035c0)=[{{&(0x7f00000000c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/106, 0x6a}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/175, 0xaf}], 0x3, &(0x7f0000001380)=""/248, 0xf8, 0x7}, 0xff}, {{&(0x7f0000000200)=@ipx, 0x80, &(0x7f0000003580)=[{&(0x7f0000001480)=""/210, 0xd2}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x9}, 0x49}], 0x2, 0x20, &(0x7f0000003640)) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000003680)='dctcp-reno\x00', 0xb) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = creat(&(0x7f00000037c0)='./file0\x00', 0x40) open(&(0x7f0000003880)='./file0\x00', 0x0, 0x41) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000003900)={&(0x7f00000038c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003840)={r4, 0x50, &(0x7f00000036c0)}, 0xa5) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=@fragment, 0x8) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400004000003, 0x4) write$FUSE_DIRENT(r3, &(0x7f0000003940)={0x88, 0x0, 0x6, [{0x0, 0x4b, 0xb, 0x200, 'dctcp-reno\x00'}, {0x1, 0x578, 0xb, 0x6, 'dctcp-reno\x00'}, {0x6, 0x2, 0x10, 0x7, 'cgroup%trusted))'}]}, 0x88) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x3a7, 0x20000000, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 592.788018] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 592.793527] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x3f00) [ 592.838851] FAULT_INJECTION: forcing a failure. [ 592.838851] name failslab, interval 1, probability 0, space 0, times 0 [ 592.850203] CPU: 1 PID: 25482 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 592.858619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.867988] Call Trace: [ 592.870605] dump_stack+0x1c9/0x2b4 [ 592.874259] ? dump_stack_print_info.cold.2+0x52/0x52 [ 592.879487] should_fail.cold.4+0xa/0x11 [ 592.883577] ? fault_create_debugfs_attr+0x1f0/0x1f0 10:04:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xfffffff4) [ 592.888708] ? save_stack+0xa9/0xd0 [ 592.892354] ? save_stack+0x43/0xd0 [ 592.895992] ? kasan_kmalloc+0xc4/0xe0 [ 592.899909] ? kmem_cache_alloc_trace+0x152/0x780 [ 592.904770] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 592.909978] ? __list_lru_init+0x4d6/0x840 [ 592.914230] ? alloc_super+0x9a6/0xb10 [ 592.918147] ? vfs_get_super+0x6e/0x270 [ 592.922135] ? proc_get_tree+0x88/0xb0 [ 592.926059] ? vfs_get_tree+0x1cb/0x5c0 [ 592.930055] ? do_mount+0x6c1/0x1fb0 [ 592.933787] ? ksys_mount+0x12d/0x140 10:04:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x4) [ 592.937605] ? __x64_sys_mount+0xbe/0x150 [ 592.941767] ? do_syscall_64+0x1b9/0x820 [ 592.945854] ? __sched_text_start+0x8/0x8 [ 592.950039] ? lock_acquire+0x1e4/0x540 [ 592.954031] ? fs_reclaim_acquire+0x20/0x20 [ 592.958369] ? lock_downgrade+0x8f0/0x8f0 [ 592.962545] ? check_same_owner+0x340/0x340 [ 592.966887] ? rcu_note_context_switch+0x730/0x730 [ 592.972189] __should_failslab+0x124/0x180 [ 592.976449] should_failslab+0x9/0x14 [ 592.980271] kmem_cache_alloc_trace+0x2cb/0x780 [ 592.984952] ? kasan_kmalloc+0xc4/0xe0 10:04:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:51 executing program 3: r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r0) r2 = request_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000180)='selinux#proc{:em1cpuset/eth0,\x00', 0xfffffffffffffffc) keyctl$unlink(0x9, r1, r2) r3 = userfaultfd(0x2000000800) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000c34000)={0xaa, 0x1}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}}) [ 592.988872] __memcg_init_list_lru_node+0x185/0x2d0 [ 592.993913] ? kvfree_rcu+0x20/0x20 [ 592.997566] ? __kmalloc_node+0x47/0x70 [ 593.001568] __list_lru_init+0x4d6/0x840 [ 593.005648] ? list_lru_destroy+0x500/0x500 [ 593.010003] ? prealloc_shrinker+0x213/0x480 [ 593.014431] ? __init_waitqueue_head+0x9e/0x150 [ 593.019114] ? inactive_list_is_low+0x850/0x850 [ 593.023803] ? __lockdep_init_map+0x105/0x590 [ 593.028324] alloc_super+0x9a6/0xb10 [ 593.032059] ? destroy_unused_super.part.11+0x110/0x110 [ 593.037451] ? lock_downgrade+0x8f0/0x8f0 [ 593.041627] ? kasan_check_read+0x11/0x20 [ 593.045792] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 593.050387] ? kasan_check_write+0x14/0x20 [ 593.054628] ? do_raw_spin_lock+0xc1/0x200 [ 593.058877] ? ns_test_super+0x50/0x50 [ 593.062778] sget_fc+0x269/0x950 [ 593.066155] ? compare_single+0x10/0x10 [ 593.070145] ? alloc_super+0xb10/0xb10 [ 593.074047] ? kasan_kmalloc+0xc4/0xe0 [ 593.077956] ? __kmalloc_track_caller+0x311/0x760 [ 593.082819] ? proc_root_lookup+0x60/0x60 [ 593.086984] vfs_get_super+0x6e/0x270 [ 593.090810] proc_get_tree+0x88/0xb0 [ 593.094536] vfs_get_tree+0x1cb/0x5c0 [ 593.098355] do_mount+0x6c1/0x1fb0 [ 593.101902] ? check_same_owner+0x340/0x340 [ 593.106231] ? lock_release+0xa30/0xa30 [ 593.110224] ? copy_mount_string+0x40/0x40 [ 593.114472] ? retint_kernel+0x10/0x10 [ 593.118396] ? copy_mount_options+0x1d9/0x380 [ 593.122906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 593.128462] ? copy_mount_options+0x285/0x380 [ 593.132979] ksys_mount+0x12d/0x140 [ 593.136634] __x64_sys_mount+0xbe/0x150 [ 593.138951] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 593.140624] do_syscall_64+0x1b9/0x820 [ 593.140642] ? finish_task_switch+0x1d3/0x870 [ 593.140664] ? syscall_return_slowpath+0x5e0/0x5e0 [ 593.164341] ? syscall_return_slowpath+0x31d/0x5e0 [ 593.169292] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 593.174333] ? prepare_exit_to_usermode+0x291/0x3b0 [ 593.179367] ? perf_trace_sys_enter+0xb10/0xb10 [ 593.184066] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 593.188936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 593.194136] RIP: 0033:0x455ab9 [ 593.197329] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 593.216917] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 593.224654] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 593.231936] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 10:04:52 executing program 6 (fault-call:2 fault-nth:33): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x8) 10:04:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mq_getsetattr(r2, &(0x7f0000000040)={0x9, 0x3, 0x3f, 0x3, 0x863a, 0xb561, 0x8000, 0xe4d}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14}}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000001500)=0x8, 0x4) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000500)=0x7fffffff, 0x4) getsockname$packet(r4, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000600)=0x14) sendto$packet(r4, &(0x7f0000000540)="3e59bbdc4aeab457dce837fef2a2875a21c5e894c2b854176bc32b98962d1a2abc31e28378647929d16e23ab4dc704f4aecd920ef5bff06ef0f116263a7599ca92129837082eea546b26045aefba23b1ce31dfaa826f4c0f6f6d60", 0x5b, 0x800, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x7, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000300)={0x1, 0x10, 0xfa00, {&(0x7f0000000140), r6}}, 0x18) listen(r0, 0x2) getrandom(&(0x7f0000000680)=""/220, 0xdc, 0x1) r7 = accept4(r4, &(0x7f0000000340)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x80, 0x80000) recvfrom$packet(r7, &(0x7f0000000080)=""/89, 0x19, 0x2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x20000000) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000003c0)={r3, @in={{0x2, 0x4e20, @broadcast=0xffffffff}}}, 0x84) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') setsockopt$inet_sctp_SCTP_EVENTS(r7, 0x84, 0xb, &(0x7f0000238000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) 10:04:52 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='#system)posix_acl_access$vboxnet0'}, 0x10) flock(r0, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000180)=0xf) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x7}) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x2fc, 0x2040) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffff000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:52 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) fadvise64(r0, 0x0, 0x1, 0x4) ioctl(r0, 0x40, &(0x7f00000000c0)="c3b80d3454429f1a139323f6cd4d9b83ad24b567b12467d3d67b80b83ebdbe2c9a6267071204559c169b135d1251e4afdd4345efa816b8b1f47a6bc8039089ada3751a9d872d092f590b38c23998dee6e7966f214a31e286938e1e7eacd49485da06f6818539f0d87bcb78852711b31003db6159bbadf1b7803f50317225a9da957eec9aadbb405989e934e1c4bd20f4bdc655b6a3b149181b887c8b2a0e29e6430d269a443c5217d141dabb435087ce04266d8dd2d4f7a7dad711") ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) [ 593.239310] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 593.246594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 593.253881] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000020 [ 593.323420] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 593.339904] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 593.350826] FAULT_INJECTION: forcing a failure. [ 593.350826] name failslab, interval 1, probability 0, space 0, times 0 [ 593.362234] CPU: 1 PID: 25537 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 10:04:52 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = getegid() syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x101, 0x8, &(0x7f0000001580)=[{&(0x7f0000000240)="bca1ae80e1167f470ddb35fdf648719377b554aab0e8f2c0ffe7d065bcb34cbb2b5fa3ed01b91f0ef37128ec50ef8e0f225f32d43449a5baec177f2217f5e7baf5648a174c47159a5af63d81e99d843726f3359b7194e1b363b3e0ec95c1fb02a57e0f427ff3b5c54348e7f26cbbcc8cf7f0bdcf94bd3c5de9b97e8e9bf5e075a89aedb8e3c78c58b76602673bd0213b992813d42089b58f71abedf762eaa319598a74274af1e1b6603e1d400d694f7c2e96addccddd24252d84a8b9e7fb7d2d420e570d5725d8c6398b2a0b3ca9571c4d271b02bca3e4c4644b06a93de9e92a3a3db0a6e9e39061c0f936fc866bc0fd6e71c6897a0f880dff2b2da8b4de5fa09261c29ffec793a242aa958a5bf2442b29a5b3b8a5be6763fee1083230d5dbbe38e29720616f6a460f2d7fa4285896d9cd200ccfc45dd8904af20464adb42fc6d97d7d11b342fcb11343765ac454def61d43865d695a7301f2bb27c77cf4d01413cec280f2c90c5c0f2858946800dd913eba2ee880e95787a1a87270514d609e88dc5fc26973f7b0bac40801b0bd4f929aacd6ac11577407c95e08a34ab7e18bc6466306d4049641f0e80dbf1708ab81daae8e647667b94c3f1acfa2cf43896857b5c2c720fb5f86c0f2cd99ec5d4153160950af1d3456f4351200d0cc89d204aa06f63e8f397d136dc8189a2c9a76d4b4926de4d27897723b1dee8e791ca4c4c39514d3b8c451877499bd2b99672755d17f802b4ac79fce97415f83a6b09a005b9da3b4ee48667c82d3af391d1dcaa2a7e70c55544fd793b1eb7ed62a32ecf3e6609b9a0ba1b997a0d00c85af69f861950c5d37dd794b65d6c00d0da1a42c9a98cbc46874e8a281dd27b91e10ee8748ca67787269e58a0c44e08d1547b5bc09f0e2a82fa1a0f74af8c994c260df5d82fdbbb1930c0e2ee4c73ae61ff7977845f624c322f327f1cffd07e0f140cfee087ffce1d59bb6b8faf5d1d4a380120a50ffeaf10e582b2cfd95270c3b5d9cd08059148456855c59483f3f81698fccd2eaed03c23476aa8c0e5a38793ca0edc56b2dbeda16c844c8efbe5bbf7b84cfb3cf5f29b9b8d5b32ef8b0595dfcf8c899d35b7172e1b1ddea7f0c1c53a52716956964298dd850238dd95ac24d9c2cfecce727769f6057d30ccbc7887dec22064804df588ef539e4b0978de8e80541eb2f5a65ace916aa94aeb8c3ce78c0630e0a8bc357ab5cfe701b8d106c4a6800e5d056404c846a26dc4ca163e659e9f3ebadc02b6287dae1d42b9a39c385b66ede8f8a29fdb26c8c7a30423dfd2d42778fa536007acc64d508bf42273d94ab74d58e95897d822c7d6728e48b25cf5ce611e301d7417cd49fa812c8224e653da45ea4490b2ed272f7b0b3cea507975e89be3a585db8d7edca7d0c140c47403126df5f6c96c4b0d38bebb1566c63dbc4f382798bb290c4af1b5f85b9d8cc1ad78330508e7eee8e2f1f8f006e137ffb2d3f8131f0881e3992dd1063aa71d9b53f026869ab73b4d8aa0ca718c3ec5b931925ff0276ee1eb52f99d5e67a94e022a98698dbfd964d3c616ed157ecb57c776121e6b0f3ef7980a2dafb1c235280fa11288a64dc0a4382f6249e3fb3cf6feff1189ae62bf3e30073b28d58ce74121f7707bd8e54a737b7dc29b967dd85b89ab0e85ad175eac597be0e4612d1134a82dcac6ff13b435eb1aade216d9602344a364fa06f26614de5f7151fe9060c4443e04b6d59ae6950b4e5b929b456a9b063adf36067952bb35e7412effbab973acaf73ee74138140e4ce3fbf961d34ef36737c99f2456915ae6a4fa7dbaaf5e4c551c93e28bf88893665f65d4597b8aac6f9bea8e8050786ffce65b4c8c95951fbb58ca10018a050c74beef3659a2e9f242440cd45257af35e84f5498b572fc65973406eb6b2f34c8357d7362c4a5d5545ca7783a683a26500512149cc9074612786f2abab90b64625a317fc47b293fa5252128bdf4c805981cd319b2789a761c0c1cefe4820ea293435746bf592057f1ff417d4fc26ead362df1c1da51f4c56ebedc9b17b43621d4db4152bdffd5a08b0ae5ebb6fbb492eebbb01bf9af7d024c9d4a1b1ff7b072e5b80cd361c04cec662d37cbf82d8510f12a96b9e4c3ed1a2e67d28b82ea9192dd20eaee433238a8c47d4187e41d41b3e07221ebbb3b8811e39edb0d5735aed41487640b236145d52da93b2d77e4633904670507789d7cc9f0ea13fa8ed78c7f4be1f3970e1a329c2d7e441705695e43dcfa3f3bfb4b66ea2a2469246c41e91b5f09733a06ef22d6d82a8bb67f761dc0f97751ddf91b9d72ef2bdfd7c9c8e728b47f25a2140bdc874140b7f05bab42299ef53741e36fec02f5e427899269687dde42287b317564f50935321bf25b702c58c2dd2d2d39ed007a9b85da584c59bcea979bc218c707703dcfdfc24b0aa4b0a277b53d6fe051569a9d3270509306f815e4df4f5bad7eedf13eb5e5024bea9373586b9a2b30355e0bdd34f45a4dd5bcc8cd545020c249a6b5de4f2c5cf7d5562a9b2f31011545822ba12ab1781f619f648b514259513dbc5b19ee7c7c7e96fbb90b9c83f5296e89180ef4a887254db3eeea212ebccf462d2c9ddd7461240240ddbff4e392bab26c6625bc2b583d7d6c8fbff5389ccf99595261ed0948c2d343020303f0f5b64d6e2bf4bd6d4277ffb12759dd263774a54ae18b156e581a4156259bdb722faaa1fc429a0ac7f1e6b04f9e5ce46e9b8658df453af1fcdcea189d652d97c131a472ca8d3d3c1d8722903862d6353ff1d30f415c2113c0439372a9c1fdac378b200d19e8acf99a7c576f060ad4f679b89820f67cbbc6f06518989e14e9fe91c7f5239afa0d2d9a6710ed7ed7cb9f2af34b87265d4d5b84b7c9fb0be9b98e2ea11588b764917967e19318aa316ceeed30d7b5d18d108ce1ac2cb24f5b15a64af1d7548a5aa6350d732cf17cb4c6defe444116d4b74fd9edd60c353fde84a406f2aae97494ff285f5ff2b7e061c8ae3715cb6276eaa7aca04999f05edfb1abb17325e17df82e6e453ef796e7cb660f27523b8c7b1866223551a5b103182c6155c3b33d9634f585a445e4998d381832e98c6146ce7a87b10f31502a8c49de98e0b901708303af5e5d3ec50577a7d9689eb0537a4af419f4bb94a4e289b0b3b32f5a8f45fe6d3cf8dc892abc2629e79fc04368a74e59a09c5546bf810dfb4116dae8a59b15dba4455859cd9577e13c642f072ceb2cd02c291ff6d83d4640b4f8cd64e04c02c2e328b4d01085e5a2847ca7f5a886c5864453c5728543bb21e6aa5ecd812d4f6ec081dd74b225c8343a6501f86fc546c8108c38595ec065d51f600a2f79a021b2ec44343babc9fd0c32d4c5c83b509f52e32b85563449e27c90f9b04c5a4d8d18145825c0aa3955e930f30403b1e23d96e6abebc4d5f250f367ea0451c0c5a4890d0faa5a9f599fee395b1d2409e16a331269e7c94824764d2cfcc4a33eceacf437b3094daebdba4c3f1635b0535bc3e5f1b8a71f1109087babca5d55fdc2a63fb286363393550ae38dd9eaa300d9278a82aa50f7cb81e1c10459ce6be464eae964688e3cf70e206ae0b0b1604185e14fcca12142716bfba479fe95d479f6796a0c49b04187119f1c76f4eaa07322a923d5a46b4742ba47e24ebc07c703c26e7180dfd01de18c4e8f186063f7ee78aa0a34b0e7f50d5139b132cb2cf71b0abf54f6aaf44847dc9830744a5356b6a0fe6f0d70fbfd36b7b2b79b6176da50f2b530cc4b0c196fde7a4e6b7d2987012bdb9ea5f5045272fa946b907be5dc573c3ce4ccf41f18b551a716d2662e4667957cf463fae5b790de372492404dc80e7e75695c72c8d98028863ffc64118f06b5b854a1d8fda33e0c9d6bf7f08a5a91d053f15436f79eb6f9d46e8ad21c98e179da0c62e7d8dce5976e3644e29c9ee1960d1c1027ef359058b9faf3eee630b1b2df729a7499df668357fe03c069b2d0c48990ae2adfe648e813d40d18aee94fc4ea925ec7dd552411c153d0a54e79e6728fe51cb22d960469e32e810fff706f521c0f0ed5258f9fef8890a5f248089303534e508d0ab58b8432761562d258e248daeb7d15a1cc868d1d4d2941ae34a3b962e297c1410c821b59373342571f601679f98492bd925d2aff61f8c94babb5519a9b208269b7773a2fced0917455a19d054c70044d7dd91b26c677dc95a7e689476938973691818eeb6af857088818add15995e2c9fd2262a41638acb06cdd94cdcdadc698a8dc93f5cd5efbf43c3cce673a9d3ffacc9107ec3c588f23dd5d8602e71c0d4278358585a8916207a67f4bca2086f7f0375a07a6e6f6b89225fe5ea61625a4c1479c20d096153870bc0d94a97b49554af0f05064be9e6a6dacabf5039d1895fb71ab2ef44e2cba494f520dfd11906da9f817e52ae788507ae3d55a3b80779c121c9ebf5a68405652898e745320ef71d07b218628ab74ab374c4f5cb2e7352e5728dd26aa934113e122564cdc3786030983c6cafea8f33b0a5ae2cf87f9d854b09e1eabba18c15bc139235f5cce4c07777608b1ec629afd898f5f60f2fcf7644d945a724b9b10cb334c47e5f855da34956c48334586cb6e32597acdde9ea4a1fb38dc9db110946233b298b83372c2b2190ba371ff854943d84b7979b2332ebc58b01e381dbea286d58a73da7a65e201c5d2566da918e8de2a1625f5b527924fd17160e047a24a084798dbb7b247ee2248ff54398bc787a093028d6186fdb140f300eac4bfee90bb034f2586026684f171e00819653931c9592ae6602a0d3980a23a51d1e01ed66e812c96b5ccd6f4117b78a0f5be5d29a908234e1805014ace581864345b35c32294861139ee10af13837b399e797a39908cc894e532f9eab4990eeca9f880b8f3ab79acfede95cffee44f8ea73b5f0a0a64543d77adac5c56bd03fa3a2701c56d566cd73a4c6f119831d32277bf74ddbfffd605a9c790171c401788a26a79c9228e926ff3c7623161345863dcfea9dadf0de903325453f42c699046d240cf17bd9879e97fc522377c3932cb45fe959b382dbc14ba44b3fd1892466041d7a26ff16743c4f64e4a095b4cf4d405f67f4efb74242da984600e87cb25934907eac37bddd0d0f49b233dac0c8407d600187db49861d6276e1e73c669a7668dc2f69c3970d976b181b0042ab8fc42f7b8d7d66894808a3dccf17ab6591899708cd4969a6616b7f7934e5695bf4869c8f2faa031cf407b14d707a5aa842eaa2eeda63583e0dfd591f7c26694adb1f4179180d032d781d4e77f5632e11b820ee80f7bb65c93f3c990979d1e2cd2de8a23e69cadfcbaa5c88a21819e69c10efacc0b0188bfe15523e2e14e93219f07e1864a5eb4d37d7062f6eda0b7e10052041ef4c0059b1931485f01a05b6ca372423234dacda14df8dadc7bbc87841194a417e00f60cf8475a10c101fe79285db79a6c8a311a24ae211a295f3ec0494289185158be282ae0cdd601c471227926e9692cf512e9bc757498228cadf965d2bbc2595a39f533f0c3c518d511f3899c0150fa6aad5c64f96ce2cd813ffd59b18dc899903df1e006f373d85ba14c2b6ad5125381374299cf3773ef5458e4a96aa0d29b782b5a481f4c67e7b5bf8178b8c480f671f708eaec640ff9e304208cffe83d43567ef525e6e36a0be7467ae5abc78cd453925bf80e20bce92e26c77453712e559a9bf4182cbdfb69bd09421e5fbad734745921587753a55dbcb022d2f8cb1da060252604d2a6e408cbc9f9b308efa3f", 0x1000, 0x2}, {&(0x7f0000000140)="a8f60c5df718709ead6934f948230d2533264b8d55b858330c648cbdcf5fa68a1e699c283b28a90d7de41f91c69f35b9d6d904c654205df805902fef6aef6bb23f31b411747cb8d940d662e70ec714b1d70ea5604619", 0x56, 0x200}, {&(0x7f0000001240)="0f53c781048a69b27ffa02ecb2159b3c0a138d1c77e26f4cc9701ed309e8fe54422e18bc9d9442dfe749f6590ffb8f52fa6ce8126133f29ace9e810d4235374e06571c349cef2262bef11a0a060358e1672578c1afa35afa0511f63bab0cd084d2e9ab0292382ac0c7f32d04a1dbd38bd538d99f1ce8782bc0af0004dffadb8e81fee0b6bd417b18508f299b1a7cc872f45c0732184160afdf23a3425bd73529e22111ee97bf9eba1e3f7609bb335b5e5db9e740932a8acaf7fac29305e1f602c8d6af54a8e9f616c752001766", 0xcd, 0xffffffffffffffe3}, {&(0x7f0000000080)="49db2f8b93c743d464430f97b0c379bca755736116f950348b8321b41240d10f7d18eefa0b75b12f885cc0ef8d52cb2d", 0x30, 0xb7}, {&(0x7f00000001c0)="006042b15fd7a1ec1cef8df9a0ca90c3b8e61e1cb5220f63e70374", 0x1b, 0x800}, {&(0x7f0000001340)="208e3404afbbd54d7edcc6aa3e9656aa44ef10dc41c94fc58bc316b0e188765a42a8a985bb28bc22d401c0b5dbcaa777365150d5af79f613e29b903e8b2ad1f3092631bda6fbe06e1819651816056f7f4c76cfe4aa330ed6cdd8b787959e5c83", 0x60, 0xa1e}, {&(0x7f00000013c0)="9f91ba8b0b7739345ca6625a4a2fae62f7d9aa4b29939718c1cf62ff6df877960cbc43e0f2dc4068887922ffa1cf0109e01b3dc42379cda88c4a253d0bdb1175c6475df8290426ef1f47ccb95e7867e0669ac99535b16d7ed83d801858d8e36da193f81b9e7cdac9aa1e9ec928eeb69b643f6ffa539581f315d9e020e63d8cb9d2cd0f9a7aa7ea611afcffdc14c6fd0addc05b5662ed9ff4f5", 0x99, 0xda}, {&(0x7f0000001480)="2523c9dbd65fa0514246792c74ae8e553eadb806ab0781529470235a927936477e488cae98c921c4ad34ef6ea7b624c0b4d65117d5bb0452c83344fb426631b6a4783ddf6dff0cc6c4c50086e32a65712960a768ffdc675fd702d74501ac57da1aecbee3a5b49f7c184a351817f9bfa4a594136c739cb1f60c49bd554f41a49da3e67acffb7d431b54088dbf35eca49bad97166cc8141a08a5629a2b627f020dc0151953a578ad5e4a8ba0565c6b3b11e0c4266b1e602e2237892c693d9c0b23c171febf17d37f6c6ffc1ed376175a775cc75479fc36c1093e49289320e8782f6a2165fd1c6b3147bec2d737", 0xec, 0x81}], 0x18008, &(0x7f0000001640)={[{@creator={'creator', 0x3d, "d22195c0"}, 0x2c}, {@part={'part', 0x3d}, 0x2c}, {@file_umask={'file_umask', 0x3d, 0x100000001}, 0x2c}, {@codepage={'codepage', 0x3d, 'macgaelic'}, 0x2c}, {@quiet='quiet', 0x2c}, {@gid={'gid', 0x3d, r1}, 0x2c}, {@file_umask={'file_umask', 0x3d, 0x1}, 0x2c}, {@type={'type', 0x3d, "1ec2557b"}, 0x2c}, {@quiet='quiet', 0x2c}]}) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:52 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x401) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xa) [ 593.370656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.380024] Call Trace: [ 593.382606] dump_stack+0x1c9/0x2b4 [ 593.386248] ? dump_stack_print_info.cold.2+0x52/0x52 [ 593.391477] should_fail.cold.4+0xa/0x11 [ 593.395569] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 593.400700] ? save_stack+0xa9/0xd0 [ 593.404352] ? save_stack+0x43/0xd0 [ 593.407998] ? kasan_kmalloc+0xc4/0xe0 [ 593.411904] ? kmem_cache_alloc_trace+0x152/0x780 [ 593.416769] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 593.421984] ? __list_lru_init+0x4d6/0x840 [ 593.426408] ? alloc_super+0x9a6/0xb10 [ 593.430316] ? vfs_get_super+0x6e/0x270 [ 593.434303] ? proc_get_tree+0x88/0xb0 [ 593.438204] ? vfs_get_tree+0x1cb/0x5c0 [ 593.442196] ? do_mount+0x6c1/0x1fb0 [ 593.445923] ? ksys_mount+0x12d/0x140 [ 593.449740] ? __x64_sys_mount+0xbe/0x150 [ 593.454340] ? do_syscall_64+0x1b9/0x820 [ 593.458428] ? save_stack+0xa9/0xd0 [ 593.462087] ? lock_acquire+0x1e4/0x540 [ 593.466076] ? fs_reclaim_acquire+0x20/0x20 10:04:52 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f00004d6000/0x4000)=nil, 0x4000}}) 10:04:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xf4ffffff00000000) [ 593.470412] ? lock_downgrade+0x8f0/0x8f0 [ 593.474116] hfs: file_umask requires a value [ 593.474583] ? check_same_owner+0x340/0x340 [ 593.474605] ? rcu_note_context_switch+0x730/0x730 [ 593.474633] __should_failslab+0x124/0x180 [ 593.479026] hfs: unable to parse mount options [ 593.484288] should_failslab+0x9/0x14 [ 593.484311] kmem_cache_alloc_trace+0x2cb/0x780 [ 593.506463] ? kasan_kmalloc+0xc4/0xe0 [ 593.510382] __memcg_init_list_lru_node+0x185/0x2d0 [ 593.515416] ? kvfree_rcu+0x20/0x20 [ 593.519061] ? __kmalloc_node+0x47/0x70 10:04:52 executing program 3: r0 = userfaultfd(0x800) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x5}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x1}) [ 593.523056] __list_lru_init+0x4d6/0x840 [ 593.527147] ? list_lru_destroy+0x500/0x500 [ 593.531496] ? prealloc_shrinker+0x213/0x480 [ 593.535912] ? __init_waitqueue_head+0x9e/0x150 [ 593.540597] ? inactive_list_is_low+0x850/0x850 [ 593.545285] ? __lockdep_init_map+0x105/0x590 [ 593.549804] alloc_super+0x9a6/0xb10 [ 593.553541] ? destroy_unused_super.part.11+0x110/0x110 [ 593.558922] ? lock_downgrade+0x8f0/0x8f0 [ 593.563121] ? kasan_check_read+0x11/0x20 [ 593.567289] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 593.571890] ? kasan_check_write+0x14/0x20 [ 593.576138] ? do_raw_spin_lock+0xc1/0x200 [ 593.580392] ? ns_test_super+0x50/0x50 [ 593.584291] sget_fc+0x269/0x950 [ 593.587671] ? compare_single+0x10/0x10 [ 593.591666] ? alloc_super+0xb10/0xb10 [ 593.595570] ? kasan_kmalloc+0xc4/0xe0 [ 593.599478] ? __kmalloc_track_caller+0x311/0x760 [ 593.604994] ? proc_root_lookup+0x60/0x60 [ 593.609152] vfs_get_super+0x6e/0x270 [ 593.612973] proc_get_tree+0x88/0xb0 [ 593.616702] vfs_get_tree+0x1cb/0x5c0 [ 593.620519] do_mount+0x6c1/0x1fb0 [ 593.624064] ? check_same_owner+0x340/0x340 [ 593.628393] ? lock_release+0xa30/0xa30 [ 593.632377] ? copy_mount_string+0x40/0x40 [ 593.636619] ? kasan_kmalloc+0xc4/0xe0 [ 593.640559] ? kmem_cache_alloc_trace+0x318/0x780 [ 593.645421] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 593.650994] ? _copy_from_user+0xdf/0x150 [ 593.655163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 593.660794] ? copy_mount_options+0x285/0x380 [ 593.665280] ksys_mount+0x12d/0x140 [ 593.668904] __x64_sys_mount+0xbe/0x150 [ 593.672869] do_syscall_64+0x1b9/0x820 [ 593.676753] ? finish_task_switch+0x1d3/0x870 [ 593.681238] ? syscall_return_slowpath+0x5e0/0x5e0 [ 593.686178] ? syscall_return_slowpath+0x31d/0x5e0 [ 593.691105] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 593.696107] ? prepare_exit_to_usermode+0x291/0x3b0 [ 593.701121] ? perf_trace_sys_enter+0xb10/0xb10 [ 593.705803] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 593.710650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 593.715842] RIP: 0033:0x455ab9 [ 593.719027] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 593.738341] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 593.746047] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 593.753312] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 593.760566] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 593.768126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 593.775382] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000021 [ 593.804831] hfs: file_umask requires a value [ 593.809303] hfs: unable to parse mount options 10:04:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x68], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:52 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x500) 10:04:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88a8ffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:52 executing program 3: r0 = userfaultfd(0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x80, 0x0) accept(r1, &(0x7f0000000100)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000162000/0x1000)=nil, 0x1000}, 0x1000000000000001}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xcd, 0x4080) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x48e}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000240)={r2, 0x8}, 0x8) [ 593.989730] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 594.007380] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") mlockall(0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7fffffff, 0x8000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x7, 0x7}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={r2, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x200, 0x1, 0x6, 0x1, 0x8}, 0x98) 10:04:53 executing program 6 (fault-call:2 fault-nth:34): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:53 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x620202, 0x80) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0x17}}}, 0x1, 0x7ff, 0xffffffffffffffff, 0x8, 0x1}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x0, 0x8006, 0x9, 0x25c, 0x0, 0x2, 0x9, r1}, 0x20) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000180)={0x7, 0x1, 0x0, 0x3, 'syz1\x00', 0xffffffffffffff81}) write$P9_RREAD(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="af000000750200a400000075d9fa0414f0d7516426f86e2d4d0609b2c49d86eb158ae9ed5095a9012f58b99555b476d6edf4097001e4a8fcf50acccb6cd09da453bcd48592d35c17a094e5ce0c9a925730954fcf6e6a174a0d2416ba3dba30b965be3a2c3eebf89529c9946d2e44dfcac4f87b6dfcce2481522dd42f310b90721f909f2d8b8bc11f24b82b9cb7ca7208f05c8c3887ce699e6448a56b58f92b27c635907eec7bb247b6d2f97301c1cb"], 0xaf) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x3, 'syzkaller1\x00', 0x1}, 0x18) r2 = socket$inet(0x2, 0x805, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r2, 0x3) rseq(&(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x7, 0x730a, 0x7471}, 0x1}, 0x20, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:53 executing program 3: r0 = userfaultfd(0x800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf5ffffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xc00000000000000) 10:04:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 594.315965] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 594.329588] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 594.343551] FAULT_INJECTION: forcing a failure. [ 594.343551] name failslab, interval 1, probability 0, space 0, times 0 [ 594.354946] CPU: 0 PID: 25602 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 594.363367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.372746] Call Trace: [ 594.375359] dump_stack+0x1c9/0x2b4 [ 594.379022] ? dump_stack_print_info.cold.2+0x52/0x52 [ 594.384257] should_fail.cold.4+0xa/0x11 [ 594.388342] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 594.393479] ? save_stack+0xa9/0xd0 [ 594.397130] ? save_stack+0x43/0xd0 [ 594.400776] ? kasan_kmalloc+0xc4/0xe0 [ 594.404682] ? kmem_cache_alloc_trace+0x152/0x780 [ 594.409559] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 594.414786] ? __list_lru_init+0x4d6/0x840 [ 594.419043] ? alloc_super+0x9a6/0xb10 [ 594.422950] ? vfs_get_super+0x6e/0x270 [ 594.426940] ? proc_get_tree+0x88/0xb0 [ 594.430849] ? vfs_get_tree+0x1cb/0x5c0 [ 594.434841] ? do_mount+0x6c1/0x1fb0 [ 594.438570] ? ksys_mount+0x12d/0x140 [ 594.442388] ? __x64_sys_mount+0xbe/0x150 [ 594.446561] ? do_syscall_64+0x1b9/0x820 [ 594.450654] ? save_stack+0xa9/0xd0 [ 594.454306] ? lock_acquire+0x1e4/0x540 [ 594.458295] ? fs_reclaim_acquire+0x20/0x20 [ 594.462635] ? lock_downgrade+0x8f0/0x8f0 [ 594.466828] ? check_same_owner+0x340/0x340 [ 594.471176] ? rcu_note_context_switch+0x730/0x730 [ 594.476134] __should_failslab+0x124/0x180 [ 594.480398] should_failslab+0x9/0x14 [ 594.483308] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 594.484209] kmem_cache_alloc_trace+0x2cb/0x780 [ 594.484225] ? kasan_kmalloc+0xc4/0xe0 [ 594.484263] __memcg_init_list_lru_node+0x185/0x2d0 [ 594.484281] ? kvfree_rcu+0x20/0x20 [ 594.511747] ? __kmalloc_node+0x47/0x70 10:04:53 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="639cc76a4d77973789aa8682e957782243070e532b1e84343798559c29f1a041c72859f5c95e2b48799c9b76e245885dcc89575a4580f8dca46dbfd1f561e9cf74d9a7809b9bc0e63c1bd9fedd37c7016e308b76552394930b6a23f944612eb2365341faf2686dd99fac0b424c", 0x6d) 10:04:53 executing program 3: r0 = userfaultfd(0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0x800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @dev, @remote}, &(0x7f0000000440)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in=@broadcast=0xffffffff, 0x4e23, 0x7fff, 0x4e20, 0x0, 0xa, 0x80, 0x20, 0x0, r2, r3}, {0x0, 0xfff, 0x6, 0x1, 0x0, 0x0, 0x80000000, 0xfffffffffffffffb}, {0x8, 0xd0a, 0x0, 0x7fe0}, 0x3, 0x6e6bb1, 0x1, 0x0, 0x1, 0x2}, {{@in6=@loopback={0x0, 0x1}, 0x4d3, 0xff}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x18}, 0x3503, 0x0, 0x2, 0x2a90cac1, 0x3, 0x7, 0x8}}, 0xe8) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f000018c000/0x1000)=nil, 0x1000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xd00000000000000) 10:04:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x89060000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 594.515747] __list_lru_init+0x4d6/0x840 [ 594.519824] ? list_lru_destroy+0x500/0x500 [ 594.524167] ? prealloc_shrinker+0x213/0x480 [ 594.528584] ? __init_waitqueue_head+0x9e/0x150 [ 594.533266] ? inactive_list_is_low+0x850/0x850 [ 594.537953] ? __lockdep_init_map+0x105/0x590 [ 594.542469] alloc_super+0x9a6/0xb10 [ 594.546201] ? destroy_unused_super.part.11+0x110/0x110 [ 594.551578] ? lock_downgrade+0x8f0/0x8f0 [ 594.555748] ? kasan_check_read+0x11/0x20 [ 594.559908] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 594.564509] ? kasan_check_write+0x14/0x20 [ 594.568755] ? do_raw_spin_lock+0xc1/0x200 [ 594.573009] ? ns_test_super+0x50/0x50 [ 594.576909] sget_fc+0x269/0x950 [ 594.580285] ? compare_single+0x10/0x10 [ 594.584274] ? alloc_super+0xb10/0xb10 [ 594.588173] ? kasan_kmalloc+0xc4/0xe0 [ 594.592080] ? __kmalloc_track_caller+0x311/0x760 [ 594.596938] ? proc_root_lookup+0x60/0x60 [ 594.601099] vfs_get_super+0x6e/0x270 [ 594.604915] proc_get_tree+0x88/0xb0 [ 594.608641] vfs_get_tree+0x1cb/0x5c0 [ 594.612459] do_mount+0x6c1/0x1fb0 [ 594.616015] ? kasan_check_write+0x14/0x20 [ 594.620272] ? copy_mount_string+0x40/0x40 [ 594.624519] ? kasan_kmalloc+0xc4/0xe0 [ 594.628431] ? kmem_cache_alloc_trace+0x318/0x780 [ 594.633291] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 594.638849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 594.644407] ? copy_mount_options+0x285/0x380 [ 594.648925] ksys_mount+0x12d/0x140 [ 594.652574] __x64_sys_mount+0xbe/0x150 [ 594.656572] do_syscall_64+0x1b9/0x820 [ 594.660470] ? finish_task_switch+0x1d3/0x870 [ 594.664980] ? syscall_return_slowpath+0x5e0/0x5e0 [ 594.669928] ? syscall_return_slowpath+0x31d/0x5e0 [ 594.674869] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 594.679896] ? prepare_exit_to_usermode+0x291/0x3b0 [ 594.684928] ? perf_trace_sys_enter+0xb10/0xb10 [ 594.689611] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 594.694479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 594.699673] RIP: 0033:0x455ab9 [ 594.702859] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 594.722448] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 594.730168] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 594.737447] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 594.744721] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 594.751995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 594.759271] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000022 [ 594.790494] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:53 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:53 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x0) setsockopt$inet6_int(r1, 0x29, 0xff, &(0x7f0000000040)=0x46a8, 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0x9) 10:04:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:53 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75c55f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) close(r1) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:53 executing program 6 (fault-call:2 fault-nth:35): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='proc\x00', 0x0, &(0x7f0000001d80)) 10:04:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x7, &(0x7f0000000100), 0x0) [ 595.028263] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 595.048181] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 595.052349] FAULT_INJECTION: forcing a failure. [ 595.052349] name failslab, interval 1, probability 0, space 0, times 0 [ 595.069901] CPU: 0 PID: 25663 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 10:04:53 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f00000000c0)=""/50) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000200)={{0x2, 0x3, 0x3, 0x3, 0xffffffffffff8001}, 0x7, 0x713, 'id1\x00', 'timer0\x00', 0x0, 0x2400000000000000, 0x7, 0x7fff, 0xe2c1}) setsockopt$sock_int(r0, 0x1, 0x3a, &(0x7f0000000300)=0x51a2, 0x4) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) prctl$getname(0x10, &(0x7f0000000180)=""/92) 10:04:53 executing program 0: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101002, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000040)=0x20000) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xd) [ 595.078312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.087761] Call Trace: [ 595.090374] dump_stack+0x1c9/0x2b4 [ 595.094019] ? dump_stack_print_info.cold.2+0x52/0x52 [ 595.099240] should_fail.cold.4+0xa/0x11 [ 595.103321] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 595.108449] ? rcu_is_watching+0x8c/0x150 [ 595.112621] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 595.120792] ? perf_trace_run_bpf_submit+0x269/0x3b0 10:04:53 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000340)={0x8}, 0x1) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0/file0\x00', 0xdc3, 0x2, &(0x7f0000000280)=[{&(0x7f0000000100)="aa0dcf7443bb0fb1fce5c9cc367a4f6a4d92f0694a9904c86c86ab3cd006740e45e396ceba6fefb7da8ae522207e177391ed4525eb07995683856bcc19ff181ba7375d84c2afcadb94c236645637a51cf2e5f1212d1eb323d7dd72426c381b82a3dc61c7f059851e86a304cbdc169b109ba01ed37a7056a3aeaa21233f178f27cc126ffaeca983dc8f8cada53ec88a2947979ac997a70e26e6fa5de8bbf6dda5acf3bd74e7462f2389a4b796e480090c", 0xb0, 0x634}, {&(0x7f0000000200)="57592da2b8c51ec98fd60fb60e215894b99c064f16678c04cc868a5d55c73ff6e501fb9025c93e3517167f1a6ff9018b0bc66bd04eabf207c0269890a4d229a21a7c912171cedeaea84f92bace1668", 0x4f, 0x8}], 0x2904400, &(0x7f00000002c0)={[{@nobarrier='nobarrier', 0x2c}, {@spectator='spectator', 0x2c}]}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) accept4$packet(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000900)=0x14, 0x80000) sendmsg$xdp(r0, &(0x7f0000000c80)={&(0x7f0000000940)={0x2c, 0x2, r1, 0x24}, 0x10, &(0x7f0000000c40)=[{&(0x7f0000000980)="690c64b76f87ac83875dbbc3651192b2c49544cce564835eb800bc8a324a848db3381156e7e645228a8e23efb6d649ee0e135bd7d8401f69fc4d2a1149abdb1ededd07dce6553ef41ac3", 0x4a}, {&(0x7f0000000a00)="89da7f4dcf6b32945263721d693859d2abf2987f26784098c9590eaf88c2f546033f23a80a5725a7dd171040a6e571991acc523bed5fc6bf89614d13fa2442964c815e478c79b3960a96a9a836c2930439de0221977c1a25d3e7d3cd5acf778b162259e770214aad79f6eacd053b3c95c77e271c67d648ca04a1276faa445033cf18561449ae1a6aeb8a25264601b254d670e53f98ce9b6ac9", 0x99}, {&(0x7f0000000ac0)="e2936a06a8596c9ef886ef2c587af4d954e5eb58c7b6b564f17a8034ec688f5e8be2077a339646d8ede3c090e9233ca1ac9ca304f321e9d3427da029070349baba04d4f2a17c5477a341d710eec829537d3d0d3200507ec7a3732c9affdba41d36050de9cb2f1d264b74818bb1fe0a94558342906a0883c629d1abfbbf41f7a23aa7937ff16d7589408e4c5f3bf6b215048d2e6fe90477276ad72ee0ca5e73fc914ab3530372558874f4f9af1d19b60306d919eed26d5b386c68e40e6c3210e5bf0fc2c6608bc4", 0xc7}, {&(0x7f0000000bc0)="e8d6720026ce78f99699048ea1953dc9e072ad5574e5c73979f843fdbc5f0fcbef9079634795c2983d89f2f98361d3252bb2304d04408210171267b43d8e1b27ed4907f27258c7931f9a296aa60d018028b8d2c49a57142c", 0x58}], 0x4, 0x0, 0x0, 0x801}, 0x40081) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) truncate(&(0x7f00000000c0)='./file0/file0\x00', 0x800000) [ 595.125918] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 595.131049] ? trace_hardirqs_on+0x10/0x10 [ 595.135309] ? perf_tp_event+0xc40/0xc40 [ 595.139399] ? __save_stack_trace+0x8d/0xf0 [ 595.143754] ? lock_acquire+0x1e4/0x540 [ 595.147765] ? fs_reclaim_acquire+0x20/0x20 [ 595.148095] QAT: Invalid ioctl [ 595.152111] ? lock_downgrade+0x8f0/0x8f0 [ 595.152144] ? check_same_owner+0x340/0x340 [ 595.152166] ? perf_trace_lock+0x920/0x920 [ 595.168060] ? rcu_note_context_switch+0x730/0x730 [ 595.173008] __should_failslab+0x124/0x180 10:04:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4c00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x86ddffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 595.177265] should_failslab+0x9/0x14 [ 595.181080] kmem_cache_alloc+0x2af/0x760 [ 595.185236] ? memset+0x31/0x40 [ 595.188543] __d_alloc+0xc8/0xd50 [ 595.192017] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 595.197047] ? lock_acquire+0x1e4/0x540 [ 595.201039] ? __d_instantiate+0x522/0x750 [ 595.205290] ? lock_downgrade+0x8f0/0x8f0 [ 595.209468] ? kasan_check_read+0x11/0x20 [ 595.213887] ? do_raw_spin_unlock+0xa7/0x2f0 [ 595.218307] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 595.222915] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 10:04:54 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfe63) truncate(&(0x7f0000000100)='./file0\x00', 0xfffffff5) [ 595.228469] ? hashlen_string+0x1f2/0x300 [ 595.232646] d_alloc+0x96/0x380 [ 595.232870] QAT: Invalid ioctl [ 595.235932] ? d_instantiate+0x79/0xa0 [ 595.235950] ? __d_alloc+0xd50/0xd50 [ 595.235984] d_alloc_name+0xbb/0x120 [ 595.236000] ? down_write+0x8f/0x130 [ 595.236020] ? d_alloc+0x380/0x380 [ 595.258088] ? down_read+0x1d0/0x1d0 [ 595.261831] proc_setup_self+0xe1/0x3af [ 595.262106] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:04:54 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x400000, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f0000000580)={0x5be, {{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}, {{0x2, 0x4e22, @multicast2=0xe0000002}}}, 0x108) r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r1, 0x3) r2 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x2) getpeername$netlink(r2, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendto$inet(r1, &(0x7f0000000240)="54e79c3bf32fc099bced28591584e0f751557aef1a66dc949e9ab41025e45cca5ced0af95b964c579497cebe5ab332706c7ccf50cddf5efd58d64c829344ecb64f21285100a368f3417dad74c759fcb50c6af2111686362ecd13dad82c3bf36fa552a50fb0e127ef8b5a2023fcb2c49f15c56455546b5fb8c9a230436e6bff3ebf797968c23c76b36b64f1cedfc2df031a1620987657777d4b3d5db31bdb700a1f0b4dfac91fd464542d794c40ee9efd1d08000000c075da80edec071df4cad0e43d31e360959defdbecbb4f505351e4ac47381599a60160b8f9484e2eeaa998da7db131b901e497b005035dd4788eb311ee168be3f9b37cad192888d6ee9110a5e9df8f243be511ec3efc9c34745ae06e651d4bfe654562efac3a63b6c3eab9e70c31aa1e49c9c6c58642f72018b827ce4059d6395de8570abbd7b2df7bac2d98c6769209421f53c7a829dd5e62cc3e685fc3308869fa77be678aa93460c784c0c41d1116acfceeffdbee490f00c5734b7dbe2a5c44adb10118d99fa40ca6b9f639b7a961455f9a3411cd59c3d39b293c7336b58a1803000000f1cac63dfded25e76e3a98de587352b3bf531147ef5b38a86a20f479d03c4d838fe2510a9ff2a392b4c1a73ab4f070f6d4c208e48d0befeccce3af39156e20c097a69a393ff73d2db0f1ee6a74e6ace13c7cb1b47fb12e00350b2e659b3d0391717680961af6b548c2df7c628a88ed3b0e2b39c265b87efbfa06acbb8f01ad88d1c50e03cbe6b2bdac6209ebedb112a98ffaae8eac3c9ed0b2cff346ae077379389955f2dbfb73009475ceb7c390b9f30166f27884a78d53c5807f8e560e0bbe1f41031e2238f235898ee5fdc8cd5dd846205bc558b837330d4c8496ae546a0b1b1d52816d13f3efc313535775206b3f9b6d9dacc76430e2dc0830277ed38f797d24e761faa0ea8784fffd33acdfb16c89f5428a5ec637e72a996de19379c336fb4643d87fb48395685a6db2972f3922348bbe93f83c24cbc74601ea3a16a9275d1206572fda6be1cdaa4ba6fa800d801a262bfe5a227bc1d2a7a5c90d77da6b8da13a007f5487efdbacd353", 0xfffffffffffffe29, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x38b) [ 595.265822] proc_fill_super+0x37e/0x630 [ 595.265845] ? proc_root_lookup+0x60/0x60 [ 595.265866] ? __kmalloc_track_caller+0x311/0x760 [ 595.265887] ? proc_root_lookup+0x60/0x60 [ 595.281744] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 595.284380] vfs_get_super+0x15e/0x270 [ 595.284406] proc_get_tree+0x88/0xb0 [ 595.284425] vfs_get_tree+0x1cb/0x5c0 [ 595.284447] do_mount+0x6c1/0x1fb0 [ 595.318623] ? check_same_owner+0x340/0x340 [ 595.322959] ? lock_release+0xa30/0xa30 [ 595.326961] ? copy_mount_string+0x40/0x40 [ 595.331213] ? kasan_kmalloc+0xc4/0xe0 [ 595.335127] ? kmem_cache_alloc_trace+0x318/0x780 [ 595.339991] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 595.345542] ? _copy_from_user+0xdf/0x150 [ 595.349707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 595.355258] ? copy_mount_options+0x285/0x380 [ 595.359782] ksys_mount+0x12d/0x140 [ 595.363430] __x64_sys_mount+0xbe/0x150 [ 595.367425] do_syscall_64+0x1b9/0x820 [ 595.371353] ? finish_task_switch+0x1d3/0x870 [ 595.375867] ? syscall_return_slowpath+0x5e0/0x5e0 [ 595.380817] ? syscall_return_slowpath+0x31d/0x5e0 [ 595.385758] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 595.390792] ? prepare_exit_to_usermode+0x291/0x3b0 [ 595.395822] ? perf_trace_sys_enter+0xb10/0xb10 [ 595.400509] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 595.405381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 595.410586] RIP: 0033:0x455ab9 [ 595.413778] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 595.433352] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 595.441089] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 595.448376] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 595.455687] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 595.463064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 595.470356] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000023 [ 595.478090] proc_fill_super: can't allocate /proc/self [ 595.484071] ================================================================== [ 595.491471] BUG: KASAN: use-after-free in dput.part.26+0x634/0x7a0 [ 595.497801] Read of size 4 at addr ffff880189e96a20 by task syz-executor6/25663 [ 595.505253] [ 595.506896] CPU: 0 PID: 25663 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180716+ #8 [ 595.515299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.524666] Call Trace: [ 595.527277] dump_stack+0x1c9/0x2b4 [ 595.530926] ? dump_stack_print_info.cold.2+0x52/0x52 [ 595.536125] ? printk+0xa7/0xcf [ 595.539440] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 595.544208] ? dput.part.26+0x634/0x7a0 [ 595.548173] print_address_description+0x6c/0x20b [ 595.553005] ? dput.part.26+0x634/0x7a0 [ 595.557000] kasan_report.cold.7+0x242/0x30d [ 595.561411] __asan_report_load4_noabort+0x14/0x20 [ 595.566332] dput.part.26+0x634/0x7a0 [ 595.570124] ? shrink_dcache_sb+0x350/0x350 [ 595.574437] ? __kasan_slab_free+0x131/0x170 [ 595.578835] ? trace_hardirqs_on+0xd/0x10 [ 595.582986] dput+0x15/0x20 [ 595.585916] proc_kill_sb+0x125/0x1e0 [ 595.589704] ? proc_get_inode+0x680/0x680 [ 595.593844] ? proc_root_lookup+0x60/0x60 [ 595.598008] deactivate_locked_super+0x97/0x100 [ 595.602682] vfs_get_super+0x20f/0x270 [ 595.606564] proc_get_tree+0x88/0xb0 [ 595.610285] vfs_get_tree+0x1cb/0x5c0 [ 595.614087] do_mount+0x6c1/0x1fb0 [ 595.617616] ? check_same_owner+0x340/0x340 [ 595.621928] ? lock_release+0xa30/0xa30 [ 595.625909] ? copy_mount_string+0x40/0x40 [ 595.630135] ? kasan_kmalloc+0xc4/0xe0 [ 595.634039] ? kmem_cache_alloc_trace+0x318/0x780 [ 595.638878] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 595.644405] ? _copy_from_user+0xdf/0x150 [ 595.648547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 595.654074] ? copy_mount_options+0x285/0x380 [ 595.658566] ksys_mount+0x12d/0x140 [ 595.662196] __x64_sys_mount+0xbe/0x150 [ 595.666163] do_syscall_64+0x1b9/0x820 [ 595.670043] ? finish_task_switch+0x1d3/0x870 [ 595.674544] ? syscall_return_slowpath+0x5e0/0x5e0 [ 595.679465] ? syscall_return_slowpath+0x31d/0x5e0 [ 595.684649] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 595.689654] ? prepare_exit_to_usermode+0x291/0x3b0 [ 595.694675] ? perf_trace_sys_enter+0xb10/0xb10 [ 595.699338] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 595.704178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 595.709380] RIP: 0033:0x455ab9 [ 595.712562] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 595.733011] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 595.740730] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 595.747992] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 595.755255] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 595.762530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 595.769788] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000023 [ 595.777062] [ 595.778697] Allocated by task 25482: [ 595.782416] save_stack+0x43/0xd0 [ 595.785862] kasan_kmalloc+0xc4/0xe0 [ 595.789561] kasan_slab_alloc+0x12/0x20 [ 595.793883] kmem_cache_alloc+0x12e/0x760 [ 595.798026] __d_alloc+0xc8/0xd50 [ 595.801472] d_alloc+0x96/0x380 [ 595.804740] d_alloc_parallel+0x15a/0x1ea0 [ 595.808966] __lookup_slow+0x1e6/0x540 [ 595.812846] lookup_slow+0x57/0x80 [ 595.816377] walk_component+0x94a/0x2630 [ 595.820423] link_path_walk+0xa6e/0x1540 [ 595.824566] path_openat+0x23c/0x5430 [ 595.828361] do_filp_open+0x255/0x380 [ 595.832157] do_sys_open+0x584/0x720 [ 595.835865] __x64_sys_open+0x7e/0xc0 [ 595.839655] do_syscall_64+0x1b9/0x820 [ 595.843537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 595.848706] [ 595.850407] Freed by task 14179: [ 595.853764] save_stack+0x43/0xd0 [ 595.857202] __kasan_slab_free+0x11a/0x170 [ 595.861428] kasan_slab_free+0xe/0x10 [ 595.865212] kmem_cache_free+0x86/0x2d0 [ 595.869183] __d_free+0x20/0x30 [ 595.872459] rcu_process_callbacks+0xf98/0x2860 [ 595.877134] __do_softirq+0x2e8/0xb17 [ 595.880924] [ 595.882547] The buggy address belongs to the object at ffff880189e96a20 [ 595.882547] which belongs to the cache dentry(33:syz6) of size 288 [ 595.895556] The buggy address is located 0 bytes inside of [ 595.895556] 288-byte region [ffff880189e96a20, ffff880189e96b40) [ 595.907241] The buggy address belongs to the page: [ 595.912157] page:ffffea000627a580 count:1 mapcount:0 mapping:ffff8801adc48b40 index:0xffff880189e96080 [ 595.921593] flags: 0x2fffc0000000200(slab) [ 595.925840] raw: 02fffc0000000200 ffffea00062ad6c8 ffff8801c12bdd38 ffff8801adc48b40 [ 595.933711] raw: ffff880189e96080 ffff880189e96080 0000000100000005 ffff8801a895c980 [ 595.941575] page dumped because: kasan: bad access detected [ 595.947284] page->mem_cgroup:ffff8801a895c980 [ 595.951757] [ 595.953366] Memory state around the buggy address: [ 595.958289] ffff880189e96900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 595.965635] ffff880189e96980: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 595.972989] >ffff880189e96a00: fc fc fc fc fb fb fb fb fb fb fb fb fb fb fb fb 10:04:54 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x6}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 10:04:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x48000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 10:04:54 executing program 0: userfaultfd(0x80800) r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x93) listen(r0, 0x3) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 10:04:54 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ff4000/0xb000)=nil, 0xb000}, 0x3}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x38c000}}) 10:04:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x700], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) [ 595.980345] ^ [ 595.984764] ffff880189e96a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 595.992132] ffff880189e96b00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 596.000100] ================================================================== [ 596.007871] Kernel panic - not syncing: panic_on_warn set ... [ 596.007871] [ 596.015258] CPU: 0 PID: 25663 Comm: syz-executor6 Tainted: G B 4.18.0-rc5-next-20180716+ #8 [ 596.017735] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 596.025058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 596.025065] Call Trace: [ 596.025089] dump_stack+0x1c9/0x2b4 [ 596.025108] ? dump_stack_print_info.cold.2+0x52/0x52 [ 596.025130] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 596.060914] panic+0x238/0x4e7 [ 596.064115] ? add_taint.cold.5+0x16/0x16 [ 596.068266] ? do_raw_spin_unlock+0xa7/0x2f0 [ 596.072664] ? do_raw_spin_unlock+0xa7/0x2f0 [ 596.077067] ? dput.part.26+0x634/0x7a0 [ 596.081033] kasan_end_report+0x47/0x4f [ 596.084997] kasan_report.cold.7+0x76/0x30d [ 596.089316] __asan_report_load4_noabort+0x14/0x20 [ 596.094234] dput.part.26+0x634/0x7a0 [ 596.098041] ? shrink_dcache_sb+0x350/0x350 [ 596.102355] ? __kasan_slab_free+0x131/0x170 [ 596.106760] ? trace_hardirqs_on+0xd/0x10 [ 596.110901] dput+0x15/0x20 [ 596.113825] proc_kill_sb+0x125/0x1e0 [ 596.117616] ? proc_get_inode+0x680/0x680 [ 596.121755] ? proc_root_lookup+0x60/0x60 [ 596.125899] deactivate_locked_super+0x97/0x100 [ 596.130559] vfs_get_super+0x20f/0x270 [ 596.134441] proc_get_tree+0x88/0xb0 [ 596.138148] vfs_get_tree+0x1cb/0x5c0 [ 596.141942] do_mount+0x6c1/0x1fb0 [ 596.145475] ? check_same_owner+0x340/0x340 [ 596.149786] ? lock_release+0xa30/0xa30 [ 596.153756] ? copy_mount_string+0x40/0x40 [ 596.157979] ? kasan_kmalloc+0xc4/0xe0 [ 596.161860] ? kmem_cache_alloc_trace+0x318/0x780 [ 596.166697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 596.172222] ? _copy_from_user+0xdf/0x150 [ 596.176374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 596.181987] ? copy_mount_options+0x285/0x380 [ 596.186480] ksys_mount+0x12d/0x140 [ 596.190188] __x64_sys_mount+0xbe/0x150 [ 596.194161] do_syscall_64+0x1b9/0x820 [ 596.198037] ? finish_task_switch+0x1d3/0x870 [ 596.202523] ? syscall_return_slowpath+0x5e0/0x5e0 [ 596.207454] ? syscall_return_slowpath+0x31d/0x5e0 [ 596.212374] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 596.217386] ? prepare_exit_to_usermode+0x291/0x3b0 [ 596.222392] ? perf_trace_sys_enter+0xb10/0xb10 [ 596.227054] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 596.231896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 596.237072] RIP: 0033:0x455ab9 [ 596.240251] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 596.259646] RSP: 002b:00007fc5475b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 596.267346] RAX: ffffffffffffffda RBX: 00007fc5475b16d4 RCX: 0000000000455ab9 [ 596.274605] RDX: 0000000020005440 RSI: 0000000020000880 RDI: 0000000020000000 [ 596.281862] RBP: 000000000072bea0 R08: 0000000020001d80 R09: 0000000000000000 [ 596.289117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 596.296374] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000023 [ 596.304125] Dumping ftrace buffer: [ 596.307660] (ftrace buffer empty) [ 596.311350] Kernel Offset: disabled [ 596.314967] Rebooting in 86400 seconds..